id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
CVE-2019-14400
cPanel before 78.0.18 allows local users to escalate to root access because of userdata cache misparsing (SEC-479).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
null
CVE-2020-9977
A validation issue existed in the entitlement verification. This issue was addressed with improved validation of the process entitlement. This issue is fixed in macOS Big Sur 11.0.1, iOS 14.0 and iPadOS 14.0. A malicious application may be able to determine a user's open tabs in Safari.
[ "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
null
GHSA-m9f8-wwhq-rgp2
An issue was discovered on Connectize AC21000 G6 641.139.1.1256 allows attackers to gain escalated privileges on the device via poor credential management.
[]
null
9.8
null
null
null
CVE-2006-3727
Multiple SQL injection vulnerabilities in Eskolar CMS 0.9.0.0 allow remote attackers to execute arbitrary SQL commands via the (1) gr_1_id, (2) gr_2_id, (3) gr_3_id, and (4) doc_id parameters in (a) index.php; the (5) uid and (6) pwd parameters in (b) php/esa.php; and possibly other vectors related to files in php/lib/ including (c) del.php, (d) download_backup.php, (e) navig.php, (f) restore.php, (g) set_12.php, (h) set_14.php, and (i) upd_doc.php.
[ "cpe:2.3:a:eskolar_cms:eskolar_cms:0.9.0.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
cisco-sa-amp-redirect-rQ2Bu7dU
Cisco Orbital Open Redirect Vulnerability
A vulnerability in the web-based management interface of Cisco Orbital could allow an unauthenticated, remote attacker to redirect users to a malicious webpage. This vulnerability is due to improper validation of URL paths in the web-based management interface. An attacker could exploit this vulnerability by persuading a user to click a crafted URL. A successful exploit could allow the attacker to redirect a user to a malicious website. This vulnerability, known as an open redirect attack, is used in phishing attacks to persuade users to visit malicious sites. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-amp-redirect-rQ2Bu7dU"]
[]
null
4.7
null
null
null
GHSA-pv82-pww5-29fv
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
[]
null
null
4.6
null
null
GHSA-r5wv-5gpc-84mq
Zimbra Collaboration before 8.6.0 patch5 has XSS.
[]
null
null
null
null
null
ICSA-20-182-02
Mitsubishi Electric Factory Automation Engineering Software Products
The vulnerability could allow a malicious attacker to send a file on the computer running the product to the outside.CVE-2020-5602 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). The vulnerability could allow a malicious attacker to cause the product to enter a denial-of-service condition.CVE-2020-5603 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
[]
null
null
7.5
null
null
GHSA-6jhq-gx6q-28qv
An array index error in the fig2dev program in Xfig 3.2.6a allows remote attackers to cause a denial-of-service attack or information disclosure with a maliciously crafted Fig format file, related to a negative font value in dev/gentikz.c, and the read_textobject functions in read.c and read1_3.c.
[]
null
null
7.1
null
null
CVE-2023-52439
uio: Fix use-after-free in uio_open
In the Linux kernel, the following vulnerability has been resolved: uio: Fix use-after-free in uio_open core-1 core-2 ------------------------------------------------------- uio_unregister_device uio_open idev = idr_find() device_unregister(&idev->dev) put_device(&idev->dev) uio_device_release get_device(&idev->dev) kfree(idev) uio_free_minor(minor) uio_release put_device(&idev->dev) kfree(idev) ------------------------------------------------------- In the core-1 uio_unregister_device(), the device_unregister will kfree idev when the idev->dev kobject ref is 1. But after core-1 device_unregister, put_device and before doing kfree, the core-2 may get_device. Then: 1. After core-1 kfree idev, the core-2 will do use-after-free for idev. 2. When core-2 do uio_release and put_device, the idev will be double freed. To address this issue, we can get idev atomic & inc idev reference with minor_lock.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.18:-:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.18:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.18:rc6:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.18:rc7:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:4.18:rc8:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-qpvh-wpmg-5vw6
Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program.
[]
null
null
null
null
null
GHSA-339p-fqmm-2qfx
A vulnerability was found in xxyopen Novel-Plus 5.1.0. It has been classified as critical. This affects the function searchByPage of the file /book/searchByPage. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
6.3
null
null
null
GHSA-5fwx-p6xh-vjrh
Mattermost allows reading arbitrary files related to importing boards
Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate board blocks when importing boards which allows an attacker could read any arbitrary file on the system via importing and exporting a specially crafted import archive in Boards.
[]
null
9.9
null
null
null
CVE-2023-24140
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the NetDiagPingNum parameter in the setNetworkDiag function.
[ "cpe:2.3:o:totolink:ca300-poe_firmware:6.2c.884:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:ca300-poe:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
null
GHSA-6pgm-h8pf-fjp8
ZipTorrent 1.3.7.3 stores sensitive information in plaintext in the pref.txt file, which allows local users to obtain sensitive information such as proxy server information and passwords.
[]
null
null
null
null
null
CVE-2025-1509
Show Me The Cookies <= 1.0 - Unauthenticated Arbitrary Shortcode Execution
The The Show Me The Cookies plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.
[]
null
7.3
null
null
null
CVE-2013-1742
Multiple cross-site scripting (XSS) vulnerabilities in editflagtypes.cgi in Bugzilla 2.x, 3.x, and 4.0.x before 4.0.11; 4.1.x and 4.2.x before 4.2.7; and 4.3.x and 4.4.x before 4.4.1 allow remote attackers to inject arbitrary web script or HTML via the (1) id or (2) sortkey parameter.
[ "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.14.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.16.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.6\\+:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.18.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.21.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:2.23.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.6:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.8:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.9:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.10:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.11:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.12:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.6.13:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2:rc1:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2:rc2:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:bugzilla:4.2.5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-ccmr-7m45-27wf
Stack-based buffer overflow in the DebugPrint function in MultiXTpm Application Server before 4.0.2d allows remote attackers to execute arbitrary code via a long string argument.
