id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2025-21479
|
Incorrect Authorization in Graphics
|
Memory corruption due to unauthorized command execution in GPU micronode while executing specific sequence of commands.
|
[] |
GHSA-589q-f3gp-p53f
|
libvips before 8.7.4 generates output images from uninitialized memory locations when processing corrupted input image data because iofuncs/memory.c does not zero out allocated memory. This can result in leaking raw process memory contents through the output image.
|
[] |
|
GHSA-hqcj-mm82-w3pc
|
The SD-WAN Orchestrator 3.3.2 prior to 3.3.2 P3, 3.4.x prior to 3.4.4, and 4.0.x prior to 4.0.1 allows for executing files through directory traversal. An authenticated SD-WAN Orchestrator user is able to traversal directories which may lead to code execution of files.
|
[] |
|
CVE-2017-2503
|
An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "Intel Graphics Driver" component. It allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-jqxf-f2x7-9g34
|
A Use of Uninitialized Resource vulnerability in the Border Gateway Protocol (BGP) software of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker to send specific genuine BGP packets to a device configured with BGP to cause a Denial of Service (DoS) by crashing the Routing Protocol Daemon (rpd). This issue is triggered when the packets attempt to initiate a BGP connection before a BGP session is successfully established. Continued receipt of these specific BGP packets will cause a sustained Denial of Service condition. This issue is triggerable in both iBGP and eBGP deployments. This issue affects: Juniper Networks Junos OS 21.1 version 21.1R1 and later versions prior to 21.1R3-S5; 21.2 version 21.2R1 and later versions prior to 21.2R3-S2; 21.3 version 21.3R1 and later versions prior to 21.3R3-S2; 21.4 versions prior to 21.4R3; 22.1 versions prior to 22.1R3; 22.2 versions prior to 22.2R2. This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1. This issue affects: Juniper Networks Junos OS Evolved 21.1-EVO version 21.1R1-EVO and later versions prior to 21.4R3-EVO; 22.1-EVO versions prior to 22.1R3-EVO; 22.2-EVO versions prior to 22.2R2-EVO. This issue does not affect Juniper Networks Junos OS Evolved versions prior to 21.1R1-EVO.
|
[] |
|
CVE-2023-50700
|
Insecure Permissions vulnerability in Deepin dde-file-manager 6.0.54 and earlier allows privileged operations to be called by unprivileged users via the D-Bus method.
|
[
"cpe:2.3:a:deepin:dde_file_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2016-1696
|
The extensions subsystem in Google Chrome before 51.0.2704.79 does not properly restrict bindings access, which allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise:12.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-36642
|
An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiTester 3.0.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.
|
[
"cpe:2.3:a:fortinet:fortitester:*:*:*:*:*:*:*:*"
] |
|
GHSA-f2wv-jxwv-hgfp
|
Anne-AL00 Huawei phones with versions earlier than 8.0.0.151(C00) have an information leak vulnerability. Due to improper permission settings for specific commands, attackers who can connect to a mobile phone via the USB interface may exploit this vulnerability to obtain specific device information of the mobile phone.
|
[] |
|
GHSA-2hwq-42hc-rhqv
|
In the Linux kernel, the following vulnerability has been resolved:net: usb: lan78xx: Fix double free issue with interrupt buffer allocationIn lan78xx_probe(), the buffer `buf` was being freed twice: once
implicitly through `usb_free_urb(dev->urb_intr)` with the
`URB_FREE_BUFFER` flag and again explicitly by `kfree(buf)`. This caused
a double free issue.To resolve this, reordered `kmalloc()` and `usb_alloc_urb()` calls to
simplify the initialization sequence and removed the redundant
`kfree(buf)`. Now, `buf` is allocated after `usb_alloc_urb()`, ensuring
it is correctly managed by `usb_fill_int_urb()` and freed by
`usb_free_urb()` as intended.
|
[] |
|
GHSA-g4xm-ww43-jwfq
|
Information Exposure Through Query Strings in GET Request vulnerability in LMM API of Secomea GateManager allows system administrator to hijack connection. This issue affects: Secomea GateManager all versions prior to 9.7.
