id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
GHSA-jrxp-vr5q-c5vc
|
WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1.
|
[] |
|
GHSA-4v9v-4x57-7wc8
|
A vulnerability has been found in SourceCodester Best Salon Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /panel/edit-subscription.php. The manipulation of the argument editid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
GHSA-xxpf-rq7v-q2rc
|
A persistent cross-site scripting (XSS) vulnerability exists on two input fields within the administrative panel when editing users in the XMPie UStore application on version 12.3.7244.0.
|
[] |
|
GHSA-xf45-w5fj-69f6
|
IBM Tivoli Key Lifecycle Manager 3.0.1 and 4.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184179.
|
[] |
|
CVE-2021-23470
|
Prototype Pollution
|
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-PUTILMERGE-1317077
|
[
"cpe:2.3:a:putil-merge_project:putil-merge:*:*:*:*:*:*:*:*"
] |
CVE-2025-26905
|
WordPress Estatik plugin <= 4.1.9 - Local File Inclusion vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Estatik Estatik allows PHP Local File Inclusion. This issue affects Estatik: from n/a through 4.1.9.
|
[] |
GHSA-57fw-f86h-vwgm
|
A stack-buffer overflow vulnerability [CWE-121] in Fortinet FortiMail CLI version 7.6.0 through 7.6.1 and before 7.4.3 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI commands.
|
[] |
|
GHSA-p6w5-qf2c-m57m
|
Cross-Site Request Forgery (CSRF) vulnerability in Gosoft Software Proticaret E-Commerce allows Cross Site Request Forgery.This issue affects Proticaret E-Commerce: before v6.0NOTE: According to the vendor, fixing process is still ongoing for v4.05.
|
[] |
|
GHSA-f7j7-q438-xgjx
|
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6148.
|
[] |
|
CVE-2024-50196
|
pinctrl: ocelot: fix system hang on level based interrupts
|
In the Linux kernel, the following vulnerability has been resolved:
pinctrl: ocelot: fix system hang on level based interrupts
The current implementation only calls chained_irq_enter() and
chained_irq_exit() if it detects pending interrupts.
```
for (i = 0; i < info->stride; i++) {
uregmap_read(info->map, id_reg + 4 * i, ®);
if (!reg)
continue;
chained_irq_enter(parent_chip, desc);
```
However, in case of GPIO pin configured in level mode and the parent
controller configured in edge mode, GPIO interrupt might be lowered by the
hardware. In the result, if the interrupt is short enough, the parent
interrupt is still pending while the GPIO interrupt is cleared;
chained_irq_enter() never gets called and the system hangs trying to
service the parent interrupt.
Moving chained_irq_enter() and chained_irq_exit() outside the for loop
ensures that they are called even when GPIO interrupt is lowered by the
hardware.
The similar code with chained_irq_enter() / chained_irq_exit() functions
wrapping interrupt checking loop may be found in many other drivers:
```
grep -r -A 10 chained_irq_enter drivers/pinctrl
```
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] |
GHSA-3fg2-4jg7-6ff7
|
Unrestricted file upload vulnerability in includes/imageupload.php in 7Shop 1.1 and earlier allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in images/artikel/.
|
[] |
|
CVE-2023-1089
|
Coupon Zen < 1.0.6 - Arbitrary Plugin Activation via CSRF
|
The Coupon Zen WordPress plugin before 1.0.6 does not have CSRF check when activating plugins, which could allow attackers to make logged in admins activate arbitrary plugins present on the blog via a CSRF attack
|
[
"cpe:2.3:a:hasthemes:coupon_zen:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-25846
|
CHANGING Inc. NHIServiSignAdapter Windows Versions - Information Leakage -2
|
The digest generation function of NHIServiSignAdapter has not been verified for source file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential.
|
[
"cpe:2.3:a:panorama_project:nhiservisignadapter:1.0.20.0218:*:*:*:*:windows:*:*"
] |
GHSA-8vf3-43pf-v3cq
|
A flaw was found in RPM's hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.
|
[] |
|
CVE-2008-1530
|
GnuPG (gpg) 1.4.8 and 2.0.8 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via crafted duplicate keys that are imported from key servers, which triggers "memory corruption around deduplication of user IDs."
|
[
"cpe:2.3:a:gnupg:gnupg:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnupg:gnupg:2.0.8:*:*:*:*:*:*:*"
] |
|
GHSA-gxrh-cjh3-h5hp
|
Unspecified vulnerability in the Oracle E-Business Suite Secure Enterprise Search component in Oracle E-Business Suite 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect confidentiality via vectors related to Search Integration Engine.
|
[] |
|
GHSA-3jqw-4vj5-9v72
|
A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version.
|
[] |
|
CVE-2024-5580
|
Allegra loadFieldMatch Deserialization of Untrusted Data Remote Code Execution Vulnerability
|
Allegra loadFieldMatch Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.