[]
null
null
null
null
null
CVE-2012-1683
Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to gssd.
[ "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.9:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*", "cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*" ]
null
null
null
5.9
null
CVE-2022-1869
Type Confusion in V8 in Google Chrome prior to 102.0.5005.61 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
GHSA-vj6h-9583-2qx2
Cross Site Scripting vulnerability in Leantime 3.0.6 allows a remote attacker to execute arbitrary code via the to-do title parameter.
[]
null
5.4
null
null
null
GHSA-g6rf-7www-ggmp
Insecure permissions in measure-cold-start v1.4.1 allows attackers to escalate privileges and compromise the customer cloud account.
[]
null
8.8
null
null
null
CVE-2019-11601
Path traversal in the backup & restore functionality of ProSyst mBS SDK and Bosch IoT Gateway Software
A directory traversal vulnerability in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to write or delete files at any location.
[ "cpe:2.3:a:bosch:iot_gateway_software:*:*:*:*:*:*:*:*", "cpe:2.3:a:bosch:prosyst_mbs_sdk:*:*:*:*:*:*:*:*" ]
null
null
9.1
null
null
GHSA-rrc6-3p6m-fxc6
The ip6_sk_dst_check function in net/ipv6/ip6_output.c in the Linux kernel before 3.10 allows local users to cause a denial of service (system crash) by using an AF_INET6 socket for a connection to an IPv4 interface.
[]
null
null
null
null
null
GHSA-wvgq-5h76-hrgf
The ArielBrailovsky-ViralAd plugin for WordPress is vulnerable to SQL Injection via the 'text' and 'id' parameters of the limpia() function in all versions up to, and including, 1.0.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. This only appears to be exploitable on very old versions of WordPress.
[]
null
7.5
null
null
null
CVE-2018-1450
IBM DB2 for Linux, UNIX and Windows (includes DB2 Connect Server) 9.7, 10.1, 10.5, and 11.1 contains a vulnerability that could allow a local user to overwrite arbitrary files owned by the DB2 instance owner. IBM X-Force ID: 140045.
[ "cpe:2.3:a:ibm:db2:9.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:db2:11.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
5.5
3.6
null
CVE-2023-30944
Moodle: minor sql injection risk in external wiki method for listing pages
The vulnerability was found Moodle which exists due to insufficient sanitization of user-supplied data in external Wiki method for listing pages. A remote attacker can send a specially crafted request to the affected application and execute limited SQL commands within the application database.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:a:fedoraproject:extra_packages_for_enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
5.6
null
null
null
CVE-2023-3460
Ultimate Member < 2.6.7 - Unauthenticated Privilege Escalation
The Ultimate Member WordPress plugin before 2.6.7 does not prevent visitors from creating user accounts with arbitrary capabilities, effectively allowing attackers to create administrator accounts at will. This is actively being exploited in the wild.
[ "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
null
GHSA-mfvw-r6f7-mjcf
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
[]
null
null
null
null
null
GHSA-cmgf-649f-vw86
A cross-site request forgery vulnerability exists in Sola Testimonials versions prior to 3.0.0. If this vulnerability is exploited, an attacker allows a user who logs in to the WordPress site where the affected plugin is enabled to access a malicious page. As a result, the user may perform unintended operations on the WordPress site.
[]
null
8.1
null
null
null
CVE-2019-5304
Some Huawei products have a buffer error vulnerability. An unauthenticated, remote attacker could send specific MPLS Echo Request messages to the target products. Due to insufficient input validation of some parameters in the messages, successful exploit may cause the device to reset.
[ "cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar120-s_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar1200-s_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar150-s_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar160_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar200-s_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar2200-s_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3200_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ar3600_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ips_module_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ips_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ngfw_module_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ngfw_module:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6300_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:netengine16ex_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r005c03:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r006c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s5700_firmware:v200r011c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s5700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r005c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r005c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r005c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r008c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r010c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:s6700_firmware:v200r011c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:s6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg1300_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg2300_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r003c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r005c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r008c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:srg3300_firmware:v200r008c50:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r001c60:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_antiddos8000_firmware:v500r005c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_antiddos8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6300_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6600:-:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
GHSA-gr2q-rxqg-mrrq
An Insertion of Sensitive Information into Log File vulnerability in Juniper Networks Junos OS and Junos OS Evolved allows a local, authenticated attacker with high privileges to access sensitive information.When another user performs a specific operation, sensitive information is stored as plain text in a specific log file, so that a high-privileged attacker has access to this information. This issue affects:Junos OS:All versions before 22.1R2-S2,22.1R3 and later versions,22.2 versions before 22.2R2-S1, 22.2R3,22.3 versions before 22.3R1-S2, 22.3R2;Junos OS Evolved:All versions before before 22.1R3-EVO,22.2-EVO versions before 22.2R2-S1-EVO, 22.2R3-EVO,22.3-EVO versions before 22.3R1-S1-EVO, 22.3R2-EVO.
[]
4.2
6.3
null
null
null
GHSA-q7ff-8r5v-7hm4
Multiple directory traversal vulnerabilities in GuppY 4.5.9 and earlier allow remote attackers to read and include arbitrary files via (1) the meskin parameter to admin/editorTypetool.php, or the lng parameter to the in admin/inc scripts (2) archbatch.php, (3) dbbatch.php, and (4) nwlmail.php.
[]
null
null
null
null
null
CVE-2023-27554
IBM WebSphere Application Server XML external entity injection
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 249185.
