id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2021-39230
Error in JPNS kernel of Butter
Butter is a system usability utility. Due to a kernel error the JPNS kernel is being discontinued. Affected users are recommend to update to the Trinity kernel. There are no workarounds.
[ "cpe:2.3:a:butter_project:butter:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2022-35107
SWFTools commit 772e55a2 was discovered to contain a stack overflow via vfprintf at /stdio-common/vfprintf.c.
[ "cpe:2.3:a:swftools:swftools:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2014-3894
Cross-site scripting (XSS) vulnerability in PHP Kobo Multifunctional MailForm Free 2014/1/28 and earlier allows remote attackers to inject arbitrary web script or HTML via an HTTP Referer header.
[ "cpe:2.3:a:php_kobo:multifunctional_mailform_free:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-25059
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. A service crash may occur because of incorrect input validation. The LG ID is LVE-SMP-200013 (July 2020).
[ "cpe:2.3:o:google:android:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2022-28310
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.034. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16339.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
7.8
null
GHSA-m3j9-xfh2-hrgc
A race condition existed in the snapd 2.54.2 snap-confine binary when preparing a private mount namespace for a snap. This could allow a local attacker to gain root privileges by bind-mounting their own contents inside the snap's private mount namespace and causing snap-confine to execute arbitrary code and hence gain privilege escalation. Fixed in snapd versions 2.54.3+18.04, 2.54.3+20.04 and 2.54.3+21.10.1
[]
null
7.8
null
null
GHSA-cwgv-r3rp-4jqq
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bala Krishna, Sergey Yakovlev Category SEO Meta Tags plugin <= 2.5 versions.
[]
null
5.9
null
null
CVE-2019-5224
P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.193(C00E190R1P21) have an out of bounds read vulnerability. The system does not properly validate certain length parameter which an application transports to kernel. An attacker tricks the user to install a malicious application, successful exploit could cause out of bounds read and information disclosure.
[ "cpe:2.3:o:huawei:p30_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:p30:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
CVE-2013-6490
The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
[ "cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*", "cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2010-4593
The Connection Manager in IBM Lotus Mobile Connect before 6.1.4 does not properly maintain a certain reference count, which allows remote authenticated users to cause a denial of service (IP address exhaustion) by making invalid attempts to establish sessions with the same VPN ID from multiple devices.
[ "cpe:2.3:a:ibm:lotus_mobile_connect:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_mobile_connect:6.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_mobile_connect:6.1.2:*:*:*:*:*:*:*" ]
null
null
null
4
CVE-2015-3213
The gesture handling code in Clutter before 1.16.2 allows physically proximate attackers to bypass the lock screen via certain (1) mouse or (2) touch gestures.
[ "cpe:2.3:a:clutter_project:clutter:*:*:*:*:*:*:*:*" ]
null
null
null
7.2
GHSA-8p93-rmgx-3xq4
A time-of-check time-of-use race condition could potentially exist in the secure file system in all Android releases from CAF using the Linux kernel.
[]
null
null
7
null
GHSA-279f-qwgh-h5mp
Jenkins does not exclude sensitive build variables from search
Jenkins allows filtering builds in the build history widget by specifying an expression that searches for matching builds by name, description, parameter values, etc.Jenkins 2.50 through 2.423 (both inclusive), LTS 2.60.1 through 2.414.1 (both inclusive) does not exclude sensitive build variables (e.g., password parameter values) from this search.This allows attackers with Item/Read permission to obtain values of sensitive variables used in builds by iteratively testing different characters until the correct sequence is discovered.Jenkins 2.424, LTS 2.414.2 excludes sensitive variables from this search.
[]
null
4.3
null
null
CVE-2019-13200
The web application of several Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) was affected by Reflected XSS. Successful exploitation of this vulnerability can lead to session hijacking of the administrator in the web application or the execution of unwanted actions.
[ "cpe:2.3:o:kyocera:ecosys_m5526cdw_firmware:2r7_2000.001.701:*:*:*:*:*:*:*", "cpe:2.3:h:kyocera:ecosys_m5526cdw:-:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
CVE-2020-6327
SAP 3D Visual Enterprise Viewer, version - 9, allows a user to open manipulated 3DM file received from untrusted sources which results in crashing of the application and becoming temporarily unavailable until the user restarts the application, this is caused due to Improper Input Validation.
