id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
RHSA-2010:0697
|
Red Hat Security Advisory: samba security and bug fix update
|
Samba: Stack-based buffer overflow by processing specially-crafted SID records
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:rhel_eus:4.7::as",
"cpe:/o:redhat:rhel_eus:4.7::es",
"cpe:/o:redhat:rhel_eus:5.3",
"cpe:/o:redhat:rhel_eus:5.4"
] | null | null | null | null | null |
CVE-2024-12409
|
Simple:Press Forum <= 6.10.11 - Reflected Cross-Site Scripting
|
The Simple:Press Forum plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 6.10.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1 | null | null | null |
CVE-2021-40924
|
Cross-site scripting (XSS) vulnerability in install/index.php in bugs 1.8 and below version allows remote attackers to inject arbitrary web script or HTML via the first_name parameter.
|
[
"cpe:2.3:a:pixeline:bugs:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2025-4029
|
code-projects Personal Diary Management System New Record addrecord stack-based overflow
|
A vulnerability was found in code-projects Personal Diary Management System 1.0 and classified as critical. Affected by this issue is the function addrecord of the component New Record Handler. The manipulation of the argument filename leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
|
[] | 4.8 | 5.3 | 5.3 | 4.3 | null |
CVE-2019-0091
|
Code injection vulnerability in installer for Intel(R) CSME before versions 11.8.65, 11.11.65, 11.22.65, 12.0.35 and Intel(R) TXE 3.1.65, 4.0.15 may allow an unprivileged user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:a:intel:converged_security_and_management_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 | null |
|
GHSA-mm23-3847-j7q6
|
Integer overflow in simpress.bin in the Impress module in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted polygons in a PowerPoint document that triggers a heap-based buffer overflow.
|
[] | null | null | null | null | null |
|
GHSA-7hw5-f79p-8gpg
|
There's a flaw in openjpeg in versions prior to 2.4.0 in src/lib/openjp2/pi.c. When an attacker is able to provide crafted input to be processed by the openjpeg encoder, this could cause an out-of-bounds read. The greatest impact from this flaw is to application availability.
|
[] | null | 5.5 | null | null | null |
|
CVE-2024-12654
|
FabulaTech USB over Network IOCT ftusbbus2.sys 0x220408 null pointer dereference
|
A vulnerability classified as problematic was found in FabulaTech USB over Network 6.0.6.1. Affected by this vulnerability is the function 0x220408 in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:a:fabulatech:usb_over_network:6.0.6.1:*:*:*:*:*:*:*"
] | 6.8 | 5.5 | 5.5 | 4.6 | null |
GHSA-6jfg-6x32-98jf
|
Heap-based buffer overflow in the SetDevNames method of the Tidestone Formula One ActiveX control (TTF16.ocx) 6.3.5 Build 1 in Oracle Hyperion Strategic Finance 12.x and possibly earlier allows remote attackers to execute arbitrary code via a long string to the DriverName parameter.
|
[] | null | null | null | null | null |
|
cisco-sa-20190515-nxos-spsv
|
Cisco MDS 9700 Series Multilayer Directors and Nexus 7000/7700 Series Switches Software Patch Signature Verification Vulnerability
|
A vulnerability in the Image Signature Verification feature of Cisco NX-OS Software could allow an authenticated, local attacker with administrator-level credentials to install a malicious software patch on an affected device.
The vulnerability is due to improper verification of digital signatures for patch images. An attacker could exploit this vulnerability by loading an unsigned software patch on an affected device. A successful exploit could allow the attacker to boot a malicious software patch image.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-spsv ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-nxos-spsv"]
|
[] | null | null | 6.7 | null | null |
CVE-2023-34351
|
Buffer underflow in some Intel(R) PCM software before version 202307 may allow an unauthenticated user to potentially enable denial of service via network access.
|
[
"cpe:2.3:a:intel:pcm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:performance_counter_monitor:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2024-29754
|
In TMU_IPC_GET_TABLE, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 6.2 | null | null | null |
|
CVE-2002-1885
|
PHP remote file inclusion vulnerability in showhits.php3 for PowerPhlogger (PPhlogger) 2.0.9 through 2.2.2 allows remote attackers to execute arbitrary PHP code via the rel_path parameter.