[ "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
null
cisco-sa-stealthsmc-rce-sfNBPjcS
Cisco Secure Network Analytics Remote Code Execution Vulnerability
A vulnerability in the web-based management interface of Cisco Secure Network Analytics could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system. This vulnerability is due to insufficient sanitization of user-provided data that is parsed into system memory. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system as the administrator user. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
8.8
null
null
null
CVE-2007-2314
Multiple SQL injection vulnerabilities in Crea-Book 1.0, and possibly earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) pseudo or (2) passe parameter to (a) configurer.php, (b) connect.php, (c) delete.php, (d) delete2.php, (e) index.php, (f) infos.php, (g) membres.php, (h) modif-infos.php, (i) modif-message.php, (j) modif.php, (k) uninstall.php, or (l) uninstall_table.php in admin/, different vectors than CVE-2007-2000. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:crea-book:crea-book:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
GHSA-w8gf-vcmf-6ww6
fusermount in FUSE before 2.4.1, if installed setuid root, allows local users to corrupt /etc/mtab and possibly modify mount options by performing a mount over a directory whose name contains certain special characters.
[]
null
null
null
null
null
RHSA-2002:146
Red Hat Security Advisory: mod_ssl security update for Stronghold
security flaw
[ "cpe:/a:redhat:rhel_stronghold:4" ]
null
null
null
null
null
GHSA-j65p-mxc9-p293
Stack-based buffer overflow in apc.c in Alternative PHP Cache (APC) 3.0.11 through 3.0.16 allows remote attackers to execute arbitrary code via a long filename.
[]
null
null
null
null
null
GHSA-f29x-jxpj-xpfj
Usermin through 1.850 allows a remote authenticated user to execute OS commands via command injection in a filename for the GPG module.
[]
null
8.8
null
null
null
GHSA-2wgh-rqx2-f94c
Pega Platform before 8.4.0 has a XSS issue via stream rule parameters used in the request header.
[]
null
null
null
null
null
RHSA-2023:3292
Red Hat Security Advisory: httpd24-httpd security update
httpd: HTTP request splitting with mod_rewrite and mod_proxy
[ "cpe:/a:redhat:rhel_software_collections:3::el7" ]
null
9.8
null
null
null
GHSA-f7qv-v8h9-5244
A flaw was found in the Linux Kernel. The tun/tap sockets have their socket UID hardcoded to 0 due to a type confusion in their initialization function. While it will be often correct, as tuntap devices require CAP_NET_ADMIN, it may not always be the case, e.g., a non-root user only having that capability. This would make tun/tap sockets being incorrectly treated in filtering/routing decisions, possibly bypassing network filters.
[]
null
5.5
null
null
null
GHSA-792w-295c-v45g
The WordPress Button Plugin MaxButtons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 9.7.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. Administrators can give button creation privileges to users with lower levels (contributor+) which would allow those lower-privileged users to carry out attacks.
[]
null
4.4
null
null
null
RHSA-2014:0406
Red Hat Security Advisory: java-1.7.0-openjdk security update
OpenJDK: Incorrect mlib/raster image validation (2D, 8027841) OpenJDK: Protect logger handlers (Libraries, 8029740) OpenJDK: AWT incorrect FlavorMap seperation (AWT, 8026797) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026801) OpenJDK: RSA unpadding timing issues (Security, 8027766) OpenJDK: Prevent SIGNATURE_PRIMITIVE_SET from being modified (Security, 8029745) OpenJDK: MethodHandle variable argument lists handling (Libraries, 8029844) OpenJDK: System.arraycopy() element race condition (Hotspot, 8029858) OpenJDK: ServiceLoader Exception handling security bypass (Libraries, 8031394) OpenJDK: Activation framework default command map caching (JAX-WS, 8025152) lcms: insufficient ICC profile version validation (OpenJDK 2D, 8031335) OpenJDK: missing randomization of JNDI DNS client query IDs (JNDI, 8030731) OpenJDK: Better ScriptEngineManager ScriptEngine management (Libraries, 8036794) OpenJDK: insecure temporary file use in unpack200 (Libraries, 8033618) OpenJDK: classfile parser invalid BootstrapMethods attribute length (Hotspot, 8034926) OpenJDK: insufficient escaping of window title string (Javadoc, 8026736) OpenJDK: Incorrect NIO channel separation (Libraries, 8026716) OpenJDK: JAXP CharInfo file access restriction (JAXP, 8029282) OpenJDK: AWT thread context handling (AWT, 8025010) OpenJDK: method handle call hierachy bypass (Libraries, 8032686) OpenJDK: incorrect caching of data initialized via TCCL (JAXB, 8025030) OpenJDK: JPEG decoder input stream handling (2D, 8029854) OpenJDK: incorrect caching of data initialized via TCCL (JAXWS, 8026188) OpenJDK: remove insecure Java Sound provider caching (Sound, 8026163)
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
null
GHSA-mfqv-qjxh-rprm
A CWE-15 "External Control of System or Configuration Setting" was discovered affecting the following devices manufactured by Advantech: EKI-6333AC-2G (<= 1.6.3), EKI-6333AC-2GD (<= v1.6.3) and EKI-6333AC-1GPO (<= v1.2.1). The vulnerability can be exploited by authenticated users by restoring a tampered configuration backup.
[]
null
7.2
null
null
null
GHSA-wp58-rvx4-98wm
Buffer overflow in Oreans Themida 2.1.8.0 allows remote attackers to execute arbitrary code via a crafted .TMD file.
[]
null
null
null
null
null
CVE-2023-28210
A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
null
GHSA-j9j7-vrc8-64wq
A vulnerability was discovered in the firmware builds after 8.0.2.3267 and prior to 8.1.3.1301 in CCX devices. A flaw in the firmware build process did not properly restrict access to a resource from an unauthorized actor.
[]
null
8.8
null
null
null
GHSA-pmv9-3xqp-8w42
Mesop has a local file Inclusion via static file serving functionality
A vulnerability has been discovered and fixed in Mesop that could potentially allow unauthorized access to files on the server hosting the Mesop application. The vulnerability was related to insufficient input validation in a specific endpoint. This could have allowed an attacker to access files not intended to be served.Users are strongly advised to update to the latest version of Mesop immediately. The latest version includes a fix for this vulnerability.We would like to thank @Letm3through for reporting this issue and proposing mitigations to address this issue.