[ "cpe:2.3:a:sap:3d_visual_enterprise_viewer:9:*:*:*:*:*:*:*" ]
null
null
4.3
null
CVE-2015-2099
Multiple buffer overflows in WebGate Control Center allow remote attackers to execute arbitrary code via unspecified vectors to the (1) GetRecFileInfo function in the FileConverter.FileConverterCtrl.1 control, (2) Login function in the LoginContoller.LoginControllerCtrl.1 control, or (3) GetThumbnail function in the WESPPlayback.WESPPlaybackCtrl.1 control.
[ "cpe:2.3:a:webgateinc:control_center:-:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-263c-689v-jcfh
IBM App Connect Enterprise 12.0.1.0 through 12.0.12.1 could allow an authenticated user to obtain sensitive calendar information using an expired access token. IBM X-Force ID: 288174.
[]
null
4.3
null
null
GHSA-4rmv-m7cx-wvg4
Memory corruption occurs while connecting a STA to an AP and initiating an ADD TS request from the AP to establish a TSpec session.
[]
null
7.5
null
null
GHSA-vprp-2v9g-mvjw
Readymade Video Sharing Script 3.2 has SQL Injection via the single-video-detail.php report_videos array parameter.
[]
null
null
9.8
null
CVE-2023-40273
Session fixation in Apache Airflow web interface
The session fixation vulnerability allowed the authenticated user to continue accessing Airflow webserver even after the password of the user has been reset by the admin - up until the expiry of the session of the user. Other than manually cleaning the session database (for database session backend), or changing the secure_key and restarting the webserver, there were no mechanisms to force-logout the user (and all other users with that). With this fix implemented, when using the database session backend, the existing sessions of the user are invalidated when the password of the user is reset. When using the securecookie session backend, the sessions are NOT invalidated and still require changing the secure key and restarting the webserver (and logging out all other users), but the user resetting the password is informed about it with a flash message warning displayed in the UI. Documentation is also updated explaining this behaviour. Users of Apache Airflow are advised to upgrade to version 2.7.0 or newer to mitigate the risk associated with this vulnerability.
[ "cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*" ]
null
8
null
null
RHSA-2013:0826
Red Hat Security Advisory: acroread security update
acroread: Unspecified vulnerability allows remote attackers to execute arbitrary code (CanSecWest 2013) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: unspecified information leak issue (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15) acroread: multiple code execution flaws (APSB13-15)
[ "cpe:/a:redhat:rhel_extras:5::server", "cpe:/a:redhat:rhel_extras:6" ]
null
null
null
null
CVE-2019-10886
An incorrect access control exists in the Sony Photo Sharing Plus application in the firmware before PKG6.5629 version (for the X7500D TV and other applicable TVs). This vulnerability allows an attacker to read arbitrary files without authentication over HTTP when Photo Sharing Plus application is running. This may allow an attacker to browse a particular directory (e.g. images) inside the private network.
[ "cpe:2.3:a:sony:photo_sharing_plus:*:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-50w800c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-50w805c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-50w807c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-50w809c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-50w820c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-55w800c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-55w805c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-65w850c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-65w855c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-65w857c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-75w850c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:kdl-75w855c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:x7500d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-100z9d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-43x800d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-43x800e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-43x830c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x700d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x800c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x800d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x800e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x830c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x835c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x835d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x837c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x839c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-49x900e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55a1e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x700d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x800e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x805c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x806e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x807c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x809c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x810c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x850c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x850d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x855c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x855d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x857c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x857d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x900c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x900e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x905c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x907c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x930d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-55x930e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65a1e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x750d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x800c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x805c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x807c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x809c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x810c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x850c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x850d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x850e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x855c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x855d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x857c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x857d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x900c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x900e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x905c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x907c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x930c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x930d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x930e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x935d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65x937d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-65z9d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x850c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x850d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x850e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x855c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x855d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x857d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x900e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x910c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x940c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x940d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x940e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75x945c:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-75z9d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-77a1e:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-85x850d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-85x855d:-:*:*:*:*:*:*:*", "cpe:2.3:h:sony:xbr-85x857d:-:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
CVE-2010-2217
Adobe Flash Media Server (FMS) before 3.0.6, and 3.5.x before 3.5.4, allows attackers to execute arbitrary code via unspecified vectors, related to a "JS method vulnerability."