|
[
"cpe:2.3:a:powerphlogger:powerphlogger:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:powerphlogger:powerphlogger:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:powerphlogger:powerphlogger:2.2.2a:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2023-20103
|
Cisco Secure Network Analytics Remote Code Execution Vulnerability
|
A vulnerability in Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code as a root user on an affected device. This vulnerability is due to insufficient validation of user input to the web interface. An attacker could exploit this vulnerability by uploading a crafted file to an affected device. A successful exploit could allow the attacker to execute code on the affected device. To exploit this vulnerability, an attacker would need to have valid Administrator credentials on the affected device.
|
[
"cpe:2.3:a:cisco:secure_network_analytics:*:*:*:*:*:*:*:*"
] | null | 4.9 | null | null | null |
GHSA-jc32-3h2c-hmcc
|
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.14.11 allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via vectors involving TLS.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-53932
|
The com.remi.colorphone.callscreen.calltheme.callerscreen (aka Color Phone: Call Screen Theme) application through 21.1.9 for Android enables any application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.remi.colorphone.callscreen.calltheme.callerscreen.dialer.DialerActivity component.
|
[] | null | 9.1 | null | null | null |
|
GHSA-wc7q-3x28-qj26
|
An issue was discovered in Arm Mbed TLS before 2.23.0. A side channel allows recovery of an ECC private key, related to mbedtls_ecp_check_pub_priv, mbedtls_pk_parse_key, mbedtls_pk_parse_keyfile, mbedtls_ecp_mul, and mbedtls_ecp_mul_restartable.
|
[] | null | 5.3 | null | null | null |
|
CVE-2024-21828
|
Improper access control in some Intel(R) Ethernet Controller Administrative Tools software before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[
"cpe:2.3:h:intel:ethernet_adapter_complete_driver_pack:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:ethernet_connections_boot_utility_preboot_images_and_efi_drivers:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
|
GHSA-xqmv-67w6-p3wm
|
An issue in Eskooly Free Online School management Software v.3.0 and before allows a remote attacker to escalate privileges via the Sin-up process function in the account settings.
|
[] | null | 8.8 | null | null | null |
|
GHSA-42hx-vrxx-5r6v
|
Jodit Editor vulnerable to Cross-site Scripting
|
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.
|
[] | null | 6.1 | null | null | null |
GHSA-x6cj-w7fm-39p5
|
The Cisco Media Gateway Controller (MGC) in (1) SC2200 7.4 and earlier, (2) VSC3000 9.1 and earlier, (3) PGW 2200 9.1 and earlier, (4) Billing and Management Server (BAMS) and (5) Voice Services Provisioning Tool (VSPT) runs on default installations of Solaris 2.6 with unnecessary services and without the latest security patches, which allows attackers to exploit known vulnerabilities.
|
[] | null | null | null | null | null |
|
GHSA-rr4m-8whr-q39q
|
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
|
[] | null | null | null | null | null |
|
cisco-sa-20181003-ucsd-xss
|
Cisco UCS Director Stored Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco UCS Director could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web-based management interface of an affected system.
The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive, browser-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ucsd-xss ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181003-ucsd-xss"]
|
[] | null | null | 6.1 | null | null |
GHSA-2r85-wfhw-9qqf
|
The buddypress-activity-plus plugin before 1.6.2 for WordPress has CSRF with resultant directory traversal via the wp-admin/admin-ajax.php bpfb_photos[] parameter in a bpfb_remove_temp_images action.