The specific flaw exists within the loadFieldMatch method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-23452.
|
[
"cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*"
] |
GHSA-42p8-93qx-mrrc
|
Improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in Event Management in Synology Calendar before 2.4.5-10930 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] |
|
GHSA-7g3h-38qp-px8v
|
Adobe ColdFusion Update 5 and earlier versions, ColdFusion 11 Update 13 and earlier versions have an exploitable Unsafe XML External Entity Processing vulnerability. Successful exploitation could lead to information disclosure.
|
[] |
|
CVE-2022-30515
|
ZKTeco BioTime 8.5.4 is missing authentication on folders containing employee photos, allowing an attacker to view them through filename enumeration.
|
[
"cpe:2.3:a:zkteco:biotime:8.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zkteco:biotime:8.5.5:*:*:*:*:*:*:*"
] |
|
GHSA-wmg3-3g4f-j96j
|
OX App Suite 7.10.4 and earlier allows SSRF via a snippet.
|
[] |
|
GHSA-5jj5-vh28-7x64
|
DEPRECATED. This entry has been deprecated. It is a duplicate of CVE-1999-0032.
|
[] |
|
CVE-2017-6987
|
An issue was discovered in certain Apple products. iOS before 10.3.2 is affected. macOS before 10.12.5 is affected. tvOS before 10.2.1 is affected. watchOS before 3.2.2 is affected. The issue involves the "Kernel" component. It allows attackers to bypass intended memory-read restrictions via a crafted app.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-vrgf-6qrc-hmmg
|
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory, aka 'DirectWrite Remote Code Execution Vulnerability'.
|
[] |
|
GHSA-596p-4hx4-frm9
|
The issue was addressed with improved checks. This issue is fixed in tvOS 17.5, visionOS 1.2, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. An app may be able to elevate privileges.
|
[] |
|
CVE-2020-1786
|
HUAWEI Mate 20 Pro smartphones versions earlier than 10.0.0.175(C00E69R3P8) have an improper authentication vulnerability. The software does not sufficiently validate the name of apk file in a special condition which could allow an attacker to forge a crafted application as a normal one. Successful exploit could allow the attacker to bypass digital balance function.
|
[
"cpe:2.3:o:huawei:mate_20_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_20_pro:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-25960
|
Dell PowerScale OneFS versions 8.2.2.x through 9.7.0.x contains a cleartext transmission of sensitive information vulnerability. A local low privileged attacker could potentially exploit this vulnerability, leading to escalation of privileges.
|
[
"cpe:2.3:o:dell:powerscale_onefs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-10377
|
PortSwigger Burp Suite before 1.7.34 has Improper Certificate Validation of the Collaborator server certificate, which might allow man-in-the-middle attackers to obtain interaction data.
|
[
"cpe:2.3:a:portswigger:burp_suite:*:*:*:*:*:*:*:*"
] |
|
GHSA-pc48-9r4h-qp2w
|
SQL injection vulnerability in links.php in MYRE Business Directory allows remote attackers to execute arbitrary SQL commands via the cat parameter.
|
[] |
|
GHSA-mh33-7rrq-662w
|
Improper Certificate Validation in urllib3
|
The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the `ssl_context`, `ca_certs`, or `ca_certs_dir` argument.
|
[] |
GHSA-3352-53wf-rvq5
|
Buffer overflow in the ParseCommand function in hpgl-input.c in the hpgltops program for CUPS 1.1.22 allows remote attackers to execute arbitrary code via a crafted HPGL file.
|
[] |
|
GHSA-7pr3-55xw-4rxx
|
IBM i2 Analyst's Notebook Premium 9.2.0, 9.2.1, and 9.2.2 does not invalidate session after logout which could allow an an attacker to obtain sensitive information from the system. IBM X-Force ID: 196342.