[ "cpe:2.3:a:adobe:flash_media_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:2.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server_2:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_media_server_2:2.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-hcm6-7qq9-x3j3
An issue was discovered in Zoho ManageEngine Netflow Analyzer Professional 7.0.0.2. XSS exists in the Administration zone /netflow/jspui/scheduleConfig.jsp file via these GET parameters: devSrc, emailId, excWeekModify, filterFlag, getFilter, mailReport, mset, popup, rep_schedule, rep_Type, schDesc, schName, schSource, selectDeviceDone, task, val10, and val11.
[]
null
null
null
null
GHSA-79rc-fcmg-3r4m
An issue was discovered in Insyde InsydeH2O with kernel 5.0 through 5.5. Due to insufficient input validation, an attacker can tamper with a runtime-accessible EFI variable to cause a dynamic BAR setting to overlap SMRAM.
[]
null
5.5
null
null
CVE-2002-0392
Apache 1.3 through 1.3.24, and Apache 2.0 through 2.0.36, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a chunk-encoded HTTP request that causes Apache to use an incorrect size.
[ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2010-3687
Unspecified vulnerability in the powermail extension 1.5.3 and earlier for TYPO3 allows remote attackers to bypass validation have an unspecified impact by "[injecting] arbitrary values into validated fields," as demonstrated using the (1) Email and (2) URL fields.
[ "cpe:2.3:a:alex_kellner:powermail:*:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.13:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.14:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.15:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.3.16:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:alex_kellner:powermail:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2019-9721
A denial of service in the subtitle decoder in FFmpeg 3.2 and 4.1 allows attackers to hog the CPU via a crafted video file in Matroska format, because handle_open_brace in libavcodec/htmlsubtitles.c has a complex format argument to sscanf.
[ "cpe:2.3:a:ffmpeg:ffmpeg:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2013-1463
Cross-site scripting (XSS) vulnerability in js/tabletools/zeroclipboard.swf in the WP-Table Reloaded module before 1.9.4 for Wordpress allows remote attackers to inject arbitrary web script or HTML via the id parameter. NOTE: this might be the same vulnerability as CVE-2013-1808. If so, it is likely that CVE-2013-1463 will be REJECTed.
[ "cpe:2.3:a:wp-table_reloaded_project:wp-table_reloaded:*:*:*:*:*:wordpress:*:*" ]
null
null
null
4.3
GHSA-mrwc-m279-7475
An information disclosure vulnerability exists when Visual Studio improperly discloses limited contents of uninitialized memory while compiling program database (PDB) files, aka "Microsoft Visual Studio Information Disclosure Vulnerability." This affects Microsoft Visual Studio.
[]
null
null
4.3
null
CVE-2014-7650
The JJA- Juvenile Justice Act 1986 (aka com.felix.jja) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:ashok88:jja-_juvenile_justice_act_1986:1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-r4hv-f4m8-f2vr
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability.
[]
null
null
null
null
RHSA-2013:0247
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: RMI CGIHandler XSS issue (RMI, 6563318) OpenJDK: logging insufficient access control checks (Libraries, 6664509) OpenJDK: logging insufficient access control checks (Libraries, 6664528) OpenJDK: invalid threads subject to interrupts (Libraries, 6776941) OpenJDK: reflection API incorrect checks for proxy classes (Libraries, 7197546, SE-2012-01 Issue 29) OpenJDK: PresentationManager incorrectly shared (CORBA, 7141694) OpenJDK: JMX Introspector missing package access check (JMX, 8000539, SE-2012-01 Issue 52) OpenJDK: insufficient clipboard access premission checks (AWT, 7186952) OpenJDK: InetSocketAddress serialization issue (Networking, 7201071) OpenJDK: loadPropertyFile missing restrictions (JAXP, 8001235) OpenJDK: com.sun.xml.internal.* not restricted packages (JAX-WS, 7201068) OpenJDK: CPU consumption DoS via repeated SSL ClientHello packets (JSSE, 7192393) OpenJDK: missing serialization restriction (CORBA, 7201066) OpenJDK: insufficient privilege checking issue (AWT, 7192977) OpenJDK: insufficient Diffie-Hellman public key checks (JSSE, 7192392) OpenJDK: MethodFinder insufficient checks for cached results (Beans, 7200493) OpenJDK: insufficient privilege checking issue (AWT, 8001057) OpenJDK: RequiredModelMBean missing access control context checks (JMX, 8000537) OpenJDK: IIOP type reuse sandbox bypass (CORBA, 8000540, SE-2012-01 Issue 50) OpenJDK: missing ValueHandlerImpl class constructor access restriction (CORBA, 8000631) OpenJDK: image parser insufficient raster parameter checks (2D, 8001972) OpenJDK: image parser insufficient raster parameter checks (AWT, 8002325)
[ "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-9r9r-237v-592p
The admin page in the Banckle Chat module for Drupal does not properly restrict access, which allows remote attackers to bypass intended restrictions via unspecified vectors.