[]
8.7
7.5
null
null
null
RHSA-2019:2037
Red Hat Security Advisory: fence-agents security, bug fix, and enhancement update
fence-agents: mis-handling of non-ASCII characters in guest comment fields
[ "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
5
null
null
GHSA-g9v2-vqj8-j8cx
Improper Privilege Management vulnerability in Pandora FMS on all allows Privilege Escalation. This vulnerability allows an unauthorised user to escalate and read sensitive files as if they were root. This issue affects Pandora FMS: from 700 through 773.
[]
null
8.5
null
null
null
GHSA-x5pq-ph4c-8g27
The Baseboard Management Controller(BMC) in HPE Cloudline CL5800 Gen9 Server; HPE Cloudline CL5200 Gen9 Server; HPE Cloudline CL4100 Gen10 Server; HPE Cloudline CL3100 Gen10 Server; HPE Cloudline CL5800 Gen10 Server BMC firmware has a local buffer overlfow in spx_restservice setactdir_func function.
[]
null
null
null
null
null
RHSA-2024:1864
Red Hat Security Advisory: Red Hat Single Sign-On 7.6.8 for OpenShift image enhancement and security update
keycloak: Log Injection during WebAuthn authentication or registration keycloak: Authorization Bypass keycloak: path transversal in redirection validation keycloak: org.keycloak.protocol.oidc: unvalidated cross-origin messages in checkLoginIframe leads to DDoS undertow: Out-of-memory Error after several closed connections with wildfly-http-client protocol
[ "cpe:/a:redhat:rhosemc:1.0::el8" ]
null
7.5
null
null
null
RHSA-2024:4211
Red Hat Security Advisory: kernel security and bug fix update
kernel: Bluetooth BR/EDR PIN Pairing procedure is vulnerable to an impersonation attack kernel: PCI interrupt mapping cause oops kernel: ovl: fix leaked dentry kernel: ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry kernel: platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios kernel: net: cdc_eem: fix tx fixup skb leak kernel: net: ti: fix UAF in tlan_remove_one kernel: net: qcom/emac: fix UAF in emac_remove kernel: udf: Fix NULL pointer dereference in udf_symlink function kernel: mISDN: fix possible use-after-free in HFC_cleanup() kernel: can: peak_pci: peak_pci_remove(): fix UAF kernel: usbnet: sanity check for maxpacket kernel: block: null_blk: end timed out poll request kernel: KVM: SVM: improper check in svm_set_x2apic_msr_interception allows direct access to host x2apic msrs kernel: EDAC/thunderx: Incorrect buffer size in drivers/edac/thunderx_edac.c kernel: mm/damon/vaddr-test: memory leak in damon_do_test_apply_three_regions() kernel: hwrng: core - Fix page fault dead lock on mmap-ed hwrng kernel: net/mlx5e: Fix operation precedence bug in port timestamping napi_poll context kernel: net/mlx5e: fix a potential double-free in fs_any_create_groups kernel: crypto: s390/aes - Fix buffer overread in CTR mode kernel: powerpc/imc-pmu: Add a null pointer check in update_events_in_group() kernel: powerpc/powernv: Add a null pointer check in opal_event_init() kernel: tipc: fix kernel warning when sending SYN message kernel: net/usb: kalmia: Don&#39;t pass act_len in usb_bulk_msg error path kernel: usb: config: fix iteration issue in &#39;usb_get_bos_descriptor()&#39; kernel: crypto: pcrypt - Fix hungtask for PADATA_RESET kernel: perf/core: Bail out early if the request AUX area is out of bound kernel: usb: typec: tcpm: Fix NULL pointer dereference in tcpm_pd_svdm() kernel: can: dev: can_put_echo_skb(): don&#39;t crash kernel if can_priv::echo_skb is accessed out of bounds kernel: TCP-spoofed ghost ACKs and leak leak initial sequence number kernel: tls: race between async notify and socket close kernel: tls: handle backlogging of crypto requests kernel: tls: race between tx work scheduling and socket close kernel: drm/amdgpu: use-after-free vulnerability kernel: ppp_async: limit MRU to 64K kernel: ipv6: sr: fix possible use-after-free and null-ptr-deref kernel: mm/swap: fix race when skipping swapcache kernel: Bluetooth: Avoid potential use-after-free in hci_error_reset kernel: net: ip_tunnel: prevent perpetual headroom growth kernel: mptcp: fix data re-injection from stale subflow kernel: net/bnx2x: Prevent access to a freed page in page_pool kernel: x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() kernel: RDMA/mlx5: Fix fortify source warning while accessing Eth segment kernel: crypto: qat - resolve race condition during AER recovery kernel: Squashfs: check the inode number is not the invalid value of zero kernel: netfilter: nf_tables: use timestamp to check for set element timeout kernel: wifi: nl80211: reject iftype change with mesh ID change kernel: wifi: mac80211: check/clear fast rx for non-4addr sta VLAN changes kernel: net/mlx5e: fix a double-free in arfs_create_groups kernel: wifi: mac80211: fix potential sta-link leak kernel: wifi: iwlwifi: dbg-tlv: ensure NUL termination kernel: mlxsw: spectrum_acl_tcam: Fix memory leak when canceling rehash work kernel: mlxsw: spectrum_acl_tcam: Fix memory leak during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during rehash kernel: mlxsw: spectrum_acl_tcam: Fix possible use-after-free during activity update kernel: erspan: make sure erspan_base_hdr is present in skb-&gt;head kernel: gro: fix ownership transfer kernel: net: ena: Fix incorrect descriptor free behavior kernel: net/mlx5e: Fix mlx5e_priv_init() cleanup flow kernel: net/mlx5: Properly link new fs rules into the tree kernel: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue kernel: mlxsw: spectrum_acl_tcam: Fix warning during rehash kernel: scsi: mpi3mr: Sanitise num_phys
[ "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.3
null
null
null
CVE-2025-0063
SQL Injection vulnerability in SAP NetWeaver AS for ABAP and ABAP Platform
SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability.