|
[] | null | 8.1 | null | null | null |
|
GHSA-6m4q-5fp8-jrhp
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[] | null | null | 9.8 | null | null |
|
CVE-2025-27198
|
Photoshop Desktop | Heap-based Buffer Overflow (CWE-122)
|
Photoshop Desktop versions 25.12.1, 26.4.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
GHSA-w3wh-g4m9-783p
|
XWiki Rendering is vulnerable to XSS attacks through insecure XHTML syntax
|
ImpactThe XHTML syntax depended on the `xdom+xml/current` syntax which allows the creation of raw blocks that permit the insertion of arbitrary HTML content including JavaScript. This allows XSS attacks for users who can edit a document like their user profile (enabled by default). The attack works by setting the document's syntax to `xdom+xml/current` and then inserting content likeThis has been fixed by removing the dependency on the `xdom+xml/current` syntax from the XHTML syntax. Note that the `xdom+xml` syntax is still vulnerable to this attack. As it's main purpose is testing and its use is quite difficult, this syntax shouldn't be installed or used on a regular wiki. We're currently not aware of any further dependencies on it.PatchesThe fix of removing the dependency has been included in XWiki 14.10. It is not released for earlier versions due to the potential breakages, among others this change makes it necessary to update the [Confluence XHTML syntax](https://extensions.xwiki.org/xwiki/bin/view/Extension/Confluence/Syntax%20XHTML/) as it relies on internals that were changed for the fix. Similar XSS fixes were also not applied to the LTS version 13.10.x due to the potential breakages.WorkaroundsThere are no known workarounds apart from upgrading.Referenceshttps://jira.xwiki.org/browse/XRENDERING-660https://github.com/xwiki/xwiki-rendering/commit/a4ca31f99f524b9456c64150d6f375984aa81ea7For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:security@xwiki.org)
|
[] | null | 9 | null | null | null |
GHSA-7x8q-x29w-wpg4
|
A memory exhaustion vulnerability exists in Asterisk Open Source 13.x before 13.15.1 and 14.x before 14.4.1 and Certified Asterisk 13.13 before 13.13-cert4, which can be triggered by sending specially crafted SCCP packets causing an infinite loop and leading to memory exhaustion (by message logging in that loop).
|
[] | null | null | 7.5 | null | null |
|
CVE-2020-13258
|
Contentful through 2020-05-21 for Python allows reflected XSS, as demonstrated by the api parameter to the-example-app.py.
|
[
"cpe:2.3:a:contentful:python_example:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2005-4580
|
Cross-site scripting (XSS) vulnerability in Day Communique 4 allows remote attackers to inject arbitrary web script or HTML via the query parameter in a search.
|
[
"cpe:2.3:a:day:communique:4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-3jvv-r7g7-63qp
|
Cross-site scripting (XSS) vulnerability in SourceBans before 2.0 pre-alpha allows remote attackers to inject arbitrary web script or HTML via the advSearch parameter to index.php.
|
[] | null | null | 6.1 | null | null |
|
GHSA-rx3h-5q52-x26g
|
Microsoft Edge (Chromium-based) Tampering Vulnerability.
|
[] | null | 5.3 | null | null | null |
|
RHSA-2021:0931
|
Red Hat Security Advisory: openvswitch2.11 and ovn2.11 security update
|
lldpd: buffer overflow in the lldp_decode function in daemon/protocols/lldp.c dpdk: librte_vhost Integer overflow in vhost_user_set_log_base() dpdk: librte_vhost Integer truncation in vhost_user_check_and_alloc_queue_pair() dpdk: librte_vhost Missing inputs validation in Vhost-crypto
|
[
"cpe:/a:redhat:openstack:13::el7"
] | null | 5.1 | null | null | null |
CVE-2000-0135
|
The @Retail shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
|
[
"cpe:2.3:a:atretail:atretail:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
PYSEC-2012-17
| null |
Tweepy does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python httplib library.
|
[] | null | null | null | null | null |
CVE-2020-23630
|
A blind SQL injection vulnerability exists in zzcms ver201910 based on time (cookie injection).
|
[
"cpe:2.3:a:zzcms:zzcms:201910:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null |
|
GHSA-v5c2-f543-4vhm
|
In the Linux kernel, the following vulnerability has been resolved:f2fs: fix null reference error when checking end of zoneThis patch fixes a potentially null pointer being accessed by
is_end_zone_blkaddr() that checks the last block of a zone
when f2fs is mounted as a single device.
|
[] | null | 5.5 | null | null | null |
|
CVE-2003-1097
|
Buffer overflow in rexec on HP-UX B.10.20, B.11.00, and B.11.04, when setuid root, may allow local users to gain privileges via a long -l option.
|
[
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.04:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-pqrm-m74p-4cj9
|
A vulnerability in the Cisco IOS XE Software REST API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insufficient authorization checks for requests that are sent to the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious request to an affected device via the REST API. A successful exploit could allow the attacker to selectively bypass authorization checks for the REST API of the affected software and use the API to perform privileged actions on an affected device. Cisco Bug IDs: CSCuz56428.
|
[] | null | null | 8.8 | null | null |
|
CVE-2023-43064
|
IBM i code execution
|
Facsimile Support for IBM i 7.2, 7.3, 7.4, and 7.5 could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause arbitrary code to run with the privilege of the user invoking the facsimile support. IBM X-Force ID: 267689.