|
[] |
|
GHSA-2w2q-4rr5-39fw
|
Directory traversal vulnerability in default.php in Kipper 2.01 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the configfile parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] |
|
GHSA-23cv-hj48-7c4g
|
The Keybase app 2.13.2 for iOS provides potentially insufficient notice that it is employing a user's private key to sign a certain cryptocurrency attestation (that an address at keybase.io can be used for Stellar payments to the user), which might be incompatible with a user's personal position on the semantics of an attestation.
|
[] |
|
GHSA-mgv9-4gvv-8w9c
|
A BOLA vulnerability in POST /admins allows a low privileged user to create a high privileged user (admin) in the system. This results in privilege escalation.
|
[] |
|
CVE-2019-10191
|
A vulnerability was discovered in DNS resolver of knot resolver before version 4.1.0 which allows remote attackers to downgrade DNSSEC-secure domains to DNSSEC-insecure state, opening possibility of domain hijack using attacks against insecure DNS protocol.
|
[
"cpe:2.3:a:nic:knot_resolver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"
] |
|
GHSA-wvc9-6xq9-f3hx
|
Technicolor Router TD5130 with firmware 2.05.C29GV allows remote attackers to execute arbitrary commands via shell metacharacters in the ping field (setobject_ip parameter).
|
[] |
|
CVE-2024-25644
|
Information Disclosure vulnerability in NetWeaver (WSRM)
|
Under certain conditions SAP NetWeaver WSRM - version 7.50, allows an attacker to access information which would otherwise be restricted, causing low impact on Confidentiality with no impact on Integrity and Availability of the application.
|
[
"cpe:2.3:a:sap:netweaver:7.5:*:*:*:*:*:*:*"
] |
CVE-2002-2273
|
Cross-site scripting (XSS) vulnerability in Webster HTTP Server allows remote attackers to inject arbitrary web script or HTML via the URL.
|
[
"cpe:2.3:a:webster:webster_http_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-q84q-gvjv-54c5
|
D-Link DAP-1325 SetAPLanSettings Gateway Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18826.
|
[] |
|
CVE-2024-23191
|
Upsell advertisement information of an account can be manipulated to execute script code in the context of the users browser session. To exploit this an attacker would require temporary access to a users account or an successful social engineering attack to lure users to maliciously configured accounts. Attackers could perform malicious API requests or extract information from the users account. Please deploy the provided updates and patch releases. Sanitization of user-defined upsell content has been improved. No publicly available exploits are known.
|
[] |
|
GHSA-jh6c-99xj-2gpm
|
Online Examination System v1.0 is vulnerable to multiple Authenticated SQL Injection vulnerabilities. The 'name' parameter of the update.php resource does not validate the characters received and they are sent unfiltered to the database.
|
[] |
|
CVE-2005-3460
|
Unspecified vulnerability in Oracle Agent in Oracle Enterprise Manager 9.0.4.1 up to 10.1.0.4 has unknown impact and attack vectors, as identified by Oracle Vuln# EM01.
|
[
"cpe:2.3:a:oracle:10g_enterprise_manager_database_control:10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:10g_enterprise_manager_database_control:10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_application_server_control:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_application_server_control:9.0.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-27886
|
Maccms v10 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in /admin.php/admin/ulog/index.html via the wd parameter.
|
[
"cpe:2.3:a:maccms:maccms:10.0:2021.1000.1081:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.1099:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3001:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3002:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3004:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3005:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3025:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3026:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3027:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3028:*:*:*:*:*:*",
"cpe:2.3:a:maccms:maccms:10.0:2022.1000.3029:*:*:*:*:*:*"
] |
|
GHSA-3p4g-gcq8-j93v
|
Vulnerability in SiAdmin 1.1 that allows SQL injection via the /modul/mod_kuliah/aksi_kuliah.php parameter in nim. This vulnerability could allow a remote attacker to send a specially crafted SQL query to the system and retrieve all the information stored in it.
|
[] |
|
GHSA-j3w8-vh53-8rrp
|
Foxit PDF Reader before 11.2.1 and Foxit PDF Editor before 11.2.1 have a Stack-Based Buffer Overflow related to XFA, for the 'subform colSpan="-2"' and 'draw colSpan="1"' substrings.
|
[] |
|
CVE-2024-53239
|
ALSA: 6fire: Release resources at card release
|
In the Linux kernel, the following vulnerability has been resolved:
ALSA: 6fire: Release resources at card release
The current 6fire code tries to release the resources right after the
call of usb6fire_chip_abort(). But at this moment, the card object
might be still in use (as we're calling snd_card_free_when_closed()).