[]
null
null
null
null
CVE-2021-20873
Yappli is an application development platform which provides the function to access a requested URL using Custom URL Scheme. When Android apps are developed with Yappli versions since v7.3.6 and prior to v9.30.0, they are vulnerable to improper authorization in Custom URL Scheme handler, and may be directed to unintended sites via a specially crafted URL.
[ "cpe:2.3:a:yappli:yappli:*:*:*:*:*:*:*:*" ]
null
8.1
null
5.8
GHSA-7xj2-pmr5-pppr
A vulnerability has been identified in Parasolid V34.0 (All versions < V34.0.254), Parasolid V34.1 (All versions < V34.1.242), Parasolid V35.0 (All versions < V35.0.170), Parasolid V35.1 (All versions < V35.1.150), Solid Edge SE2022 (All versions < V2210Update12). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
CVE-2015-7850
ntpd in NTP 4.2.x before 4.2.8p4, and 4.3.x before 4.3.77 allows remote authenticated users to cause a denial of service (infinite loop or crash) by pointing the key file at the log file.
[ "cpe:2.3:a:ntp:ntp:*:*:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:-:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta4:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-beta5:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p1-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p2-rc3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc1:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc2:*:*:*:*:*:*", "cpe:2.3:a:ntp:ntp:4.2.8:p3-rc3:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:clustered_data_ontap:*:*", "cpe:2.3:o:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:data_ontap:-:*:*:*:*:7-mode:*:*" ]
null
6.5
null
4
CVE-2015-8597
Open redirect vulnerability in Blue Coat ProxySG 6.5 before 6.5.8.8 and 6.6 and Advanced Secure Gateway (ASG) 6.6 might allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a base64-encoded URL in conjunction with a "clear text" one in a coaching page, as demonstrated by "http://www.%humbug-URL%.local/bluecoat-splash-API?%BASE64-URL%."
[ "cpe:2.3:a:bluecoat:proxysg:*:*:*:*:*:*:*:*", "cpe:2.3:a:bluecoat:advanced_secure_gateway:6.6:*:*:*:*:*:*:*" ]
null
null
7.4
5.8
GHSA-49gc-vgp4-6qhm
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
[]
null
9.8
null
null
GHSA-gw4h-44cr-6fpj
IBM i2 Analyst Notebook 9.2.0 and 9.2.1 could allow a local attacker to execute arbitrary code on the system, caused by a memory corruption. By persuading a victim to open a specially-crafted file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-Force ID: 187870.
[]
null
null
null
null
GHSA-c9wm-h66h-5r4v
IBM Security Directory Suite 8.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 228568.
[]
null
3.7
null
null
GHSA-q87v-2f9c-89c7
In JetBrains YouTrack before 2023.3.22268 authorization check for inline comments inside thread replies was missed
[]
null
4.3
null
null
GHSA-mc7p-wjfw-r9hm
SQL injection vulnerability in login.php in Itsourcecode Online Discussion Forum Project in PHP with Source Code 1.0 allows remote attackers to execute arbitrary SQL commands via the email parameter.
[]
null
8.2
null
null
GHSA-c6hh-m799-ch2w
Elevation of privilege and/or unauthorized access vulnerability in Micro Focus Identity Manager. Affecting versions prior to 4.7.3 and 4.8.1 hot fix 1. The vulnerability could allow information exposure that can result in an elevation of privilege or an unauthorized access.
[]
null
null
null
null
GHSA-53pp-49v8-q8r5
Multiple PHP remote file inclusion vulnerabilities in Ay System Solutions CMS 2.6 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the path[ShowProcessHandle] parameter to (1) home.php or (2) impressum.php. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
[]
null
null
null
null
CVE-2010-5164
Race condition in KingSoft Personal Firewall 9 Plus 2009.05.07.70 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute
[ "cpe:2.3:a:kingsoft:personal_firewall_9:2009.05.07.70:-:plus:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*" ]
null
5.3
null
6.2
CVE-2020-24901
The default installation of Krpano Panorama Viewer version <=1.20.8 is vulnerable to Reflected XSS due to insecure remote js load in file viewer/krpano.html, parameter plugin[test].url.