|
[] |
|
CVE-2021-24457
|
Portfolio Responsive Gallery < 1.1.8 - Authenticated Blind SQL Injections
|
The get_portfolios() and get_portfolio_attributes() functions in the class-portfolio-responsive-gallery-list-table.php and class-portfolio-responsive-gallery-attributes-list-table.php files of the Portfolio Responsive Gallery WordPress plugin before 1.1.8 did not use whitelist or validate the orderby parameter before using it in SQL statements passed to the get_results() DB calls, leading to SQL injection issues in the admin dashboard
|
[
"cpe:2.3:a:ays-pro:portfolio_responsive_gallery:*:*:*:*:*:wordpress:*:*"
] |
GHSA-f2w3-xfxp-69cq
|
Directory traversal vulnerability in the Code-Garage NoticeBoard (com_noticeboard) component 1.3 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
[] |
|
CVE-2018-11685
|
Liblouis 3.5.0 has a stack-based Buffer Overflow in the function compileHyphenation in compileTranslationTable.c.
|
[
"cpe:2.3:a:liblouis:liblouis:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"
] |
|
CVE-2016-7281
|
The Web Workers implementation in Microsoft Internet Explorer 10 and 11 and Microsoft Edge allows remote attackers to bypass the Same Origin Policy via unspecified vectors, aka "Microsoft Browser Security Feature Bypass Vulnerability."
|
[
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] |
|
GHSA-8m45-p293-9xvp
|
In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu/mes: fix use-after-free issueDelete fence fallback timer to fix the ramdom
use-after-free issue.v2: move to amdgpu_mes.c
|
[] |
|
CVE-2021-35523
|
Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user.
|
[
"cpe:2.3:a:securepoint:openvpn-client:*:*:*:*:*:windows:*:*"
] |
|
GHSA-v47v-hq34-79pq
|
Multiple cross-site scripting (XSS) vulnerabilities in Cumin before r5238 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) widgets or (2) pages.
|
[] |
|
CVE-2013-7070
|
The handle_request function in lib/HTTPServer.pm in Monitorix before 3.3.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the URI.
|
[
"cpe:2.3:a:fibranet:monitorix:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-7537
|
A CWE-754: Improper Check for Unusual or Exceptional Conditions vulnerability exists in Modicon M580, Modicon M340, Legacy Controllers Modicon Quantum & Modicon Premium (see security notifications for affected versions), that could cause denial of service when a specially crafted Read Physical Memory request over Modbus is sent to the controller.
|
[
"cpe:2.3:o:schneider-electric:modicon_m580_bmep584040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep582040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep586040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep586040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep585040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep585040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep582020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep582020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep581020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep581020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep584020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep584020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep583040_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep583040:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m580_bmep583020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m580_bmep583020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp341000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp341000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp342000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp3420102_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420102:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp3420102cl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420102cl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp342020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp342020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp3420302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:modicon_m340_bmxp3420302cl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:modicon_m340_bmxp3420302cl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp574634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp574634:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp575634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp575634:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:tsxp576634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:tsxp576634:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-36327
|
Integer Overflow vulnerability in RELIC before commit 421f2e91cf2ba42473d4d54daf24e295679e290e, allows attackers to execute arbitrary code and cause a denial of service in pos argument in bn_get_prime function.
|
[
"cpe:2.3:a:relic_project:relic:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-29534
|
An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*"
] |
|
CVE-2024-57874
|
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
|
In the Linux kernel, the following vulnerability has been resolved:
arm64: ptrace: fix partial SETREGSET for NT_ARM_TAGGED_ADDR_CTRL
Currently tagged_addr_ctrl_set() doesn't initialize the temporary 'ctrl'
variable, and a SETREGSET call with a length of zero will leave this
uninitialized. Consequently tagged_addr_ctrl_set() will consume an
arbitrary value, potentially leaking up to 64 bits of memory from the
kernel stack. The read is limited to a specific slot on the stack, and
the issue does not provide a write mechanism.
As set_tagged_addr_ctrl() only accepts values where bits [63:4] zero and
rejects other values, a partial SETREGSET attempt will randomly succeed
or fail depending on the value of the uninitialized value, and the
exposure is significantly limited.