[]
null
8.8
null
null
null
GHSA-fpx2-fc33-q8qp
Huawei smart phones with earlier versions than ELLE-AL00B 9.1.0.222(C00E220R2P1) have a buffer overflow vulnerability. An attacker may intercept and tamper with the packet in the local area network (LAN) to exploit this vulnerability. Successful exploitation may cause the affected phone abnormal.
[]
null
null
null
null
null
CVE-2018-20629
PHP Scripts Mall Charity Donation Script readymadeb2bscript has directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2018/12 directory.
[ "cpe:2.3:a:charity_donation_script_project:charity_donation_script:-:*:*:*:*:*:*:*" ]
null
null
5.3
5
null
CVE-2020-8878
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.916. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9625.
[ "cpe:2.3:a:foxitsoftware:foxit_studio_photo:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
null
GHSA-3qg7-2p3j-xrqp
Product: AndroidVersions: Android SoCAndroid ID: A-278156680
[]
null
9.8
null
null
null
GHSA-hqrm-74p3-w275
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
[]
null
6.5
null
null
null
GHSA-fqv9-jjgw-rj7w
HCL Connections is vulnerable to a broken access control vulnerability that may allow an unauthorized user to update data in certain scenarios.
[]
null
3.7
null
null
null
CVE-2023-3688
Bylancer QuickJob GET Parameter sql injection
A vulnerability classified as critical has been found in Bylancer QuickJob 6.1. Affected is an unknown function of the component GET Parameter Handler. The manipulation of the argument keywords/gender leads to sql injection. It is possible to launch the attack remotely. VDB-234234 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:bylancer:quickjob:6.1:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
null
GHSA-xpmv-q85x-8hh8
On the D-Link DIR-615 before v20.12PTb04, once authenticated, this device identifies the user based on the IP address of his machine. By spoofing the IP address belonging to the victim's host, an attacker might be able to take over the administrative session without being prompted for authentication credentials. An attacker can get the victim's and router's IP addresses by simply sniffing the network traffic. Moreover, if the victim has web access enabled on his router and is accessing the web interface from a different network that is behind the NAT/Proxy, an attacker can sniff the network traffic to know the public IP address of the victim's router and take over his session as he won't be prompted for credentials.
[]
null
9.8
null
null
null
GHSA-9jrh-hch8-rr5c
Jenkins Copy To Slave Plugin allows access to arbitrary files on the Jenkins controller file system
An exposure of sensitive information vulnerability exists in Jenkins Copy To Slave Plugin version 1.4.4 and older in CopyToSlaveBuildWrapper.java that allows attackers with permission to configure jobs to read arbitrary files from the Jenkins master file system.
[]
null
null
6.5
null
null
CVE-2020-3512
Cisco IOS and IOS XE Software PROFINET Link Layer Discovery Protocol Denial of Service Vulnerability
A vulnerability in the PROFINET handler for Link Layer Discovery Protocol (LLDP) messages of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a crash on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of LLDP messages in the PROFINET LLDP message handler. An attacker could exploit this vulnerability by sending a malicious LLDP message to an affected device. A successful exploit could allow the attacker to cause the affected device to reload.
[ "cpe:2.3:o:cisco:ios_xe:15.2\\(7\\)e:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-12x48uq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-12x48ur:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-12x48uz:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-24pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-24pdm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-48fqm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3650-8x24uq:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-2y:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24pxg-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-24t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48pxg-2y:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48pxg-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9200l-48t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-24ux:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48un:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300-48uxm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-24t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48p-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48p-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48t-4g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9300l-48t-4x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9404r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9407r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9410r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-12q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-16x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-24q:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-24y4c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-32c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-32qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-40x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_c9500-48y4c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:connected_grid_switch_2520:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess_2020:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess_3300:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-16tc-g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-16tc-g-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-16tc-gp:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-4s-g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-4t-gs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-4ts-g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-2000u-8tc-g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3010-16s-8pc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3010-24tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3200-8p2s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3200-8t2s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8p2s-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8p2s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8t2s-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8t2s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8t2x-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8t2x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8u2x-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3300-8u2x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3400-8p2s-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3400-8p2s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3400-8t2s-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-3400-8t2s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-16gt4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-16t4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-4gc4gp4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-4gs8gp4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-4s8p4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-4t4p4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-4tc4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-8gs4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-8gt4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-8gt8gp4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-8s4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4000-8t4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4010-16s12p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-4010-4s24p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-5000-12s12p-10g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie-5000-16s12p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16ptc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16tc-g-x_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-16tc_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-24t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-4s-ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-4t-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-4t_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-4ts-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-4ts_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-8t67_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-8t67p_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-8tc-g-e_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-8tc-g-n_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ie_2000-8tc-g_industrial_ethernet_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-14t2s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-16p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-16t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-4mu-2:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-6t2s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-8p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-8s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3300-8t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3400-8p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3400-8s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:iem-3400-8t:-:*:*:*:*:*:*:*" ]
null
null
7.4
null
null
GHSA-mfqw-4fff-fg2r
An issue was discovered in Roche Accu-Chek Inform II Base Unit / Base Unit Hub before 03.01.04 and CoaguChek / cobas h232 Handheld Base Unit before 03.01.04. Insecure permissions in a service interface may allow authenticated attackers in the adjacent network to execute arbitrary commands on the operating system.