[ "cpe:2.3:a:krpano:krpano:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-3m59-fh79-m7m6
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in creativeon WHMpress allows Reflected XSS.This issue affects WHMpress: from n/a through 6.2-revision-5.
[]
null
7.1
null
null
GHSA-723g-x9c7-6562
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
[]
null
5.6
null
null
CVE-2021-20802
HTTP header injection vulnerability in Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to alter the information stored in the product.
[ "cpe:2.3:a:cybozu:remote_service_manager:3.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:cybozu:remote_service_manager:3.1.9:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2009-1319
Directory traversal vulnerability in includes/ini.inc.php in GuestCal 2.1 allows remote attackers to include and execute arbitrary files via a .. (dot dot) in the lang parameter to index.php.
[ "cpe:2.3:a:guestcal:guest_cal:2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-4444-267r-x82x
The HTTP client in Cisco IOS 12.4 and 15.0 allows user-assisted remote attackers to cause a denial of service (device crash) via a malformed HTTP response to a request for service installation, aka Bug ID CSCts12249.
[]
null
null
null
null
GHSA-xjh6-c3wh-vvr4
The mintToken function of a smart contract implementation for RobotBTC, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
null
7.5
null
CVE-2011-3349
lightdm before 0.9.6 writes in .dmrc and Xauthority files using root permissions while the files are in user controlled folders. A local user can overwrite root-owned files via a symlink, which can allow possible privilege escalation.
[ "cpe:2.3:a:lightdm_project:lightdm:*:*:*:*:*:*:*:*" ]
null
7.8
null
7.2
CVE-2021-46986
usb: dwc3: gadget: Free gadget structure only after freeing endpoints
In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Free gadget structure only after freeing endpoints As part of commit e81a7018d93a ("usb: dwc3: allocate gadget structure dynamically") the dwc3_gadget_release() was added which will free the dwc->gadget structure upon the device's removal when usb_del_gadget_udc() is called in dwc3_gadget_exit(). However, simply freeing the gadget results a dangling pointer situation: the endpoints created in dwc3_gadget_init_endpoints() have their dep->endpoint.ep_list members chained off the list_head anchored at dwc->gadget->ep_list. Thus when dwc->gadget is freed, the first dwc3_ep in the list now has a dangling prev pointer and likewise for the next pointer of the dwc3_ep at the tail of the list. The dwc3_gadget_free_endpoints() that follows will result in a use-after-free when it calls list_del(). This was caught by enabling KASAN and performing a driver unbind. The recent commit 568262bf5492 ("usb: dwc3: core: Add shutdown callback for dwc3") also exposes this as a panic during shutdown. There are a few possibilities to fix this. One could be to perform a list_del() of the gadget->ep_list itself which removes it from the rest of the dwc3_ep chain. Another approach is what this patch does, by splitting up the usb_del_gadget_udc() call into its separate "del" and "put" components. This allows dwc3_gadget_free_endpoints() to be called before the gadget is finally freed with usb_put_gadget().
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2019-2966
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*" ]
null
6.5
null
4
GHSA-c3gq-qcr6-5vj9
Improper removal of sensitive data in the entry edit feature of Hub Business submodule in Devolutions Remote Desktop Manager PowerShell Module 2022.3.1.5 and earlier allows an authenticated user to access sensitive data on entries that were edited using the affected submodule.
[]
null
6.5
null
null
GHSA-654p-55pp-9qjq
libjbig2dec.a in Artifex jbig2dec 0.13, as used in MuPDF and Ghostscript, has a NULL pointer dereference in the jbig2_huffman_get function in jbig2_huffman.c. For example, the jbig2dec utility will crash (segmentation fault) when parsing an invalid file.
[]
null
6.5
null
null
GHSA-q89x-f52w-6hj2
Headers containing newline characters can split messages in hyper
Serializing of headers to the socket did not filter the values for newline bytes (\r or \n), which allowed for header values to split a request or response. People would not likely include newlines in the headers in their own applications, so the way for most people to exploit this is if an application constructs headers based on unsanitized user input.This issue was fixed by replacing all newline characters with a space during serialization of a header value.