Fix this by initializing the temporary value before copying the regset
from userspace, as for other regsets (e.g. NT_PRSTATUS, NT_PRFPREG,
NT_ARM_SYSTEM_CALL). In the case of a zero-length write, the existing
value of the tagged address ctrl will be retained.
The NT_ARM_TAGGED_ADDR_CTRL regset is only visible in the
user_aarch64_view used by a native AArch64 task to manipulate another
native AArch64 task. As get_tagged_addr_ctrl() only returns an error
value when called for a compat task, tagged_addr_ctrl_get() and
tagged_addr_ctrl_set() should never observe an error value from
get_tagged_addr_ctrl(). Add a WARN_ON_ONCE() to both to indicate that
such an error would be unexpected, and error handlnig is not missing in
either case.
|
[] |
CVE-2017-2854
|
An exploitable buffer overflow vulnerability exists in the DDNS client used by the Foscam C1 Indoor HD Camera running application firmware 2.52.2.43. On devices with DDNS enabled, an attacker who is able to intercept HTTP connections will be able to fully compromise the device by creating a rogue HTTP server.
|
[
"cpe:2.3:o:foscam:c1_firmware:2.52.2.43:*:*:*:*:*:*:*",
"cpe:2.3:h:foscam:c1:-:*:*:*:*:*:*:*"
] |
|
GHSA-28xh-chph-8x29
|
In the Linux kernel, the following vulnerability has been resolved:ipv6: sr: fix missing sk_buff release in seg6_input_coreThe seg6_input() function is responsible for adding the SRH into a
packet, delegating the operation to the seg6_input_core(). This function
uses the skb_cow_head() to ensure that there is sufficient headroom in
the sk_buff for accommodating the link-layer header.
In the event that the skb_cow_header() function fails, the
seg6_input_core() catches the error but it does not release the sk_buff,
which will result in a memory leak.This issue was introduced in commit af3b5158b89d ("ipv6: sr: fix BUG due
to headroom too small after SRH push") and persists even after commit
7a3f5b0de364 ("netfilter: add netfilter hooks to SRv6 data plane"),
where the entire seg6_input() code was refactored to deal with netfilter
hooks.The proposed patch addresses the identified memory leak by requiring the
seg6_input_core() function to release the sk_buff in the event that
skb_cow_head() fails.
|
[] |
|
CVE-2016-2167
|
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
|
[
"cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:subversion:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:subversion:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:subversion:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:subversion:1.9.3:*:*:*:*:*:*:*"
] |
|
GHSA-rgh7-4fqj-whg8
|
The Jibu Pro plugin through 1.7 for WordPress is prone to Stored XSS via the wp-content/plugins/jibu-pro/quiz_action.php name (aka Quiz Name) field.
|
[] |
|
CVE-2019-7820
|
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-30297
|
An issue found in N-able Technologies N-central Server before 2023.4 allows a local attacker to execute arbitrary code via the monitoring function of the server.
|
[
"cpe:2.3:a:n-able:n-central:*:*:*:*:*:*:*:*"
] |
|
GHSA-mxfh-pj5j-6v79
|
TELSAT marKoni FM Transmitters are vulnerable to an attacker bypassing authentication and gaining administrator privileges.
|
[] |
|
GHSA-5h6q-r5r5-mg4f
|
A information disclosure vulnerability in the Android media framework (n/a). Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0. Android ID: A-38496660.
|
[] |
|
CVE-2019-12842
|
A reflected XSS on a user page was detected on one of the JetBrains TeamCity pages. The issue was fixed in TeamCity 2018.2.2.
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] |
|
GHSA-h5c2-7x24-65j2
|
Former before 4.2.1 has XSS via a checkbox value.
|
[] |
|
GHSA-p48m-987f-62rc
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Parser). Supported versions that are affected are 8.0.0-8.0.41, 8.4.0-8.4.4 and 9.0.0-9.2.0. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[] |
|
CVE-2024-49305
|
WordPress Customer Email Verification for WooCommerce plugin <= 2.8.10 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPFactory Email Verification for WooCommerce allows SQL Injection.This issue affects Email Verification for WooCommerce: from n/a through 2.8.10.