For avoid potential UAFs, move the release of resources to the card's
private_free instead of the manual call of usb6fire_chip_destroy() at
the USB disconnect callback.
|
[] |
CVE-2017-5091
|
A use after free in IndexedDB in Google Chrome prior to 60.0.3112.78 for Linux, Android, Windows, and Mac allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-55997
|
WordPress Order Delivery & Pickup Location Date Time plugin <= 1.1.0 - Settings Change vulnerability
|
Missing Authorization vulnerability in Web Chunky Order Delivery & Pickup Location Date Time allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Order Delivery & Pickup Location Date Time: from n/a through 1.1.0.
|
[] |
GHSA-w3jc-x7jx-9rxx
|
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 4.0.30. This is due to insufficient validation on the redirect url supplied via the redirect_to parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
|
[] |
|
GHSA-j384-9qr9-8643
|
IBM WebSphere Application Server (WAS) 7.0 before 7.0.0.11, when addNode -trace is used during node federation, allows attackers to obtain sensitive information about CIMMetadataCollectorImpl trace actions by reading the addNode.log file.
|
[] |
|
GHSA-frmj-9v42-hrj4
|
Buffer overflow in the check_snmp function in Nagios Plugins (nagios-plugins) 1.4.10 allows remote attackers to cause a denial of service (crash) via crafted snmpget replies.
|
[] |
|
CVE-2021-0509
|
In various functions of CryptoPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-9 Android-10 Android-11 Android-8.1Android ID: A-176444161
|
[
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-qx5w-mmcc-hg72
|
Insecure authorization in Project Deploy Keys in GitLab CE/EE 12.8 and later through 13.0.1 allows users to update permissions of other users' deploy keys under certain conditions
|
[] |
|
CVE-2018-1000014
|
Jenkins Translation Assistance Plugin 1.15 and earlier did not require form submissions to be submitted via POST, resulting in a CSRF vulnerability allowing attackers to override localized strings displayed to all users on the current Jenkins instance if the victim is a Jenkins administrator.
|
[
"cpe:2.3:a:jenkins:translation_assistance:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-58h4-9m7m-j9m4
|
@okta/oidc-middlewareOpen Redirect vulnerability
|
An open redirect vulnerability exists in Okta OIDC Middleware prior to version 5.0.0 allowing an attacker to redirect a user to an arbitrary URL.**Affected products and versions**
Okta OIDC Middleware prior to version 5.0.0.**Resolution**
The vulnerability is fixed in OIDC Middleware 5.0.0. To remediate this vulnerability, upgrade Okta OIDC Middleware to this version or later.**CVE details**
**CVE ID:** [CVE-2022-3145](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2022-3145)
**Published Date:** 01/05/2023
**Vulnerability Type:** Open Redirect
**CWE:** CWE-601
**CVSS v3.1 Score:** 4.3
**Severity:** Medium
**Vector string:** AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N**Severity Details**
To exploit this issue, an attacker would need to send a victim a malformed URL containing a target server that they control. Once a user successfully completed the login process, the victim user would then be redirected to the attacker controlled site.**References**
https://github.com/okta/okta-oidc-middleware
|
[] |
CVE-2023-50719
|
XWiki Platform Solr search discloses password hashes of all users
|
XWiki Platform is a generic wiki platform. Starting in 7.2-milestone-2 and prior to versions 14.10.15, 15.5.2, and 15.7-rc-1, the Solr-based search in XWiki discloses the password hashes of all users to anyone with view right on the respective user profiles. By default, all user profiles are public. This vulnerability also affects any configurations used by extensions that contain passwords like API keys that are viewable for the attacker. Normally, such passwords aren't accessible but this vulnerability would disclose them as plain text. This has been patched in XWiki 14.10.15, 15.5.2 and 15.7RC1. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:7.2:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:7.2:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.6:-:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.6:rc1:*:*:*:*:*:*",
"cpe:2.3:a:xwiki:xwiki:15.7:rc1:*:*:*:*:*:*"
] |
CVE-2014-5401
|
Hospira MedNet software version 5.8 and prior uses vulnerable versions of the JBoss Enterprise Application Platform software that may allow unauthenticated users to execute arbitrary code on the target system. Hospira has developed a new version of the MedNet software, MedNet 6.1. Existing versions of MedNet can be upgraded to MedNet 6.1.
