id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2013-1001
WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:3.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.2.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:5.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:9.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.2.2.12:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.4.0.80:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.4.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.5.1.42:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.6:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2014-4128
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-2m87-hw5q-fmgg
Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."
[]
null
null
null
null
CVE-2023-30309
An issue discovered in D-Link DI-7003GV2 routers allows attackers to hijack TCP sessions which could lead to a denial of service.
[]
null
5.7
null
null
GHSA-2ccj-67xq-j58p
This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. Files downloaded from the internet may not have the quarantine flag applied
[]
null
5.5
null
null
CVE-2025-2552
D-Link DIR-618/DIR-605L formTcpipSetup access control
A vulnerability was found in D-Link DIR-618 and DIR-605L 2.02/3.02. It has been declared as problematic. This vulnerability affects unknown code of the file /goform/formTcpipSetup. The manipulation leads to improper access controls. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer.
[]
5.3
4.3
4.3
3.3
CVE-2019-2188
In the Easel driver, there is possible memory corruption due to race conditions. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-112309571
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
null
6.4
null
6.9
GHSA-5mg2-h7qv-m552
In the Linux kernel, the following vulnerability has been resolved:vfio/pci: Disable auto-enable of exclusive INTx IRQCurrently for devices requiring masking at the irqchip for INTx, ie. devices without DisINTx support, the IRQ is enabled in request_irq() and subsequently disabled as necessary to align with the masked status flag. This presents a window where the interrupt could fire between these events, resulting in the IRQ incrementing the disable depth twice. This would be unrecoverable for a user since the masked flag prevents nested enables through vfio.Instead, invert the logic using IRQF_NO_AUTOEN such that exclusive INTx is never auto-enabled, then unmask as required.
[]
null
5.5
null
null
CVE-2018-2725
Vulnerability in the Oracle Financial Services Hedge Management and IFRS Valuations component of Oracle Financial Services Applications (subcomponent: User Interface). The supported version that is affected is 8.0.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Hedge Management and IFRS Valuations. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Hedge Management and IFRS Valuations accessible data as well as unauthorized access to critical data or complete access to all Oracle Financial Services Hedge Management and IFRS Valuations accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:financial_services_hedge_management_and_ifrs_valuations:8.0.5:*:*:*:*:*:*:*" ]
null
8.1
null
5.5
GHSA-8r4c-vj8m-g96m
In the Linux kernel, the following vulnerability has been resolved:clk: mediatek: clk-mt2701: Add check for mtk_alloc_clk_dataAdd the check for the return value of mtk_alloc_clk_data() in order to avoid NULL pointer dereference.
[]
null
5.5
null
null
CVE-2024-50225
btrfs: fix error propagation of split bios
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix error propagation of split bios The purpose of btrfs_bbio_propagate_error() shall be propagating an error of split bio to its original btrfs_bio, and tell the error to the upper layer. However, it's not working well on some cases. * Case 1. Immediate (or quick) end_bio with an error When btrfs sends btrfs_bio to mirrored devices, btrfs calls btrfs_bio_end_io() when all the mirroring bios are completed. If that btrfs_bio was split, it is from btrfs_clone_bioset and its end_io function is btrfs_orig_write_end_io. For this case, btrfs_bbio_propagate_error() accesses the orig_bbio's bio context to increase the error count. That works well in most cases. However, if the end_io is called enough fast, orig_bbio's (remaining part after split) bio context may not be properly set at that time. Since the bio context is set when the orig_bbio (the last btrfs_bio) is sent to devices, that might be too late for earlier split btrfs_bio's completion. That will result in NULL pointer dereference. That bug is easily reproducible by running btrfs/146 on zoned devices [1] and it shows the following trace. [1] You need raid-stripe-tree feature as it create "-d raid0 -m raid1" FS. BUG: kernel NULL pointer dereference, address: 0000000000000020 #PF: supervisor