|
[
"cpe:2.3:a:wpfactory:customer_email_verification_for_woocommerce:*:*:*:*:*:*:*:*"
] |
GHSA-4j5j-2gqc-53xf
|
Pleasanter 1.3.49.0 and earlier contains a cross-site scripting vulnerability. If an attacker tricks the user to access the product with a specially crafted URL and perform a specific operation, an arbitrary script may be executed on the web browser of the user.
|
[] |
|
CVE-2025-39370
|
WordPress iCafe Library plugin <= 1.8.3 - SQL Injection vulnerability
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cnilsson iCafe Library allows SQL Injection.This issue affects iCafe Library: from n/a through 1.8.3.
|
[] |
GHSA-3h4g-vcc2-xxf3
|
A vulnerability in the Cloud Connect component of Cisco Unified Contact Center Enterprise (CCE) could allow an unauthenticated, remote attacker to read and modify data on an affected device.This vulnerability is due to a lack of proper authentication controls. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port on an affected device. A successful exploit could allow the attacker to read or modify data on the affected device.
|
[] |
|
GHSA-3w3f-3cww-g2w5
|
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "UserProperties.jsp" has reflected XSS via the ConnPoolName parameter.
|
[] |
|
CVE-2016-10598
|
arrayfire-js is a module for ArrayFire for the Node.js platform. arrayfire-js downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
|
[
"cpe:2.3:a:arrayfire-js_project:arrayfire-js:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2025-4454
|
D-Link DIR-619L wake_on_lan command injection
|
A vulnerability was found in D-Link DIR-619L 2.04B04. It has been declared as critical. This vulnerability affects the function wake_on_lan. The manipulation of the argument mac leads to command injection. The attack can be initiated remotely. The vendor was contacted early about this disclosure. This vulnerability only affects products that are no longer supported by the maintainer.
|
[] |
GHSA-v8h5-6h8p-g3mg
|
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.
|
[] |
|
GHSA-ff57-x569-33pf
|
An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
|
[] |
|
GHSA-9gmv-xq53-rfp2
|
In multiple CODESYS products, a low privileged remote attacker may craft a request, which cause an out-of-bounds read, resulting in a denial-of-service condition. User Interaction is not required.
|
[] |
|
GHSA-wx8h-4c3p-x6w4
|
Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_facet() fh->boundary_entry_objects SEdge_of.
|
[] |
|
CVE-2023-3005
|
SourceCodester Local Service Search Engine Management System POST Parameter cross site scripting
|
A vulnerability, which was classified as problematic, was found in SourceCodester Local Service Search Engine Management System 1.0. This affects an unknown part of the file /admin/ajax.php?action=save_area of the component POST Parameter Handler. The manipulation of the argument area with the input <script>alert(document.cookie)</script> leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230349 was assigned to this vulnerability.
|
[
"cpe:2.3:a:local_service_search_engine_management_system_project:local_service_search_engine_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2003-0021
|
The "screen dump" feature in Eterm 0.9.1 and earlier allows attackers to overwrite arbitrary files via a certain character escape sequence when it is echoed to a user's terminal, e.g. when the user views a file containing the malicious sequence.
|
[
"cpe:2.3:a:michael_jennings:eterm:0.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:michael_jennings:eterm:0.9.1:*:*:*:*:*:*:*"
] |
|
GHSA-238p-6hwv-xg8g
|
Multiple cross-site scripting (XSS) vulnerabilities in checkout.php in Avactis Shopping Cart 1.8.0 and 1.8.1 allow remote attackers to inject arbitrary web script or HTML via the (1) step_id and (2) CHECKOUT_CZ_BLOWFISH_KEY parameters.
|
[] |
|
CVE-2022-23791
|
XSS in Firmanet Software and Technology Customer Relation Manager
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Firmanet Software and Technology Customer Relation Manager allows Cross-Site Scripting (XSS).This issue affects Customer Relation Manager: before 2022.03.13.
|
[
"cpe:2.3:a:firmanet:customer_relation_manager:*:*:*:*:*:*:*:*"
] |
GHSA-j22w-7r9x-5g74
|
Cross-Site Scripting (XSS) vulnerability in School Event Management System affecting version 1.0. An attacker could exploit this vulnerability by sending a specially crafted javascript payload to an authenticated user and partially take over their browser session via the 'eventdate' and 'events' parameters in 'port/event_print.php'.