|
[
"cpe:2.3:a:hospira:mednet:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-27653
|
Algorithm downgrade vulnerability in QuickConnect in Synology Router Manager (SRM) before 1.2.4-8081 allows man-in-the-middle attackers to spoof servers and obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:synology:diskstation_manager:6.2.3_25426:*:*:*:*:*:*:*",
"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-24170
|
Tenda routers G1 and G3 v15.11.0.17(9502)_CN were discovered to contain a command injection vulnerability in the function formSetIpSecTunnel. This vulnerability allows attackers to execute arbitrary commands via the IPsecLocalNet and IPsecRemoteNet parameters.
|
[
"cpe:2.3:o:tendacn:g1_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:g3_firmware:15.11.0.17\\(9502\\)_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:g3:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-47463
|
mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()
|
In the Linux kernel, the following vulnerability has been resolved:
mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()
Check for a NULL page->mapping before dereferencing the mapping in
page_is_secretmem(), as the page's mapping can be nullified while gup()
is running, e.g. by reclaim or truncation.
BUG: kernel NULL pointer dereference, address: 0000000000000068
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 6 PID: 4173897 Comm: CPU 3/KVM Tainted: G W
RIP: 0010:internal_get_user_pages_fast+0x621/0x9d0
Code: <48> 81 7a 68 80 08 04 bc 0f 85 21 ff ff 8 89 c7 be
RSP: 0018:ffffaa90087679b0 EFLAGS: 00010046
RAX: ffffe3f37905b900 RBX: 00007f2dd561e000 RCX: ffffe3f37905b934
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffe3f37905b900
...
CR2: 0000000000000068 CR3: 00000004c5898003 CR4: 00000000001726e0
Call Trace:
get_user_pages_fast_only+0x13/0x20
hva_to_pfn+0xa9/0x3e0
try_async_pf+0xa1/0x270
direct_page_fault+0x113/0xad0
kvm_mmu_page_fault+0x69/0x680
vmx_handle_exit+0xe1/0x5d0
kvm_arch_vcpu_ioctl_run+0xd81/0x1c70
kvm_vcpu_ioctl+0x267/0x670
__x64_sys_ioctl+0x83/0xa0
do_syscall_64+0x56/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xae
|
[] |
CVE-2021-27647
|
Out-of-bounds Read vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
|
[
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-cg44-3c54-5q5h
|
Access to critical Unified Diagnostics Services (UDS) of the Modular Infotainment Platform 3 (MIB3) infotainment is transmitted via Controller Area Network (CAN) bus in a form that can be easily decoded by attackers with physical access to the vehicle.Vulnerability discovered on Škoda Superb III (3V3) - 2.0 TDI manufactured in 2022.
|
[] |
|
CVE-2003-1222
|
BEA Weblogic Express and Server 8.0 through 8.1 SP 1, when using a foreign Java Message Service (JMS) provider, echoes the password for the foreign provider to the console and stores it in cleartext in config.xml, which could allow attackers to obtain the password.
|
[
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*"
] |
|
CVE-2022-43284
|
Nginx NJS v0.7.2 to v0.7.4 was discovered to contain a segmentation violation via njs_scope_valid_value at njs_scope.h. NOTE: the vendor disputes the significance of this report because NJS does not operate on untrusted input.
|
[
"cpe:2.3:a:f5:njs:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-21337
|
Windows NTFS Elevation of Privilege Vulnerability
|
Windows NTFS Elevation of Privilege Vulnerability
|
[] |
GHSA-rx9c-fmp3-rmxc
|
PHP remote file inclusion vulnerability in web/init_mysource.php in MySource CMS 2.16.2 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the INCLUDE_PATH parameter.
|
[] |
|
CVE-2017-3972
|
SB10192 - Network Security Management (NSM) - Infrastructure-based foot printing vulnerability
|
Infrastructure-based foot printing vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows attackers to execute arbitrary code via the server banner leaking potentially sensitive or security relevant information.
|
[
"cpe:2.3:a:mcafee:network_security_manager:*:*:*:*:*:*:*:*"
] |
GHSA-9hx9-q6rp-5gwc
|
Matrix Tafnit v8CWE-204: Observable Response Discrepancy
|
[] |
|
GHSA-w4wp-6c4p-vfjm
|
In the Linux kernel, the following vulnerability has been resolved:mtd: rawnand: gpmi: don't leak PM reference in error pathIf gpmi_nfc_apply_timings() fails, the PM runtime usage counter must be
dropped.