[]
null
null
8
null
null
CVE-2024-26989
arm64: hibernate: Fix level3 translation fault in swsusp_save()
In the Linux kernel, the following vulnerability has been resolved: arm64: hibernate: Fix level3 translation fault in swsusp_save() On arm64 machines, swsusp_save() faults if it attempts to access MEMBLOCK_NOMAP memory ranges. This can be reproduced in QEMU using UEFI when booting with rodata=off debug_pagealloc=off and CONFIG_KFENCE=n: Unable to handle kernel paging request at virtual address ffffff8000000000 Mem abort info: ESR = 0x0000000096000007 EC = 0x25: DABT (current EL), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x07: level 3 translation fault Data abort info: ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 swapper pgtable: 4k pages, 39-bit VAs, pgdp=00000000eeb0b000 [ffffff8000000000] pgd=180000217fff9803, p4d=180000217fff9803, pud=180000217fff9803, pmd=180000217fff8803, pte=0000000000000000 Internal error: Oops: 0000000096000007 [#1] SMP Internal error: Oops: 0000000096000007 [#1] SMP Modules linked in: xt_multiport ipt_REJECT nf_reject_ipv4 xt_conntrack nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 libcrc32c iptable_filter bpfilter rfkill at803x snd_hda_codec_hdmi snd_hda_intel snd_intel_dspcfg dwmac_generic stmmac_platform snd_hda_codec stmmac joydev pcs_xpcs snd_hda_core phylink ppdev lp parport ramoops reed_solomon ip_tables x_tables nls_iso8859_1 vfat multipath linear amdgpu amdxcp drm_exec gpu_sched drm_buddy hid_generic usbhid hid radeon video drm_suballoc_helper drm_ttm_helper ttm i2c_algo_bit drm_display_helper cec drm_kms_helper drm CPU: 0 PID: 3663 Comm: systemd-sleep Not tainted 6.6.2+ #76 Source Version: 4e22ed63a0a48e7a7cff9b98b7806d8d4add7dc0 Hardware name: Greatwall GW-XXXXXX-XXX/GW-XXXXXX-XXX, BIOS KunLun BIOS V4.0 01/19/2021 pstate: 600003c5 (nZCv DAIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : swsusp_save+0x280/0x538 lr : swsusp_save+0x280/0x538 sp : ffffffa034a3fa40 x29: ffffffa034a3fa40 x28: ffffff8000001000 x27: 0000000000000000 x26: ffffff8001400000 x25: ffffffc08113e248 x24: 0000000000000000 x23: 0000000000080000 x22: ffffffc08113e280 x21: 00000000000c69f2 x20: ffffff8000000000 x19: ffffffc081ae2500 x18: 0000000000000000 x17: 6666662074736420 x16: 3030303030303030 x15: 3038666666666666 x14: 0000000000000b69 x13: ffffff9f89088530 x12: 00000000ffffffea x11: 00000000ffff7fff x10: 00000000ffff7fff x9 : ffffffc08193f0d0 x8 : 00000000000bffe8 x7 : c0000000ffff7fff x6 : 0000000000000001 x5 : ffffffa0fff09dc8 x4 : 0000000000000000 x3 : 0000000000000027 x2 : 0000000000000000 x1 : 0000000000000000 x0 : 000000000000004e Call trace: swsusp_save+0x280/0x538 swsusp_arch_suspend+0x148/0x190 hibernation_snapshot+0x240/0x39c hibernate+0xc4/0x378 state_store+0xf0/0x10c kobj_attr_store+0x14/0x24 The reason is swsusp_save() -> copy_data_pages() -> page_is_saveable() -> kernel_page_present() assuming that a page is always present when can_set_direct_map() is false (all of rodata_full, debug_pagealloc_enabled() and arm64_kfence_can_set_direct_map() false), irrespective of the MEMBLOCK_NOMAP ranges. Such MEMBLOCK_NOMAP regions should not be saved during hibernation. This problem was introduced by changes to the pfn_valid() logic in commit a7d9f306ba70 ("arm64: drop pfn_valid_within() and simplify pfn_valid()"). Similar to other architectures, drop the !can_set_direct_map() check in kernel_page_present() so that page_is_savable() skips such pages. [[email protected]: rework commit message]
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:*" ]
null
7.8
null
null
null
CVE-2021-31505
This vulnerability allows attackers with physical access to escalate privileges on affected installations of Arlo Q Plus 1.9.0.3_278. Authentication is not required to exploit this vulnerability. The specific flaw exists within the SSH service. The device can be booted into a special operation mode where hard-coded credentials are accepted for SSH authentication. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-12890.
[ "cpe:2.3:o:arlo:q_plus_firmware:1.9.0.3_278:*:*:*:*:*:*:*", "cpe:2.3:h:arlo:q_plus:-:*:*:*:*:*:*:*" ]
null
null
6.8
null
null
GHSA-j38r-mq7j-wgvr
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Syed Balkhi WP Lightbox 2 plugin <= 3.0.6.5 versions.
[]
null
5.9
null
null
null
CVE-2022-22612
A memory consumption issue was addressed with improved memory handling. This issue is fixed in tvOS 15.4, iOS 15.4 and iPadOS 15.4, iTunes 12.12.3 for Windows, watchOS 8.5, macOS Monterey 12.3. Processing a maliciously crafted image may lead to heap corruption.
[ "cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
null
CVE-2018-3590
In Android before security patch level 2018-04-05 on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 820, SD 835, SD 845, a Use After Free condition can occur in RIL while handling requests from Android.
[ "cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-6mjh-qj4v-3982
Cross-site scripting (XSS) vulnerability in index.php in Warcraft III Replay Parser for PHP 1.8c allows remote attackers to inject arbitrary web script or HTML via the page parameter. NOTE: post-disclosure analysis by CVE suggests that the "page" parameter is not used in this product, and "id" might be the affected parameter.