read access in kernel mode #PF: error_code(0x0000) - not-present page PGD 0 P4D 0 Oops: Oops: 0000 [#1] PREEMPT SMP PTI CPU: 1 UID: 0 PID: 13 Comm: kworker/u32:1 Not tainted 6.11.0-rc7-BTRFS-ZNS+ #474 Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011 Workqueue: writeback wb_workfn (flush-btrfs-5) RIP: 0010:btrfs_bio_end_io+0xae/0xc0 [btrfs] BTRFS error (device dm-0): bdev /dev/mapper/error-test errs: wr 2, rd 0, flush 0, corrupt 0, gen 0 RSP: 0018:ffffc9000006f248 EFLAGS: 00010246 RAX: 0000000000000000 RBX: ffff888005a7f080 RCX: ffffc9000006f1dc RDX: 0000000000000000 RSI: 000000000000000a RDI: ffff888005a7f080 RBP: ffff888011dfc540 R08: 0000000000000000 R09: 0000000000000001 R10: ffffffff82e508e0 R11: 0000000000000005 R12: ffff88800ddfbe58 R13: ffff888005a7f080 R14: ffff888005a7f158 R15: ffff888005a7f158 FS: 0000000000000000(0000) GS:ffff88803ea80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000020 CR3: 0000000002e22006 CR4: 0000000000370ef0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> ? __die_body.cold+0x19/0x26 ? page_fault_oops+0x13e/0x2b0 ? _printk+0x58/0x73 ? do_user_addr_fault+0x5f/0x750 ? exc_page_fault+0x76/0x240 ? asm_exc_page_fault+0x22/0x30 ? btrfs_bio_end_io+0xae/0xc0 [btrfs] ? btrfs_log_dev_io_error+0x7f/0x90 [btrfs] btrfs_orig_write_end_io+0x51/0x90 [btrfs] dm_submit_bio+0x5c2/0xa50 [dm_mod] ? find_held_lock+0x2b/0x80 ? blk_try_enter_queue+0x90/0x1e0 __submit_bio+0xe0/0x130 ? ktime_get+0x10a/0x160 ? lockdep_hardirqs_on+0x74/0x100 submit_bio_noacct_nocheck+0x199/0x410 btrfs_submit_bio+0x7d/0x150 [btrfs] btrfs_submit_chunk+0x1a1/0x6d0 [btrfs] ? lockdep_hardirqs_on+0x74/0x100 ? __folio_start_writeback+0x10/0x2c0 btrfs_submit_bbio+0x1c/0x40 [btrfs] submit_one_bio+0x44/0x60 [btrfs] submit_extent_folio+0x13f/0x330 [btrfs] ? btrfs_set_range_writeback+0xa3/0xd0 [btrfs] extent_writepage_io+0x18b/0x360 [btrfs] extent_write_locked_range+0x17c/0x340 [btrfs] ? __pfx_end_bbio_data_write+0x10/0x10 [btrfs] run_delalloc_cow+0x71/0xd0 [btrfs] btrfs_run_delalloc_range+0x176/0x500 [btrfs] ? find_lock_delalloc_range+0x119/0x260 [btrfs] writepage_delalloc+0x2ab/0x480 [btrfs] extent_write_cache_pages+0x236/0x7d0 [btrfs] btrfs_writepages+0x72/0x130 [btrfs] do_writepages+0xd4/0x240 ? find_held_lock+0x2b/0x80 ? wbc_attach_and_unlock_inode+0x12c/0x290 ? wbc_attach_and_unlock_inode+0x12c/0x29 ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-rqp5-pg7w-832p
datagrid contains code Injection backdoor
The datagrid gem 1.0.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party.
[]
null
null
9.8
null
GHSA-p48h-366j-m3qx
Multiple SQL injection vulnerabilities in SergiDs Top Music module 3.0 PR3 and earlier for PHP-Nuke allow remote attackers to execute arbitrary SQL commands via the (1) idartist, (2) idsong, and (3) idalbum parameters to modules.php.
[]
null
null
null
null
GHSA-g96r-m5m9-8hqg
Windows Distributed File System (DFS) Information Disclosure Vulnerability
[]
null
6.5
null
null
GHSA-5phw-pq6g-29m4
The send_pinentry_environment function in asshelp.c in gpg2 on SUSE Linux 9.3 does not properly handle certain options, which can prevent pinentry from being found and causes S/MIME signing to fail.
[]
null
null
null
null
CVE-2021-41103
Insufficiently restricted permissions on plugin directories
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update directory permission on container bundles directories.
[ "cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*" ]
null
null
5.9
null
GHSA-6p3h-x2q8-856f
Touchpad / Trivum WebTouch Setup V9 V2.53 build 13163 of Apr 6 2018 09:10:14 (FW 303) allow unauthorized remote attackers to reset the authentication via the "/xml/system/setAttribute.xml" URL, using the GET request "?id=0&attr=protectAccess&newValue=0" (a successful attack will allow attackers to login without authorization).
[]
null
null
9.8
null
CVE-2010-3053
bdf/bdflib.c in FreeType before 2.4.2 allows remote attackers to cause a denial of service (application crash) via a crafted BDF font file, related to an attempted modification of a value in a static string.
[ "cpe:2.3:a:freetype:freetype:*:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.9:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.1.10:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.2.10:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.9:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.10:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.11:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.3.12:*:*:*:*:*:*:*", "cpe:2.3:a:freetype:freetype:2.4.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-g5mm-4rjp-2mg7
The port-3443 HTTP server in HP OpenView Network Node Manager (OV NNM) 7.01, 7.51, and 7.53 allows remote attackers to execute arbitrary commands via shell metacharacters in the hostname parameter to unspecified Perl scripts.