|
[] |
|
GHSA-6777-268g-6hp5
|
A vulnerability was found in South River WebDrive 18.00.5057. It has been declared as problematic. This vulnerability affects unknown code of the component New Secure WebDAV. The manipulation leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-252682 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] |
|
CVE-2024-42425
|
Dell Precision Rack, 14G Intel BIOS versions prior to 2.22.2, contains an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
|
[
"cpe:2.3:o:dell:precision_7920_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:precision_7920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:7920_xl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dell:7920_xl:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-49575
|
Citizen allows stored XSS in Command Palette tip messages
|
Citizen is a MediaWiki skin that makes extensions part of the cohesive experience. Multiple system messages are inserted into the CommandPaletteFooter as raw HTML, allowing anybody who can edit those messages to insert arbitrary HTML into the DOM. This impacts wikis where a group has the `editinterface` but not the `editsitejs` user right. This vulnerability is fixed in 3.3.1.
|
[] |
GHSA-5gj5-pjhv-qqc6
|
Selesta Visual Access Manager < 4.42.2 is vulnerable to Cross Site Scripting (XSS) via vam/vam_visits.php.
|
[] |
|
GHSA-p7j7-98vm-rqxh
|
The add_del_listener function in kernel/taskstats.c in the Linux kernel 2.6.39.1 and earlier does not prevent multiple registrations of exit handlers, which allows local users to cause a denial of service (memory and CPU consumption), and bypass the OOM Killer, via a crafted application.
|
[] |
|
GHSA-g2w8-vghw-669g
|
zzcms 2019 has XSS via an arbitrary user/ask.php?do=modify parameter because inc/stopsqlin.php does not block a mixed-case string such as sCrIpT.
|
[] |
|
GHSA-5h45-vp7g-6r9g
|
Use-after-free vulnerability in Adobe Photoshop CS5 12.x before 12.0.5 and CS5.1 12.1.x before 12.1.1 allows remote attackers to execute arbitrary code via a crafted TIFF (aka .TIF) file.
|
[] |
|
CVE-2025-21732
|
RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
|
In the Linux kernel, the following vulnerability has been resolved:
RDMA/mlx5: Fix a race for an ODP MR which leads to CQE with error
This patch addresses a race condition for an ODP MR that can result in a
CQE with an error on the UMR QP.
During the __mlx5_ib_dereg_mr() flow, the following sequence of calls
occurs:
mlx5_revoke_mr()
mlx5r_umr_revoke_mr()
mlx5r_umr_post_send_wait()
At this point, the lkey is freed from the hardware's perspective.
However, concurrently, mlx5_ib_invalidate_range() might be triggered by
another task attempting to invalidate a range for the same freed lkey.
This task will:
- Acquire the umem_odp->umem_mutex lock.
- Call mlx5r_umr_update_xlt() on the UMR QP.
- Since the lkey has already been freed, this can lead to a CQE error,
causing the UMR QP to enter an error state [1].
To resolve this race condition, the umem_odp->umem_mutex lock is now also
acquired as part of the mlx5_revoke_mr() scope. Upon successful revoke,
we set umem_odp->private which points to that MR to NULL, preventing any
further invalidation attempts on its lkey.
[1] From dmesg:
infiniband rocep8s0f0: dump_cqe:277:(pid 0): WC error: 6, Message: memory bind operation error
cqe_dump: 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
cqe_dump: 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
cqe_dump: 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
cqe_dump: 00000030: 00 00 00 00 08 00 78 06 25 00 11 b9 00 0e dd d2
WARNING: CPU: 15 PID: 1506 at drivers/infiniband/hw/mlx5/umr.c:394 mlx5r_umr_post_send_wait+0x15a/0x2b0 [mlx5_ib]
Modules linked in: ip6table_mangle ip6table_natip6table_filter ip6_tables iptable_mangle xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcgss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi rdma_cm iw_cm ib_umad ib_ipoib ib_cm mlx5_ib ib_uverbs ib_core fuse mlx5_core
CPU: 15 UID: 0 PID: 1506 Comm: ibv_rc_pingpong Not tainted 6.12.0-rc7+ #1626
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:mlx5r_umr_post_send_wait+0x15a/0x2b0 [mlx5_ib]
[..]