|
[] |
|
GHSA-w3gf-xm48-8c2x
|
An issue was discovered in EthernetNetwork on Samsung mobile devices with O(8.1), P(9.0), Q(10.0), and R(11.0) software. PendingIntent allows sdcard access by an unprivileged process. The Samsung ID is SVE-2020-18392 (October 2020).
|
[] |
|
GHSA-rrcm-x862-pp9q
|
In Ifaa service, there is a possible missing permission check. This could lead to local denial of service with System execution privileges needed
|
[] |
|
CVE-2024-48637
|
D-Link DIR_882_FW130B06 and DIR_878 DIR_878_FW130B08 were discovered to contain a command injection vulnerability via the VLANID:1/VID parameter in the SetVLANSettings function. This vulnerability allows attackers to execute arbitrary OS commands via a crafted POST request.
|
[
"cpe:2.3:o:dlink:dir-882_firmware:1.30b06:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-878_firmware:1.30b08:*:*:*:*:*:*:*"
] |
|
CVE-2024-53721
|
WordPress Advanced Event Manager plugin <= 1.1.6 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Stachethemes Advanced Event Manager allows Stored XSS.This issue affects Advanced Event Manager: from n/a through 1.1.6.
|
[] |
GHSA-rq5m-jv7g-wwv9
|
Invensys Wonderware InTouch 8.0 creates a NetDDE share with insecure permissions (Everyone/Full Control), which allows remote authenticated attackers, and possibly anonymous users, to execute arbitrary programs.
|
[] |
|
GHSA-jc7r-7928-5hc3
|
KDE Konqueror does not prevent cookies that are sent over an insecure channel (HTTP) from also being sent over a secure channel (HTTPS/SSL) in the same domain, which could allow remote attackers to steal cookies and conduct unauthorized activities, aka "Cross Security Boundary Cookie Injection."
|
[] |
|
GHSA-v958-rf72-rpxh
|
The sensitive information exposure vulnerability in Quick Share Agent prior to versions 3.5.14.18 in Android 12 and 3.5.16.20 in Android 13 allows to local attacker to access MAC address without related permission.
|
[] |
|
CVE-2006-1409
|
Buffer overflow in Vavoom 1.19.1 and earlier allows remote attackers to cause a denial of service (application crash) via an invalid comprLength value in a compressed packet.
|
[
"cpe:2.3:a:vavoom:vavoom:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.4_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.5_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.7_beta_1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.7_beta_2:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.7_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.7_beta_4:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.7_beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.15_beta_1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.666:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.666_beta_1:*:*:*:*:*:*:*",
"cpe:2.3:a:vavoom:vavoom:1.666_beta_2:*:*:*:*:*:*:*"
] |
|
GHSA-58xm-28q7-87fm
|
The hndtst_action_instance_callback AJAX call of the Handsome Testimonials & Reviews WordPress plugin before 2.1.1, available to any authenticated users, does not sanitise, validate or escape the hndtst_previewShortcodeInstanceId POST parameter before using it in a SQL statement, leading to an SQL Injection issue.
|
[] |
|
CVE-2016-1661
|
Blink, as used in Google Chrome before 50.0.2661.94, does not ensure that frames satisfy a check for the same renderer process in addition to a Same Origin Policy check, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted web site, related to BindingSecurity.cpp and DOMWindow.cpp.
|
[
"cpe:2.3:o:redhat:enterprise_linux_desktop_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_supplementary_eus:6.7z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation_supplementary:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] |
|
GHSA-x53g-gcp2-fp24
|
Incorrect Access Control for linked Tickets in Zammad 1.0.x up to 4.0.0 allows remote attackers to obtain sensitive information.
|
[] |
|
CVE-2023-52628
|
netfilter: nftables: exthdr: fix 4-byte stack OOB write
|
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nftables: exthdr: fix 4-byte stack OOB write
If priv->len is a multiple of 4, then dst[len / 4] can write past
the destination array which leads to stack corruption.
This construct is necessary to clean the remainder of the register
in case ->len is NOT a multiple of the register size, so make it
conditional just like nft_payload.c does.
The bug was added in 4.1 cycle and then copied/inherited when
tcp/sctp and ip option support was added.