|
[
"cpe:2.3:o:ibm:i:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:7.5:*:*:*:*:*:*:*"
] | null | 7 | null | null | null |
GHSA-7qg6-g6wf-59gq
|
phpFK lite has XSS via the faq.php, members.php, or search.php query string or the user.php user parameter.
|
[] | null | null | 6.1 | null | null |
|
CVE-2025-53187
|
Unauthenticated RCE
|
Due to an issue in configuration, code that was intended for debugging purposes was included in the market release of the ASPECT FW allowing an attacker to bypass authentication. This vulnerability may allow an attacker to change the system time, access files, and make function calls without prior authentication. This issue affects all versions of ASPECT prior to 3.08.04-s01
|
[] | 9.3 | 9.8 | null | null | null |
CVE-2021-4128
|
When transitioning in and out of fullscreen mode, a graphics object was not correctly protected; resulting in memory corruption and a potentially exploitable crash.<br>*This bug only affects Firefox on MacOS. Other operating systems are unaffected.*. This vulnerability affects Firefox < 95.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-vwc8-7rg6-jffc
|
Improper privilege management in Yugabyte Platform allows authenticated admin users to escalate privileges to SuperAdmin via a crafted PUT HTTP request, potentially leading to unauthorized access to sensitive system functions and data.
|
[] | 6 | null | null | null | null |
|
CVE-2007-0808
|
PHP remote file inclusion vulnerability in Mina Ajans Script allows remote attackers to execute arbitrary PHP code via a URL in the syf parameter to an unspecified PHP script.
|
[
"cpe:2.3:a:mina_ajans:mina_ajans_script:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-5g22-6w6r-pr2m
|
Thunderbird cached CORS preflight responses across IP address changes. This allowed circumventing CORS with DNS rebinding. This vulnerability affects Firefox < 141, Firefox ESR < 140.1, Thunderbird < 141, and Thunderbird < 140.1.
|
[] | null | 8.1 | null | null | null |
|
GHSA-gvhr-fq94-q7h9
|
If a Thunderbird user quoted from an HTML email, for example by replying to the email, and the email contained either a VIDEO tag with the POSTER attribute or an OBJECT tag with a DATA attribute, a network request to the referenced remote URL was performed, regardless of a configuration to block remote content. An image loaded from the POSTER attribute was shown in the composer window. These issues could have given an attacker additional capabilities when targetting releases that did not yet have a fix for CVE-2022-3033 which was reported around three months ago. This vulnerability affects Thunderbird < 102.5.1.
|
[] | null | 8.1 | null | null | null |
|
GHSA-3365-3gc3-3q8c
|
Cleartext Transmission issue in ROS2 (Robot Operating System 2) Foxy Fitzroy, with ROS_VERSION=2 and ROS_PYTHON_VERSION=3 allows attackers to access sensitive information via a man-in-the-middle attack.
|
[] | null | 5.9 | null | null | null |
|
GHSA-g9rr-59hx-4m93
|
Unspecified vulnerability in HP Rapid Deployment Pack (RDP) and Insight Control Server Deployment allows remote attackers to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2007-1710
|
The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.
|
[
"cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2022-49825
|
ata: libata-transport: fix error handling in ata_tport_add()
|
In the Linux kernel, the following vulnerability has been resolved:
ata: libata-transport: fix error handling in ata_tport_add()
In ata_tport_add(), the return value of transport_add_device() is
not checked. As a result, it causes null-ptr-deref while removing
the module, because transport_remove_device() is called to remove
the device that was not added.
Unable to handle kernel NULL pointer dereference at virtual address 00000000000000d0
CPU: 12 PID: 13605 Comm: rmmod Kdump: loaded Tainted: G W 6.1.0-rc3+ #8
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : device_del+0x48/0x39c
lr : device_del+0x44/0x39c
Call trace:
device_del+0x48/0x39c
attribute_container_class_device_del+0x28/0x40
transport_remove_classdev+0x60/0x7c
attribute_container_device_trigger+0x118/0x120
transport_remove_device+0x20/0x30
ata_tport_delete+0x34/0x60 [libata]
ata_port_detach+0x148/0x1b0 [libata]
ata_pci_remove_one+0x50/0x80 [libata]
ahci_remove_one+0x4c/0x8c [ahci]
Fix this by checking and handling return value of transport_add_device()
in ata_tport_add().