Call Trace:
<TASK>
mlx5r_umr_update_xlt+0x23c/0x3e0 [mlx5_ib]
mlx5_ib_invalidate_range+0x2e1/0x330 [mlx5_ib]
__mmu_notifier_invalidate_range_start+0x1e1/0x240
zap_page_range_single+0xf1/0x1a0
madvise_vma_behavior+0x677/0x6e0
do_madvise+0x1a2/0x4b0
__x64_sys_madvise+0x25/0x30
do_syscall_64+0x6b/0x140
entry_SYSCALL_64_after_hwframe+0x76/0x7e
|
[] |
GHSA-5vjc-qx43-r747
|
Stored Cross-site Scripting in folder-auth plugin
|
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.Folder-based Authorization Strategy Plugin 1.4 escapes the names of roles shown on the configuration form.See https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646
|
[] |
GHSA-58rj-c7p7-f4h9
|
Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information.
|
[] |
|
GHSA-w879-475f-rqqc
|
A denial of service vulnerability in Juniper Networks NorthStar Controller Application prior to version 2.1.0 Service Pack 1 may allow an unauthenticated, local user, to create a fork bomb scenario, also known as a rabbit virus, or wabbit, which will create processes that replicate themselves, until all resources are consumed on the system, leading to a denial of service to the entire system until it is restarted. Continued attacks by an unauthenticated, local user, can lead to persistent denials of services.
|
[] |
|
CVE-2018-9999
|
In Zulip Server versions before 1.7.2, there was an XSS issue with user uploads and the (default) LOCAL_UPLOADS_DIR storage backend.
|
[
"cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-32983
|
Knot Resolver through 5.5.1 may allow DNS cache poisoning when there is an attempt to limit forwarding actions by filters.
|
[
"cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-31924
|
WordPress Crafts & Arts <= 2.5 - PHP Object Injection Vulnerability
|
Deserialization of Untrusted Data vulnerability in designthemes Crafts & Arts allows Object Injection. This issue affects Crafts & Arts: from n/a through 2.5.
|
[] |
GHSA-c92g-p5cr-cr59
|
FFmpeg git master before commit c08d30 was discovered to contain a NULL pointer dereference via the component libavformat/mov.c.
|
[] |
|
GHSA-875q-xvh4-w483
|
RIOT-OS 2021.01 contains a buffer overflow vulnerability in /sys/net/gnrc/routing/rpl/gnrc_rpl_control_messages.c through the _parse_options() function.
|
[] |
|
GHSA-h35x-g9m3-w82q
|
Buffer overflow in BrowseFTP 1.62 client allows remote FTP servers to execute arbitrary code via a long FTP "220" message reply.
|
[] |
|
CVE-2014-1894
|
Multiple integer overflows in unspecified suboperations in the flask hypercall in Xen 3.2.x and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1893.
|
[
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2011-0453
|
F-Secure Internet Gatekeeper for Linux 3.x before 3.03 does not require authentication for reading access logs, which allows remote attackers to obtain potentially sensitive information via a TCP session on the admin UI port.
|
[
"cpe:2.3:a:f-secure:internet_gatekeeper:3.02.1221:*:linux:*:*:*:*:*"
] |
|
GHSA-fcmj-gcwc-rvc5
|
Cross Site Scripting (XSS) vulnerability in PHPGurukul Online Fire Reporting System Using PHP and MySQL v.1.2 allows attackers to execute arbitrary code via a crafted payload injected into the search field.
|
[] |
|
GHSA-m432-g357-h2xx
|
Windows NAT Denial of Service Vulnerability
|
[] |
|
GHSA-3rq3-f864-789r
|
Cross-site scripting (XSS) vulnerability in the Organic Groups (OG) module 5.x before 5.x-7.3 and 6.x before 6.x-1.0-RC1, a module for Drupal, allows remote authenticated users, with group owner permissions, to inject arbitrary web script or HTML via unspecified vectors.
|
[] |
|
GHSA-g437-xqhv-c7mq
|
Issue in KeePassXC 2.7.7 allows an attacker to recover some passwords stored in the .kdbx database.