Bug reported by Zero Day Initiative project (ZDI-CAN-21950,
ZDI-CAN-21951, ZDI-CAN-21961).
|
[] |
CVE-2022-26134
|
In affected versions of Confluence Server and Data Center, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. The affected versions are from 1.3.0 before 7.4.17, from 7.13.0 before 7.13.7, from 7.14.0 before 7.14.3, from 7.15.0 before 7.15.2, from 7.16.0 before 7.16.4, from 7.17.0 before 7.17.4, and from 7.18.0 before 7.18.1.
|
[
"cpe:2.3:a:atlassian:confluence_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_data_center:7.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:confluence_server:7.18.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-5181
|
Race condition in VIPRE Antivirus Premium 4.0.3272 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
|
[
"cpe:2.3:a:gfi:vipre_antivirus:4.0.3272:-:premium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-52891
|
ModSecurity empty XML tag causes segmentation fault
|
ModSecurity is an open source, cross platform web application firewall (WAF) engine for Apache, IIS and Nginx. In versions 2.9.8 to before 2.9.11, an empty XML tag can cause a segmentation fault. If SecParseXmlIntoArgs is set to On or OnlyArgs, and the request type is application/xml, and at least one XML tag is empty (eg <foo></foo>), then a segmentation fault occurs. This issue has been patched in version 2.9.11. A workaround involves setting SecParseXmlIntoArgs to Off.
|
[] |
CVE-2023-40151
|
Red Lion Controls Sixnet RTU Exposed Dangerous Method Or Function
|
When user authentication is not enabled the shell can execute commands with the highest privileges. Red Lion SixTRAK and VersaTRAK Series RTUs with authenticated users enabled (UDR-A) any Sixnet UDR message will meet an authentication challenge over UDP/IP. When the same message comes over TCP/IP the RTU will simply accept the message with no authentication challenge.
|
[
"cpe:2.3:o:redlioncontrols:st-ipm-6350_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:st-ipm-6350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:st-ipm-8460_firmware:6.0.202:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:st-ipm-8460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-mipm-135-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-mipm-135-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-mipm-245-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-mipm-245-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-ipm2m-213-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-ipm2m-213-d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redlioncontrols:vt-ipm2m-113-d_firmware:4.9.114:*:*:*:*:*:*:*",
"cpe:2.3:h:redlioncontrols:vt-ipm2m-113-d:-:*:*:*:*:*:*:*"
] |
CVE-2015-0811
|
The QCMS implementation in Mozilla Firefox before 37.0 allows remote attackers to obtain sensitive information from process heap memory or cause a denial of service (out-of-bounds read) via an image that is improperly handled during transformation.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*"
] |
|
CVE-2024-26765
|
LoongArch: Disable IRQ before init_fn() for nonboot CPUs
|
In the Linux kernel, the following vulnerability has been resolved:
LoongArch: Disable IRQ before init_fn() for nonboot CPUs
Disable IRQ before init_fn() for nonboot CPUs when hotplug, in order to
silence such warnings (and also avoid potential errors due to unexpected
interrupts):
WARNING: CPU: 1 PID: 0 at kernel/rcu/tree.c:4503 rcu_cpu_starting+0x214/0x280
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.6.17+ #1198
pc 90000000048e3334 ra 90000000047bd56c tp 900000010039c000 sp 900000010039fdd0
a0 0000000000000001 a1 0000000000000006 a2 900000000802c040 a3 0000000000000000
a4 0000000000000001 a5 0000000000000004 a6 0000000000000000 a7 90000000048e3f4c
t0 0000000000000001 t1 9000000005c70968 t2 0000000004000000 t3 000000000005e56e
t4 00000000000002e4 t5 0000000000001000 t6 ffffffff80000000 t7 0000000000040000
t8 9000000007931638 u0 0000000000000006 s9 0000000000000004 s0 0000000000000001
s1 9000000006356ac0 s2 9000000007244000 s3 0000000000000001 s4 0000000000000001
s5 900000000636f000 s6 7fffffffffffffff s7 9000000002123940 s8 9000000001ca55f8
ra: 90000000047bd56c tlb_init+0x24c/0x528
ERA: 90000000048e3334 rcu_cpu_starting+0x214/0x280
CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
PRMD: 00000000 (PPLV0 -PIE -PWE)
EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
ECFG: 00071000 (LIE=12 VS=7)
ESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)
PRID: 0014c010 (Loongson-64bit, Loongson-3A5000)
CPU: 1 PID: 0 Comm: swapper/1 Not tainted 6.6.17+ #1198
Stack : 0000000000000000 9000000006375000 9000000005b61878 900000010039c000
900000010039fa30 0000000000000000 900000010039fa38 900000000619a140
9000000006456888 9000000006456880 900000010039f950 0000000000000001
0000000000000001 cb0cb028ec7e52e1 0000000002b90000 9000000100348700
0000000000000000 0000000000000001 ffffffff916d12f1 0000000000000003
0000000000040000 9000000007930370 0000000002b90000 0000000000000004
9000000006366000 900000000619a140 0000000000000000 0000000000000004
0000000000000000 0000000000000009 ffffffffffc681f2 9000000002123940
9000000001ca55f8 9000000006366000 90000000047a4828 00007ffff057ded8
00000000000000b0 0000000000000000 0000000000000000 0000000000071000
...