|
[] | null | null | null | null | null |
GHSA-9995-p9v8-cr26
|
Cross-site scripting (XSS) vulnerability in the web-based device management interface in Palo Alto Networks PAN-OS before 5.0.15, 5.1.x before 5.1.10, and 6.0.x before 6.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka Ref ID 64563.
|
[] | null | null | null | null | null |
|
GHSA-qmw2-mxpf-x4wp
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.16 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[] | null | 4.9 | null | null | null |
|
GHSA-736f-5x63-xxwq
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Udi Dollberg Add Chat App Button allows Stored XSS.This issue affects Add Chat App Button: from n/a through 2.1.5.
|
[] | null | 5.9 | null | null | null |
|
CVE-2022-21997
|
Windows Print Spooler Elevation of Privilege Vulnerability
|
Windows Print Spooler Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:sp1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
RHSA-2014:1725
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
|
Java: Java XML Signature DoS Attack
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | null | null | null |
GHSA-jw8x-6495-233v
|
scikit-learn sensitive data leakage vulnerability
|
A sensitive data leakage vulnerability was identified in scikit-learn's TfidfVectorizer, specifically in versions up to and including 1.4.1.post1, which was fixed in version 1.5.0. The vulnerability arises from the unexpected storage of all tokens present in the training data within the `stop_words_` attribute, rather than only storing the subset of tokens required for the TF-IDF technique to function. This behavior leads to the potential leakage of sensitive information, as the `stop_words_` attribute could contain tokens that were meant to be discarded and not stored, such as passwords or keys. The impact of this vulnerability varies based on the nature of the data being processed by the vectorizer.
|
[] | null | null | 5.3 | null | null |
RHSA-2023:1049
|
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.2 security update
|
bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method jquery: Untrusted code execution via <option> tag in HTML passed to DOM manipulation methods glob-parent: Regular Expression Denial of Service minimist: prototype pollution keycloak: HTML injection in execute-actions-email Admin REST API keycloak: XSS on impersonation under specific circumstances SnakeYaml: Constructor Deserialization Remote Code Execution Adapter: Open redirect vulnerability in checkSSO Undertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations keycloak: path traversal via double URL encoding keycloak: Session takeover with OIDC offline refreshtokens keycloak: reflected XSS attack Moment.js: Path traversal in moment.locale snakeyaml: Denial of Service due to missing nested depth limitation for collections moment: inefficient parsing algorithm resulting in DoS loader-utils: Regular expression denial of service snakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode snakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject snakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match jettison: parser crash by stackoverflow jettison: memory exhaustion via user-supplied XML or JSON data jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS jackson-databind: use of deeply nested arrays mina-sshd: Java unsafe deserialization vulnerability jettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos json5: Prototype Pollution in JSON5 via Parse Method CXF: directory listing / code exfiltration CXF: SSRF Vulnerability keycloak: Client Registration endpoint does not check token revocation keycloak: user impersonation via stolen uuid code
|
[
"cpe:/a:redhat:red_hat_single_sign_on:7.6"
] | null | 4.6 | 5.6 | null | null |
CVE-2012-3919
|
The Cisco Application Control Engine (ACE) module 3.0 for Cisco Catalyst switches and Cisco routers does not properly monitor Load Balancer (LB) queues, which allows remote attackers to cause a denial of service (incorrect memory access and module reboot) via application traffic, aka Bug ID CSCtw70879.
|
[
"cpe:2.3:a:cisco:application_control_engine_module:3.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-gr8x-8q27-r5gg
|
In the Linux kernel, the following vulnerability has been resolved:ALSA: caiaq: Use snd_card_free_when_closed() at disconnectionThe USB disconnect callback is supposed to be short and not too-long
waiting. OTOH, the current code uses snd_card_free() at
disconnection, but this waits for the close of all used fds, hence it
can take long. It eventually blocks the upper layer USB ioctls, which
may trigger a soft lockup.An easy workaround is to replace snd_card_free() with
snd_card_free_when_closed(). This variant returns immediately while
the release of resources is done asynchronously by the card device
release at the last close.This patch also splits the code to the disconnect and the free phases;
the former is called immediately at the USB disconnect callback while
the latter is called from the card destructor.