|
[] |
|
CVE-2006-1800
|
Directory traversal vulnerability in posts.php in SimpleBBS 1.0.6 through 1.1 allows remote attackers to include and execute arbitrary files via ".." sequences in the language cookie, as demonstrated by by injecting the code into the gl_session cookie of users.php, which is stored in error.log.
|
[
"cpe:2.3:a:simplemedia:simplebbs:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemedia:simplebbs:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:simplemedia:simplebbs:1.1:*:*:*:*:*:*:*"
] |
|
CVE-2007-6218
|
Multiple PHP remote file inclusion vulnerabilities in Ossigeno CMS 2.2 pre1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) level parameter to (a) install_module.php and (b) uninstall_module.php in upload/xax/admin/modules/, (c) upload/xax/admin/patch/index.php, and (d) install_module.php and (e) uninstall_module.php in upload/xax/ossigeno/admin/; and the (2) ossigeno parameter to (f) ossigeno_modules/ossigeno-catalogo/xax/ossigeno/catalogo/common.php, different vectors than CVE-2007-5234.
|
[
"cpe:2.3:a:ossigeno:cms:2.2_pre1:*:*:*:*:*:*:*"
] |
|
CVE-2018-12389
|
Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.3 and Thunderbird < 60.3.
|
[
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
CVE-2009-1525
|
CMD_DB in JBMC Software DirectAdmin before 1.334 allows remote authenticated users to gain privileges via shell metacharacters in the name parameter during a restore action.
|
[
"cpe:2.3:a:jbmc-software:directadmin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.03:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.04:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.05:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.06:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.07:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.08:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.09:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.26:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.27:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.28:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.29:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.31:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.32:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.33:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.081:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.111:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.121:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.151:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.161:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.171:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.172:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.173:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.174:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.181:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.192:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.193:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.195:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.196:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.201:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.202:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.203:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.204:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.205:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.206:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.207:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.211:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.212:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.213:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.221:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.222:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.223:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.224:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.225:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.226:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.231:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.232:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.233:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.234:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.235:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.241:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.242:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.243:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.244:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.251:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.252:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.253:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.254:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.255:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.261:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.262:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.263:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.264:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.265:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.266:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.273:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.274:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.275:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.281:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.282:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.285:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.286:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.291:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.292:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.293:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.294:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.295:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.296:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.297:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.301:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.302:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.311:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.312:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.313:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.314:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.315:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.321:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.322:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.323:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.331:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.332:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.1741:*:*:*:*:*:*:*",
"cpe:2.3:a:jbmc-software:directadmin:1.1941:*:*:*:*:*:*:*"
] |
|
CVE-2022-49212
|
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
|
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
The reference counting issue happens in several error handling paths
on a refcounted object "nc->dmac". In these paths, the function simply
returns the error code, forgetting to balance the reference count of
"nc->dmac", increased earlier by dma_request_channel(), which may
cause refcount leaks.
Fix it by decrementing the refcount of specific object in those error
paths.
|
[] |
GHSA-wr6f-cm58-jfxr
|
In apu, there is a possible memory corruption due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07767818; Issue ID: ALPS07767818.
|
[] |
|
CVE-2017-3646
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-20225
|
MyBB before 1.8.22 allows an open redirect on login.
|
[
"cpe:2.3:a:mybb:mybb:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-35598
|
Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:mysql_cluster:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*"
] |
|
CVE-2025-49073
|
WordPress Sweet Dessert < 1.1.13 - PHP Object Injection Vulnerability
|
Deserialization of Untrusted Data vulnerability in Axiomthemes Sweet Dessert allows Object Injection.This issue affects Sweet Dessert: from n/a before 1.1.13.
|
[] |
CVE-2023-1722
|
Yoga Class Registration System 1.0 - ATO
|
Yoga Class Registration System version 1.0 allows an administrator to execute commands on the server. This is possible because the application does not correctly validate the thumbnails of the classes uploaded by the administrators.