Call Trace:
[<90000000047a4828>] show_stack+0x48/0x1a0
[<9000000005b61874>] dump_stack_lvl+0x84/0xcc
[<90000000047f60ac>] __warn+0x8c/0x1e0
[<9000000005b0ab34>] report_bug+0x1b4/0x280
[<9000000005b63110>] do_bp+0x2d0/0x480
[<90000000047a2e20>] handle_bp+0x120/0x1c0
[<90000000048e3334>] rcu_cpu_starting+0x214/0x280
[<90000000047bd568>] tlb_init+0x248/0x528
[<90000000047a4c44>] per_cpu_trap_init+0x124/0x160
[<90000000047a19f4>] cpu_probe+0x494/0xa00
[<90000000047b551c>] start_secondary+0x3c/0xc0
[<9000000005b66134>] smpboot_entry+0x50/0x58
|
[] |
GHSA-x7g8-97jm-3vpj
|
A use after free vulnerability in iva_ctl driver prior to SMR Sep-2022 Release 1 allows attacker to cause memory access fault.
|
[] |
|
CVE-2011-2874
|
Google Chrome before 14.0.835.163 does not perform an expected pin operation for a self-signed certificate during a session, which has unspecified impact and remote attack vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-7cch-m59v-c3cp
|
WOlfCMS WolfCMS version version 0.8.3.1 contains a Stored Cross-Site Scripting vulnerability in Layout Name (from Layout tab) that can result in low privilege user can steal the cookie of admin user and compromise the admin account. This attack appear to be exploitable via Need to enter the Javascript code into Layout Name .
|
[] |
|
CVE-2023-43528
|
Buffer Over-read in Audio
|
Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size.
|
[
"cpe:2.3:a:qualcomm:snapdragon:*:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:-:-:*:*:*:*:*:*:*"
] |
CVE-2022-26977
|
Barco Control Room Management Suite web application, which is part of TransForm N before 3.14, is exposing a license file upload mechanism. Lack of input sanitization of the upload mechanism is leads to stored XSS.
|
[
"cpe:2.3:a:barco:control_room_management_suite:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-23201
|
NVIDIA GPU and Tegra hardware contain a vulnerability in an internal microcontroller, which may allow a user with elevated privileges to generate valid microcode by identifying, exploiting, and loading vulnerable microcode. Such an attack could lead to information disclosure, data corruption, or denial of service of the device. The scope may extend to other components.
|
[
"cpe:2.3:h:nvidia:geforce_gtx_950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_970:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:geforce_gtx_titan_x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:-:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_nano:-:*:developer_kit:*:*:*:*:*",
"cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m1000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m1200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m3000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m4000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5000m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m500m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m520:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m5500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m6000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m600m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:quadro_m620:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tv:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:shield_tv_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m2050:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m2070:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m2070q:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m2090:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_m60:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla_p100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2016-4609
|
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4608, CVE-2016-4610, and CVE-2016-4612.
|
[
"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-44707
|
Windows Kernel Denial of Service Vulnerability
|
Windows Kernel Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3770:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3770:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.3770:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.3770:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.2364:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.2364:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.2364:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2022:10.0.20348.1366:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.2364:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.2364:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.1335:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:10.0.22000.1335:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.2364:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.2364:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h2:10.0.19044.2364:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.993:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_22h2:10.0.22621.993:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2364:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2364:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_22h2:10.0.19045.2364:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19624:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19624:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5582:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.5582:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.5582:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20721:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20721:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20721:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.24018:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20721:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:22h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:22h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] |
GHSA-c96p-67jc-gfv2
|
Cloudera Data Engineering (CDE) before 1.1 was vulnerable to a CSRF attack.
|
[] |
|
GHSA-9q42-phh7-m5r2
|
Simple Subscription Website v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the apply endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.
|
[] |
|
GHSA-cqhw-cx8f-6jvx
|
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.0.38 and Prior to 5.1.20. Easily "exploitable" vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. CVSS 3.0 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.