|
[] | null | null | null | null | null |
|
CVE-2024-9340
|
Denial of Service (DoS) via Multipart Boundary in zenml-io/zenml
|
A Denial of Service (DoS) vulnerability in zenml-io/zenml version 0.66.0 allows unauthenticated attackers to cause excessive resource consumption by sending malformed multipart requests with arbitrary characters appended to the end of multipart boundaries. This flaw in the multipart request boundary processing mechanism leads to an infinite loop, resulting in a complete denial of service for all users. Affected endpoints include `/api/v1/login` and `/api/v1/device_authorization`.
|
[] | null | null | 7.5 | null | null |
CVE-2014-0082
|
actionpack/lib/action_view/template/text.rb in Action View in Ruby on Rails 3.x before 3.2.17 converts MIME type strings to symbols during use of the :text option to the render method, which allows remote attackers to cause a denial of service (memory consumption) by including these strings in headers.
|
[
"cpe:2.3:a:rubyonrails:rails:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:rc:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.1:pre:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.2:pre:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.6:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.7:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.8:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.9:rc5:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc7:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.0:rc8:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.1:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.13:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.13:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:rails:3.2.15:rc3:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.14:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubyonrails:ruby_on_rails:3.2.15:rc2:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-xwrf-hhx9-vmhv
|
In the Linux kernel, the following vulnerability has been resolved:RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requestsThe FSM can run in a circle allowing rdma_resolve_ip() to be called twice
on the same id_priv. While this cannot happen without going through the
work, it violates the invariant that the same address resolution
background request cannot be active twice.rdma_resolve_addr():
RDMA_CM_IDLE -> RDMA_CM_ADDR_QUERY
rdma_resolve_ip(addr_handler) #1rdma_resolve_addr():
RDMA_CM_ADDR_BOUND -> RDMA_CM_ADDR_QUERY
rdma_resolve_ip(addr_handler)
!! two requests are now on the req_listrdma_destroy_id():
destroy_id_handler_unlock():
_destroy_id():
cma_cancel_operation():
rdma_addr_cancel()kfree(id_priv)rdma_addr_cancel() expects there to be one req on the list and only
cancels the first one. The self-removal behavior of the work only happens
after the handler has returned. This yields a situations where the
req_list can have two reqs for the same "handle" but rdma_addr_cancel()
only cancels the first one.The second req remains active beyond rdma_destroy_id() and will
use-after-free id_priv once it inevitably triggers.Fix this by remembering if the id_priv has called rdma_resolve_ip() and
always cancel before calling it again. This ensures the req_list never
gets more than one item in it and doesn't cost anything in the normal flow
that never uses this strange error path.
|
[] | null | null | null | null | null |
|
GHSA-q9r9-wcrf-w72p
|
SQL injection vulnerability in default.asp in ASPintranet, possibly 1.2, allows remote attackers to execute arbitrary SQL commands via the a parameter.
|
[] | null | null | null | null | null |
|
GHSA-xrpf-8365-6mrj
|
Adobe Animate versions 22.0.8 (and earlier) and 23.0.0 (and earlier) are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
ICSA-18-095-03
|
LCDS - Leão Consultoria e Desenvolvimento de Sistemas Ltda ME LAquis SCADA
|
A structured exception handler overflow vulnerability has been identified that may allow code execution. CVE-2018-5463 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been calculated; the CVSS vector string is (AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H).
|
[] | null | null | 7 | null | null |
GHSA-f6pg-fw4f-f5v9
|
Cross-site scripting (XSS) vulnerability in the listonlineusers (aka "Who's online") component in mvnForum before 1.2.1 GA allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.
|
[] | null | null | null | null | null |
|
GHSA-5mph-j4pc-j2jr
|
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
|
[] | null | null | null | null | null |
|
RHSA-2022:0161
|
Red Hat Security Advisory: java-17-openjdk security update
|
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Incorrect reading of TIFF files in TIFFNullDecompressor (ImageIO, 8270952) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incorrect marking of writeable fields (Hotspot, 8270386) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) OpenJDK: Excessive memory allocation in TIFF*Decompressor (ImageIO, 8274096)
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null | null |
GHSA-fhm3-85qw-2fgx
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal Piwik PRO allows Cross-Site Scripting (XSS).This issue affects Piwik PRO: from 0.0.0 before 1.3.2.