|
[
"cpe:2.3:a:yoga_class_registration_system_project:yoga_class_registration_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-846v-5h9x-xf83
|
Cross-site scripting (XSS) vulnerability in the widgets in IBM WebSphere Service Registry and Repository (WSRR) 7.5.x before 7.5.0.4 and 8.0.x before 8.0.0.3 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] |
|
CVE-2021-23959
|
An XSS bug in internal error pages could have led to various spoofing attacks, including other error pages and the address bar. Note: This issue only affected Firefox for Android. Other operating systems are unaffected. This vulnerability affects Firefox < 85.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*"
] |
|
GHSA-3mpp-xh9p-vf59
|
Cisco VPN 3000 Concentrator 2.2.x, 3.6(Rel), and 3.x before 3.5.5, allows remote attackers to cause a denial of service via a long user name.
|
[] |
|
GHSA-vhmc-p5m8-7586
|
Directory traversal vulnerability in EFTP 2.0.8.346 allows local users to read directories via a ... (modified dot dot) in the CWD command.
|
[] |
|
CVE-2022-20219
|
In multiple functions of StorageManagerService.java and UserManagerService.java, there is a possible way to leave user's directories unencrypted due to a logic error in the code. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224585613
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] |
|
GHSA-88p5-45fx-5x87
|
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
|
[] |
|
GHSA-m57w-hf24-4j3h
|
GNU Emacs through 28.2 allows attackers to execute commands via shell metacharacters in the name of a source-code file, because lib-src/etags.c uses the system C library function in its implementation of the ctags program. For example, a victim may use the "ctags *" command (suggested in the ctags documentation) in a situation where the current working directory has contents that depend on untrusted input.
|
[] |
|
CVE-2020-24692
|
The Ignite portal in Mitel MiContact Center Business before 9.3.0.0 could allow an attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to gain access to a user session.
|
[
"cpe:2.3:a:mitel:micontact_center_business:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-48648
|
sfc: fix null pointer dereference in efx_hard_start_xmit
|
In the Linux kernel, the following vulnerability has been resolved:
sfc: fix null pointer dereference in efx_hard_start_xmit
Trying to get the channel from the tx_queue variable here is wrong
because we can only be here if tx_queue is NULL, so we shouldn't
dereference it. As the above comment in the code says, this is very
unlikely to happen, but it's wrong anyway so let's fix it.
I hit this issue because of a different bug that caused tx_queue to be
NULL. If that happens, this is the error message that we get here:
BUG: unable to handle kernel NULL pointer dereference at 0000000000000020
[...]
RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.0:rc6:*:*:*:*:*:*"
] |
CVE-2020-29605
|
An issue was discovered in MantisBT before 2.24.4. Due to insufficient access-level checks, any logged-in user allowed to perform Group Actions can get access to the Summary fields of private Issues via bug_arr[]= in a crafted bug_actiongroup_page.php URL. (The target Issues can have Private view status, or belong to a private Project.)
|
[
"cpe:2.3:a:mantisbt:mantisbt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-w2j2-4cph-26rw
|
An unspecified vulnerability in IBM Jazz Foundation based applications might allow the display of stack trace information to an attacker. IBM X-Force ID: 124523.
|
[] |
|
GHSA-j867-5cxm-5qrg
|
The klassens (aka com.mcreda.klassens.apps) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] |
|
CVE-2002-0074
|
Cross-site scripting vulnerability in Help File search facility for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to embed scripts into another user's session.
|
[
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-5567
|
Code injection vulnerability in Avast Premier 12.3 (and earlier), Internet Security 12.3 (and earlier), Pro Antivirus 12.3 (and earlier), and Free Antivirus 12.3 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Avast process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.
|
[
"cpe:2.3:a:avast:free_antivirus:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avast:internet_security:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avast:premier:*:*:*:*:*:*:*:*",
"cpe:2.3:a:avast:pro_antivirus:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-2648
|
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations). The supported version that is affected is 16.0. Easily exploitable vulnerability allows physical access to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in takeover of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.0 Base Score 6.2 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:retail_customer_management_and_segmentation_foundation:16.0:*:*:*:*:*:*:*"
] |
|
CVE-2002-0208
|
PGP Security PGPfire 7.1 for Windows alters the system's TCP/IP stack and modifies packets in ICMP error messages in a way that allows remote attackers to determine that the system is running PGPfire.
|
[
"cpe:2.3:a:network.associates:pgpfire:7.1:*:*:*:*:windows:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.