[]
null
null
5.3
null
GHSA-p345-jmhp-7wg2
The Icegram Express formerly known as Email Subscribers WordPress plugin before 5.7.52 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
[]
null
3.5
null
null
GHSA-p938-837q-c8xf
Multiple cross-site scripting (XSS) vulnerabilities in Habari 0.6.5, when register_globals is enabled, allow remote attackers to inject arbitrary web script or HTML via the (1) additem_form parameter to system/admin/dash_additem.php and the (2) status_data[] parameter to system/admin/dash_status.php. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-9c95-h326-chqh
automount in Mac OS X 10.4.5 and earlier allows remote file servers to cause a denial of service (unresponsiveness) or execute arbitrary code via unspecified vectors that cause automount to "mount file systems with reserved names".
[]
null
null
null
null
GHSA-wj7w-628g-2cg9
SurfControl SuperScout only filters packets containing both an HTTP GET request and a Host header, which allows local users to bypass filtering by fragmenting packets so that no packet contains both data elements.
[]
null
null
null
null
GHSA-h99h-x74p-9vw5
plugins/scmcvs/www/cvsweb.php in the CVSWeb CGI in GForge 4.5.16 before 20070524, aka gforge-plugin-scmcvs, allows remote attackers to execute arbitrary commands via shell metacharacters in the PATH_INFO.
[]
null
null
null
null
GHSA-44vf-8ffm-v2qh
Sensitive Data Exposure in rails-session-decoder
All versions of `rails-session-decoder` are missing verification of the Message Authentication Code appended to the cookies. This may lead to decryption of cipher text thus exposing encrypted information.RecommendationNo fix is currently available. Consider using an alternative module until a fix is made available.
[]
null
null
null
null
CVE-2022-27790
Adobe Acrobat Reader DC Font Parsing Use-After-Free Remote Code Execution Vulnerability
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by a use-after-free vulnerability in the processing of fonts that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
null
null
7.8
null
CVE-2010-1852
Microsoft Internet Explorer, when the Invisible Hand extension is enabled, uses cookies during background HTTP requests in a possibly unexpected manner, which might allow remote web servers to identify specific persons and their product searches via HTTP request logging, related to a "cross-site data leakage" issue.
[ "cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-3w4j-cfcj-wj69
XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.
[]
null
7.8
null
null
CVE-2024-7838
itsourcecode Online Food Ordering System addcategory.php sql injection
A vulnerability was found in itsourcecode Online Food Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /addcategory.php. The manipulation of the argument cname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:itsourcecode:online_food_ordering_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:kevinwong:online_food_ordering_system:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
CVE-2020-15860
Parallels Remote Application Server (RAS) 17.1.1 has a Business Logic Error causing remote code execution. It allows an authenticated user to execute any application in the backend operating system through the web application, despite the affected application not being published. In addition, it was discovered that it is possible to access any host in the internal domain, even if it has no published applications or the mentioned host is no longer associated with that server farm.
[ "cpe:2.3:a:parallels:remote_application_server:17.1.1:*:*:*:*:*:*:*" ]
null
9.9
null
6.5
CVE-2023-50894
In Janitza GridVis through 9.0.66, use of hard-coded credentials in the de.janitza.pasw.feature.impl.activators.PasswordEncryption password encryption function allows remote authenticated administrative users to discover cleartext database credentials contained in error report information.
[ "cpe:2.3:a:janitza:gridvis:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-8rcx-6793-p6gv
An issue was discovered in CutePHP CuteNews 2.1.2. An attacker can infiltrate the server through the avatar upload process in the profile area via the avatar_file field to index.php?mod=main&opt=personal. There is no effective control of $imgsize in /core/modules/dashboard.php. The header content of a file can be changed and the control can be bypassed for code execution. (An attacker can use the GIF header for this.)
[]
null
null
8.8
null
CVE-2022-25048
Command injection vulnerability in CWP v0.9.8.1126 that allows normal users to run commands as the root user.
[ "cpe:2.3:a:control-webpanel:webpanel:0.9.8.1126:*:*:*:*:*:*:*" ]
null
8.8
null
9
GHSA-5fp9-mpp5-899v
Under certain conditions, SAP Contact Center - version 700, does not sufficiently encode user-controlled inputs. This allows an attacker to exploit a Reflected Cross-Site Scripting (XSS) vulnerability when creating a new email and to execute arbitrary code on the victim's browser.
[]
null
null
null
null
CVE-2024-8780
The SYSCOM Group OMFLOW - Improper Authorization for Data Query Function
OMFLOW from The SYSCOM Group does not properly restrict the query range of its data query functionality, allowing remote attackers with regular privileges to obtain accounts and password hashes of other users.