|
[] | null | 4.8 | null | null | null |
|
CVE-2015-1762
|
Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka "SQL Server Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:sql_server:2008:r2_sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:r2_sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2008:sp4:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2012:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2012:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2014:*:*:*:*:*:*:*"
] | null | null | null | 7.1 | null |
|
GHSA-m87q-vm9x-pfmr
|
Unspecified vulnerability in Cisco Security Agent 5.2 before 5.2.0.285, when running on Linux, allows remote attackers to cause a denial of service (kernel panic) via "a series of TCP packets."
|
[] | null | null | null | null | null |
|
CVE-2005-4631
|
SQL injection vulnerability in index.php in Zina 0.12.07 and earlier allows remote attackers to execute arbitrary SQL commands via the p parameter.
|
[
"cpe:2.3:a:ryan_lath:zina:0.09.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.09.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.03:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.04:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.05:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.06:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.07:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.08:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.09:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.24:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.26:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.10.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.03:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.04:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.05:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.06:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.07:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.08:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.09:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.16:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.18:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.20:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.11.22:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.01:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.02:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.03:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.04:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.05:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.06:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_lath:zina:0.12.07:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-69mj-v9gr-ph5p
|
Multiple OS command injection vulnerabilities exist in the adm.cgi sch_reboot() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to a arbitrary code execution. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.A command injection vulnerability exists in the `restart_min` POST parameter.
|
[] | null | 9.1 | null | null | null |
|
GHSA-9vw2-7m33-r6hw
|
Mozilla Firefox before 2.0.0.10 and SeaMonkey before 1.1.7 sets the Referer header to the window or frame in which script is running, instead of the address of the content that initiated the script, which allows remote attackers to spoof HTTP Referer headers and bypass Referer-based CSRF protection schemes by setting window.location and using a modal alert dialog that causes the wrong Referer to be sent.
|
[] | null | null | null | null | null |
|
CVE-2019-1673
|
Cisco Identity Services Engine Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. For information about fixed software releases, consult the Cisco bug ID at https://quickview.cloudapps.cisco.com/quickview/bug/CSCvn64652. When considering software upgrades, customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories and Alerts page, to determine exposure and a complete upgrade solution.
|
[
"cpe:2.3:a:cisco:identity_services_engine:2.5\\(0.353\\):*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
GHSA-9766-v29c-4vm7
|
Apache Airflow ODBC Provider Argument Injection vulnerability
|
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') vulnerability in Apache Software Foundation Apache Airflow ODBC Provider.
In OdbcHook, A privilege escalation vulnerability exists in a system due to controllable ODBC driver parameters that allow the loading of arbitrary dynamic-link libraries, resulting in command execution.
Starting version 4.0.0 driver can be set only from the hook constructor.
This issue affects Apache Airflow ODBC Provider: before 4.0.0.
|
[] | null | 7.8 | null | null | null |
GHSA-249j-6h9f-vfjw
|
In nopCommerce 4.50.1, an open redirect vulnerability can be triggered by luring a user to authenticate to a nopCommerce page by clicking on a crafted link.
|
[] | null | 6.1 | null | null | null |
|
CVE-2022-39882
|
Heap overflow vulnerability in sflacf_fal_bytes_peek function in libsmat.so library prior to SMR Nov-2022 Release 1 allows local attacker to execute arbitrary code.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
GHSA-7qp6-c6xr-wmfc
|
A vulnerability, which was classified as critical, was found in ACI_Escola. This affects an unknown part. The manipulation leads to sql injection. The name of the patch is 34eed1f7b9295d1424912f79989d8aba5de41e9f. It is recommended to apply a patch to fix this issue. The identifier VDB-217965 was assigned to this vulnerability.
|
[] | null | 9.8 | null | null | null |
|
CVE-2021-44540
|
A vulnerability was found in Privoxy which was fixed in get_url_spec_param() by freeing memory of compiled pattern spec before bailing.
|
[
"cpe:2.3:a:privoxy:privoxy:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
RHSA-2010:0101
|
Red Hat Security Advisory: openoffice.org security update
|
openoffice.org: integer overflow in XPM processing openoffice.org: GIF file parsing heap overflow OpenOffice.org Word sprmTDefTable Memory Corruption OpenOffice.org Word sprmTSetBrc Memory Corruption
|
[
"cpe:/a:redhat:rhel_productivity:5",
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation"
] | null | null | null | null | null |
GHSA-6pgw-6qm8-r947
|
The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
|
[] | null | null | null | null | null |
|
GHSA-ggpj-rxm8-6gjv
|
Buffer Overflow vulnerability in free5gc 3.3.0 allows attackers to cause a denial of service via crafted PFCP messages whose Sequence Number is mutated to overflow bytes.