[]
null
null
null
null
null
CVE-2015-9045
In all Qualcomm products with Android releases from CAF using the Linux kernel, a vulnerability exists in GERAN where a buffer can be overflown while taking power measurements.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
CVE-2018-16173
Cross-site scripting vulnerability in LearnPress prior to version 3.1.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:thimpress:learnpress:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
null
CVE-2021-34741
Cisco Email Security Appliance Denial of Service Vulnerability
A vulnerability in the email scanning algorithm of Cisco AsyncOS software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack against an affected device. This vulnerability is due to insufficient input validation of incoming emails. An attacker could exploit this vulnerability by sending a crafted email through Cisco ESA. A successful exploit could allow the attacker to exhaust all the available CPU resources on an affected device for an extended period of time, preventing other emails from being processed and resulting in a DoS condition.
[ "cpe:2.3:o:cisco:asyncos:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:13.5.3-010:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:asyncos:13.7.0-093:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m170:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m190:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m380:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m390:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m390x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m680:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m690:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:m690x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:s195:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:s395:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:s695:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
null
CVE-2018-18939
An issue was discovered in WUZHI CMS 4.1.0. There is stored XSS in index.php?m=core&f=index via a seventh input field.
[ "cpe:2.3:a:wuzhi_cms_project:wuzhi_cms:4.1.0:*:*:*:*:*:*:*" ]
null
null
4.8
3.5
null
GHSA-fc65-rmq4-2hch
Adobe Flash Player 30.0.0.134 and earlier have a "use of a component with a known vulnerability" vulnerability. Successful exploitation could lead to privilege escalation.
[]
null
null
9.8
null
null
GHSA-3ww9-jwr8-mpg3
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_booking.php.
[]
null
7.2
null
null
null
GHSA-qj3h-8h86-6xvf
Vulnerability in the PeopleSoft Enterprise SCM eProcurement product of Oracle PeopleSoft (component: eProcurement). The supported version that is affected is 9.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise PeopleSoft Enterprise SCM eProcurement. Successful attacks of this vulnerability can result in unauthorized read access to a subset of PeopleSoft Enterprise SCM eProcurement accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
null
null
null
null
CVE-2025-21776
USB: hub: Ignore non-compliant devices with too many configs or interfaces
In the Linux kernel, the following vulnerability has been resolved: USB: hub: Ignore non-compliant devices with too many configs or interfaces Robert Morris created a test program which can cause usb_hub_to_struct_hub() to dereference a NULL or inappropriate pointer: Oops: general protection fault, probably for non-canonical address 0xcccccccccccccccc: 0000 [#1] SMP DEBUG_PAGEALLOC PTI CPU: 7 UID: 0 PID: 117 Comm: kworker/7:1 Not tainted 6.13.0-rc3-00017-gf44d154d6e3d #14 Hardware name: FreeBSD BHYVE/BHYVE, BIOS 14.0 10/17/2021 Workqueue: usb_hub_wq hub_event RIP: 0010:usb_hub_adjust_deviceremovable+0x78/0x110 ... Call Trace: <TASK> ? die_addr+0x31/0x80 ? exc_general_protection+0x1b4/0x3c0 ? asm_exc_general_protection+0x26/0x30 ? usb_hub_adjust_deviceremovable+0x78/0x110 hub_probe+0x7c7/0xab0 usb_probe_interface+0x14b/0x350 really_probe+0xd0/0x2d0 ? __pfx___device_attach_driver+0x10/0x10 __driver_probe_device+0x6e/0x110 driver_probe_device+0x1a/0x90 __device_attach_driver+0x7e/0xc0 bus_for_each_drv+0x7f/0xd0 __device_attach+0xaa/0x1a0 bus_probe_device+0x8b/0xa0 device_add+0x62e/0x810 usb_set_configuration+0x65d/0x990 usb_generic_driver_probe+0x4b/0x70 usb_probe_device+0x36/0xd0 The cause of this error is that the device has two interfaces, and the hub driver binds to interface 1 instead of interface 0, which is where usb_hub_to_struct_hub() looks. We can prevent the problem from occurring by refusing to accept hub devices that violate the USB spec by having more than one configuration or interface.
[]
null
5.5
null
null
null
CVE-2019-10144
rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` are given all capabilities during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources.
[ "cpe:2.3:a:redhat:rkt:*:*:*:*:*:*:*:*" ]
null
null
7
null
null
GHSA-7xxv-9538-jg8x
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in RichardHarrison Carousel-of-post-images allows DOM-Based XSS. This issue affects Carousel-of-post-images: from n/a through 1.07.
[]
null
6.5
null
null
null
GHSA-3hpx-5vcc-5jw2
A vulnerability, which was classified as critical, has been found in Campcodes Complete Online DJ Booking System 1.0. This issue affects some unknown processing of the file /admin/user-search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257465 was assigned to this vulnerability.
[]
null
6.3
null
null
null
RHSA-2023:4516
Red Hat Security Advisory: kpatch-patch security update
kernel: Use-after-free vulnerability in the Linux Kernel traffic control index filter kernel: ipvlan: out-of-bounds write caused by unclear skb->cb kernel: cls_flower: out-of-bounds write in fl_set_geneve_opt()
[ "cpe:/o:redhat:rhel_e4s:8.1::baseos" ]
null
7.8
null
null
null
GHSA-q6x4-wf9q-6g23
WeeChat (aka Wee Enhanced Environment for Chat) 3.2 to 3.4 before 3.4.1 does not properly verify the TLS certificate of the server, after certain GnuTLS options are changed, which allows man-in-the-middle attackers to spoof a TLS chat server via an arbitrary certificate. NOTE: this only affects situations where weechat.network.gnutls_ca_system or weechat.network.gnutls_ca_user is changed without a WeeChat restart.
[]
null
4.8
null
null
null
GHSA-q38j-h243-5f97
EZPhotoSales 1.9.3 and earlier has a default "admin" account for galleries, which allows remote attackers to access arbitrary galleries by specifying this username.