[ "cpe:2.3:a:syscomgo:omflow:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2024-51850
WordPress WoW Guild Armory Roster plugin <= 0.5.5 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bchristopeit WoW Guild Armory Roster allows Stored XSS.This issue affects WoW Guild Armory Roster: from n/a through 0.5.5.
[]
null
6.5
null
null
cisco-sa-utd-snort3-dos-bypas-b4OUEwxD
Cisco Unified Threat Defense Snort Intrusion Prevention System Engine for Cisco IOS XE Software Security Policy Bypass and Denial of Service Vulnerability
A vulnerability in Cisco Unified Threat Defense (UTD) Snort Intrusion Prevention System (IPS) Engine for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass configured security policies or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of HTTP requests when they are processed by Cisco UTD Snort IPS Engine. An attacker could exploit this vulnerability by sending a crafted HTTP request through an affected device. A successful exploit could allow the attacker to trigger a reload of the Snort process. If the action in case of Cisco UTD Snort IPS Engine failure is set to the default, fail-open, successful exploitation of this vulnerability could allow the attacker to bypass configured security policies. If the action in case of Cisco UTD Snort IPS Engine failure is set to fail-close, successful exploitation of this vulnerability could cause traffic that is configured to be inspected by Cisco UTD Snort IPS Engine to be dropped. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.8
null
null
CVE-2023-39374
ForeScout NAC SecureConnector – CWE-427: Uncontrolled Search Path Element
ForeScout NAC SecureConnector version 11.2 - CWE-427: Uncontrolled Search Path Element
[ "cpe:2.3:a:forescout:secureconnector:11.2:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2021-35569
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: Diagnostics). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Applications Manager accessible data. CVSS 3.1 Base Score 4.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*" ]
null
4.9
null
null
CVE-2023-37885
WordPress RealHomes theme <= 4.0.2 - Broken Access Control vulnerability
Missing Authorization vulnerability in InspiryThemes RealHomes.This issue affects RealHomes: from n/a through 4.0.2.
[]
null
4.3
null
null
RHBA-2015:0965
Red Hat Bug Fix Advisory: nss, nss-util, and nspr bug fix and enhancement update
nss: QuickDER decoder length issue
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
CVE-2021-41142
XSS via the name of a deleted attachment
Tuleap Open ALM is a libre and open source tool for end to end traceability of application and system developments. There is a cross-site scripting vulnerability in Tuleap Community Edition prior to 12.11.99.25 and Tuleap Enterprise Edition 12.11-2. A malicious user with the capability to add and remove attachment to an artifact could force a victim to execute uncontrolled code. Tuleap Community Edition 11.17.99.146 and Tuleap Enterprise Edition 12.11-2 contain a fix for the issue.
[ "cpe:2.3:a:enalean:tuleap:*:*:*:*:community:*:*:*", "cpe:2.3:a:enalean:tuleap:*:*:*:*:enterprise:*:*:*" ]
null
5.4
null
null
GHSA-xwrh-qxmc-x8c8
Concrete CMS Cross-site Scripting (XSS) in the Advanced File Search Filter
Concrete CMS versions 9 below 9.2.8 and versions below 8.5.16 are vulnerable to Cross-site Scripting (XSS) in the Advanced File Search Filter. Prior to the fix, a rogue administrator could add malicious code in the file manager because of insufficient validation of administrator provided data. All administrators have access to the File Manager and hence could create a search filter with the malicious code attached. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:L/A:L https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator .
[]
null
3.1
null
null
GHSA-m2jh-3vm2-49rv
Stack-based buffer overflow in the yyerror function in lib/cgraph/scan.l in Graphviz 2.34.0 allows remote attackers to have unspecified impact via a long line in a dot file.
[]
null
null
null
null
RHSA-2010:1002
Red Hat Security Advisory: mod_auth_mysql security update
mod_auth_mysql: character encoding SQL injection flaw
[ "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
CVE-2007-2132
Unspecified vulnerability in the PeopleTools component in Oracle PeopleSoft Enterprise 8.47.12 and 8.48.08 has unknown impact and attack vectors, aka PSE02.
[ "cpe:2.3:a:oracle:peoplesoft_enterprise:8.47.12:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise:8.48.08:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-qjqc-gw55-mpmx
The Candlepin component of Red Hat Satellite was affected by an improper authentication flaw. Few factors could allow an attacker to use the SCA (simple content access) certificate for authentication with Candlepin.