|
[] | null | 7.5 | null | null | null |
|
GHSA-f9p6-65gj-r6fx
|
Multiple cross-site request forgery (CSRF) vulnerabilities in math-comment-spam-protection.php in the Math Comment Spam Protection 2.1 and earlier plugin for WordPress allow remote attackers to perform actions as administrators via the (1) mcsp_opt_msg_no_answer or (2) mcsp_opt_msg_wrong_answer parameter to wp-admin/options-general.php.
|
[] | null | null | null | null | null |
|
CVE-2023-35644
|
Windows Sysmain Service Elevation of Privilege Vulnerability
|
Windows Sysmain Service Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2014-7358
|
The Vermont Powder (aka com.concursive.vermontpowder) application 4.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:concursive:vermont_powder:4.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
CVE-2022-46255
|
Improper Limitation of a Pathname to a Restricted Directory in GitHub Enterprise Server leading to RCE
|
An improper limitation of a pathname to a restricted directory vulnerability was identified in GitHub Enterprise Server that enabled remote code execution. A check was added within Pages to ensure the working directory is clean before unpacking new content to prevent an arbitrary file overwrite bug. This vulnerability affected only version 3.7.0 of GitHub Enterprise Server and was fixed in version 3.7.1. This vulnerability was reported via the GitHub Bug Bounty program.
|
[
"cpe:2.3:a:github:enterprise_server:3.7.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-v8mv-252p-7ff9
|
Unspecified vulnerability in the Java VM component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4294, CVE-2014-4295, and CVE-2014-6538.
|
[] | null | null | null | null | null |
|
CVE-2023-1509
|
The GMAce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.2. This is due to missing nonce validation on the gmace_manager_server function called via the wp_ajax_gmace_manager AJAX action. This makes it possible for unauthenticated attackers to modify arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:gmace_project:gmace:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-xj4g-47qc-vhww
|
The Mega Main Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via some of its settings parameters in versions up to, and including, 2.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[] | null | 4.8 | null | null | null |
|
GHSA-mq6x-qhcj-q6rv
|
Windows TCP/IP Driver Denial of Service Vulnerability This CVE ID is unique from CVE-2021-33772, CVE-2021-34490.
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-46482
|
WordPress WP Quiz plugin <= 2.0.10 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MyThemeShop WP Quiz allows Stored XSS.This issue affects WP Quiz: from n/a through 2.0.10.
|
[] | null | 6.5 | null | null | null |
CVE-2007-5743
|
viewvc 1.0.3 allows improper access control to files in a repository when using the "forbidden" configuration option.
|
[
"cpe:2.3:a:viewvc:viewvc:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 4.3 | null |
|
CVE-2021-36172
|
An improper restriction of XML external entity reference vulnerability in the parser of XML responses of FortiPortal before 6.0.6 may allow an attacker who controls the producer of XML reports consumed by FortiPortal to trigger a denial of service or read arbitrary files from the underlying file system by means of specifically crafted XML documents.
|
[
"cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
|
CVE-2021-26566
|
Insertion of sensitive information into sent data vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary commands via inbound QuickConnect traffic.
|
[
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:vs960hd_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:vs960hd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:skynas_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:skynas:-:*:*:*:*:*:*:*",
"cpe:2.3:o:synology:diskstation_manager_unified_controller:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:synology:uc3200:-:*:*:*:*:*:*:*"
] | null | 8.3 | null | null | null |
|
GHSA-xrcr-w67r-mpp3
|
writtercontrol in cdcontrol 1.90 allows local users to overwrite arbitrary files via a symlink attack on /tmp/v-recorder*-out temporary files.
|
[] | null | null | null | null | null |
|
GHSA-cq39-vcf9-rvc3
|
Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[] | null | null | null | null | null |
|
RHSA-2024:8170
|
Red Hat Security Advisory: fence-agents security update
|
pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
|
[
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::highavailability",
"cpe:/a:redhat:rhel_tus:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::highavailability"
] | null | 8.8 | null | null | null |
CVE-2019-0111
|
Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access.
|
[
"cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.