[]
null
null
null
null
null
CVE-2016-3455
Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.5.0, 8.5.1, and 8.5.2 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to Outside In Filters.
[ "cpe:2.3:a:oracle:outside_in_technology:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:outside_in_technology:8.5.2:*:*:*:*:*:*:*" ]
null
null
8.6
9
null
GHSA-7rx8-fqcc-2mqg
Cross-site scripting (XSS) vulnerability in display_renderers/panels_renderer_editor.class.php in the admin view in the Panels module 6.x-2.x before 6.x-3.10 and 7.x-3.x before 7.x-3.0 for Drupal allows remote authenticated users with certain privileges to inject arbitrary web script or HTML via the Region title.
[]
null
null
null
null
null
GHSA-vfj7-wc6m-2f4v
Active debug code vulnerability exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may obtain or alter the settings of the device .
[]
null
4.6
null
null
null
GHSA-j3v8-frhv-jj69
A vulnerability classified as problematic has been found in Campcodes Complete Online DJ Booking System 1.0. Affected is an unknown function of the file /admin/admin-profile.php. The manipulation of the argument adminname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257472.
[]
null
3.5
null
null
null
CVE-2025-47063
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[]
null
5.4
null
null
null
CVE-2019-19246
Oniguruma through 6.9.3, as used in PHP 7.3.x and other products, has a heap-based buffer over-read in str_lower_case_match in regexec.c.
[ "cpe:2.3:a:oniguruma_project:oniguruma:*:*:*:*:*:*:*:*", "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
null
CVE-2024-39342
Entrust Instant Financial Issuance (formerly known as Cardwizard) 6.10.0, 6.9.0, 6.9.1, 6.9.2, and 6.8.x and earlier uses a DLL library (i.e. DCG.Security.dll) with a custom AES encryption process that relies on static hard-coded key values. These keys are not uniquely generated per installation of the software. Combined with the encrypted password that can be obtained from "WebAPI.cfg.xml" in CVE-2024-39341, the decryption is trivial and can lead to privilege escalation on the Windows host.
[ "cpe:2.3:a:entrust_instant_financial_issuance:entrust_instant_financial_issuance:*:*:*:*:*:*:*:*" ]
null
6.6
null
null
null
GHSA-p4rg-78qv-f5g4
In Tidy 5.5.31, the IsURLCodePoint function in attrs.c allows attackers to cause a denial of service (Segmentation Fault), as demonstrated by an invalid ISALNUM argument.
[]
null
null
7.5
null
null
CVE-2023-36554
A improper access control in Fortinet FortiManager version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.10, version 6.4.0 through 6.4.13, 6.2 all versions allows attacker to execute unauthorized code or commands via specially crafted HTTP requests.
[ "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*" ]
null
7.7
null
null
null
GHSA-c5xx-5q9j-76qv
The elf_read_notesfunction in bfd/elf.c in GNU Binutils 2.29 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted binary file.
[]
null
null
7.8
null
null
GHSA-ffxf-wqw7-4589
An issue was discovered in Open-Xchange OX AppSuite before 7.8.0-rev27. The aria-label parameter of tiles at the Portal can be used to inject script code. Those labels use the name of the file (e.g. an image) which gets displayed at the portal application. Using script code at the file name leads to script execution. Malicious script code can be executed within a user's context. This can lead to session hijacking or triggering unwanted actions via the web interface (sending mail, deleting data etc.). Users actively need to add a file to the portal to enable this attack. In case of shared files however, a internal attacker may modify a previously embedded file to carry a malicious file name. Furthermore this vulnerability can be used to persistently execute code that got injected by a temporary script execution vulnerability.
[]
null
null
5.4
null
null
GHSA-gmhj-xjfh-cf6m
Caddy-SSH vulnerable to Authorization Bypass due to incorrect usage of PAM library
Not invoking a call to `pam_acct_mgmt` after a call to `pam_authenticate` to check the validity of a login can lead to an authorization bypass.ImpactExploitabilityThe attack can be carried over the network. A complex non-standard configuration or a specialized condition is required for the attack to be successfully conducted. The attacker also requires access to a users credentials, be it expired, for an attack to be successful. There is no user interaction required for successful execution. The attack can affect components outside the scope of the target module.ImpactUsing this attack vector, an attacker may access otherwise restricted parts of the system. The attack can be used to gain access to confidential files like passwords, login credentials and other secrets. Hence, it has a high impact on confidentiality. It may also be directly used to affect a change on a system resource. Hence has a medium to high impact on integrity. This attack may not be used to affect the availability of the system. Taking this account an appropriate CVSS v3.1 vector would be [AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:N](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L&version=3.1)Root Cause AnalysisIn this case, in the following PAM transaction, only a call to `pam.Authenticate` is used to login a user.https://github.com/mohammed90/caddy-ssh/blob/1d980ceea6e67765daf19b5e644c7a0773fdaa13/internal/authentication/os/pam.go#L60This implies that a user with expired credentials can still login.The bug can be verified easily by creating a new user account, expiring it with `chage -E0 <username>` and then trying to log in with the expired credentials.PatchesThis can be fixed by invoking a call to `pam.AcctMgmt` after a successful call to `pam.Authenticate`References[Man Page for pam_acct_mgmt](https://man7.org/linux/man-pages/man3/pam_acct_mgmt.3.html)[CWE-863](http://cwe.mitre.org/data/definitions/863.html)[CWE-285](http://cwe.mitre.org/data/definitions/285.html)
[]
null
7.7
null
null
null
CVE-2021-37524
Cross Site Scripting (XSS) vulnerability in FusionPBX 4.5.26 allows remote unauthenticated users to inject arbitrary web script or HTML via an unsanitized "path" parameter in resources/login.php.
[ "cpe:2.3:a:fusionpbx:fusionpbx:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
null