[]
null
5.5
null
null
GHSA-7mxx-3cgm-xxv3
API Platform Core does not call GraphQl securityAfterResolver
SummaryA security check that gets called after GraphQl resolvers is always replaced by another one as there's no break in this clause: https://github.com/api-platform/core/pull/6444/files#diff-09e3c2cfe12a2ce65bd6c983c7ca6bfcf783f852b8d0554bb938e8ebf5e5fa65R56https://github.com/soyuka/core/blob/7e2e8f9ff322ac5f6eb5f65baf432bffdca0fd51/src/Symfony/Security/State/AccessCheckerProvider.php#L49-L57PoCCreate a graphql endpoint with a security after resolver.ImpactAs this fallsback to `security`, the impact is there only when there's only a security after resolver and none inside security. The test at https://github.com/api-platform/core/pull/6444 is probably broken.
[]
null
4.4
null
null
GHSA-7rw2-3hhp-rc46
Cross-site Scripting Vulnerability in Statement Browser
ImpactA maliciously crafted xAPI statement could be used to perform script or other tag injection in the LRS Statement Browser.PatchesThe problem is patched in version 1.2.17 of the LRS library and [version 0.7.5 of SQL LRS](https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5).WorkaroundsNo workarounds exist, we recommend upgrading to version 1.2.17 of the library or version 0.7.5 of SQL LRS immediately.References[LRS Tag](https://github.com/yetanalytics/lrs/releases/tag/v1.2.17)[LRS lib on Clojars](https://clojars.org/com.yetanalytics/lrs/versions/1.2.17)[SQL LRS 0.7.5 Release](https://github.com/yetanalytics/lrsql/releases/tag/v0.7.5)
[]
null
4.6
null
null
GHSA-2xh8-rvm9-h559
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
null
null
cisco-sa-ipphone-arbfileread-NPdtE2Ow
Cisco IP Phone Software Arbitrary File Read Vulnerability
A vulnerability in the debug shell of Cisco IP Phone software could allow an authenticated, local attacker to read any file on the device file system. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by providing crafted input to a debug shell command. A successful exploit could allow the attacker to read any file on the device file system. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
5.5
null
null
GHSA-p44w-q7f3-xgf6
Microsoft Windows Media Player 11 (wmplayer.exe) allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted .au file that triggers a divide-by-zero error, as demonstrated by iapetus.au.
[]
null
null
null
null
GHSA-c2hj-c545-q4g6
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in everestthemes Grace Mag allows PHP Local File Inclusion. This issue affects Grace Mag: from n/a through 1.1.5.
[]
null
7.5
null
null
GHSA-7h2x-hwcf-f9q6
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Stored Procedure). Supported versions that are affected are 8.0.30 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
RHSA-2019:4168
Red Hat Security Advisory: kernel security and bug fix update
kernel: brcmfmac heap buffer overflow in brcmf_wowl_nd_results
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor", "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
6.5
null
GHSA-qhw9-28qw-h5h8
Research in Motion (RIM) BlackBerry Handheld web browser for BlackBerry Handheld before 4.0.2 allows remote attackers to cause a denial of service (hang) via a Java Application Description (JAD) file with a long application name and vendor string, which prevents a browser dialog from being properly dismissed.
[]
null
null
null
null
GHSA-543r-2767-7774
Insufficient policy enforcement in WebUI in Google Chrome prior to 87.0.4280.141 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension.
[]
null
null
null
null
GHSA-9m8q-7xwp-9w66
Buffer overflow in the readstr_upto function in plug-ins/script-fu/tinyscheme/scheme.c in GIMP 2.6.12 and earlier, and possibly 2.6.13, allows remote attackers to execute arbitrary code via a long string in a command to the script-fu server.
[]
null
null
null
null
GHSA-62m2-jrj9-gqh5
Multiple vulnerabilities exists in Aruba Instate before 4.1.3.0 and 4.2.3.1 due to insufficient validation of user-supplied input and insufficient checking of parameters, which could allow a malicious user to bypass security restrictions, obtain sensitive information, perform unauthorized actions and execute arbitrary code.
[]
null
9.8
null
null
GHSA-r4c9-h547-774j
** DISPUTED ** An issue was discovered in SMA Solar Technology products. By sending nonsense data or setting up a TELNET session to the database port of Sunny Explorer, the application can be crashed. NOTE: the vendor reports that the maximum possible damage is a communication failure. Also, only Sunny Boy TLST-21 and TL-21 and Sunny Tripower TL-10 and TL-30 could potentially be affected.
[]
null
null
7.5
null