[]
null
null
null
null
RHSA-2015:0012
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 openssl security update
SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack
[ "cpe:/a:redhat:jboss_enterprise_application_platform:6.3" ]
null
null
null
null
CVE-2024-47769
IDURAR has a Path Traversal (unauthenticated user can read sensitive data)
IDURAR is open source ERP CRM accounting invoicing software. The vulnerability exists in the corePublicRouter.js file. Using the reference usage here, it is identified that the public endpoint is accessible to an unauthenticated user. The user's input is directly appended to the join statement without additional checks. This allows an attacker to send URL encoded malicious payload. The directory structure can be escaped to read system files by adding an encoded string (payload) at subpath location.
[ "cpe:2.3:a:idurar_project:idurar:-:*:*:*:*:*:*:*", "cpe:2.3:a:idurarapp:idurar:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2024-7331
TOTOLINK A3300R cstecgi.cgi UploadCustomModule buffer overflow
A vulnerability was found in TOTOLINK A3300R 17.0.0cu.557_B20221024 and classified as critical. Affected by this issue is the function UploadCustomModule of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument File leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-273254 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:o:totolink:a3300r_firmware:17.0.0cu.557_b20221024:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3300r:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
CVE-2024-43148
WordPress StreamCast <= 2.2.3 - Stored Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in bPlugins StreamCast allows Stored XSS.This issue affects StreamCast: from n/a through 2.2.3.
[]
null
5.9
null
null
CVE-2014-0238
The cdf_read_property_info function in cdf.c in the Fileinfo component in PHP before 5.4.29 and 5.5.x before 5.5.13 allows remote attackers to cause a denial of service (infinite loop or out-of-bounds memory access) via a vector that (1) has zero length or (2) is too long.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-27179
ICSA-22-104-03 Red Lion DA50N
A malicious actor having access to the exported configuration file may obtain the stored credentials and thereby gain access to the protected resource. If the same passwords were used for other resources, further such assets may be compromised.
[ "cpe:2.3:o:redlion:da50n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:redlion:da50n:-:*:*:*:*:*:*:*" ]
null
4.6
null
null
CVE-2016-8367
An issue was discovered in Schneider Electric Magelis HMI Magelis GTO Advanced Optimum Panels, all versions, Magelis GTU Universal Panel, all versions, Magelis STO5xx and STU Small panels, all versions, Magelis XBT GH Advanced Hand-held Panels, all versions, Magelis XBT GK Advanced Touchscreen Panels with Keyboard, all versions, Magelis XBT GT Advanced Touchscreen Panels, all versions, and Magelis XBT GTW Advanced Open Touchscreen Panels (Windows XPe). An attacker can open multiple connections to a targeted web server and keep connections open preventing new connections from being made, rendering the web server unavailable during an attack.
[ "cpe:2.3:o:schneider-electric:magelis_gtu_universal_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_gtu_universal_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_gto_advanced_optimum_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_gto_advanced_optimum_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_sto5_small_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_sto5_small_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_stu_small_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_stu_small_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_xbt_gh_advanced_hand-held_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_xbt_gh_advanced_hand-held_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_xbt_gk_advanced_touchscreen_panel_with_keyboard_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_xbt_gk_advanced_touchscreen_panel_with_keyboard:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_xbt_gt_advanced_touchscreen_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_xbt_gt_advanced_touchscreen_panel:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:magelis_xbt_gtw_advanced_open_touchscreen_panel_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:magelis_xbt_gtw_advanced_open_touchscreen_panel:-:*:*:*:*:*:*:*" ]
null
5.3
null
5
RHSA-2020:0514
Red Hat Security Advisory: chromium-browser security update
libxslt: use after free in xsltCopyText in transform.c could lead to information disclosure sqlite: invalid pointer dereference in exprListAppendList in window.c sqlite: mishandling of certain uses of SELECT DISTINCT involving a LEFT JOIN in flattenSubquery in select.c leads to a NULL pointer dereference sqlite: zipfileUpdate in ext/misc/zipfile.c mishandles a NULL pathname during an update of a ZIP archive sqlite: error mishandling because of incomplete fix of CVE-2019-19880 chromium-browser: Integer overflow in JavaScript chromium-browser: Type Confusion in JavaScript chromium-browser: Insufficient policy enforcement in storage chromium-browser: Out of bounds write in WebRTC chromium-browser: Out of bounds memory access in WebAudio chromium-browser: Out of bounds write in WebRTC chromium-browser: Out of bounds memory access in streams chromium-browser: Insufficient validation of untrusted input in Blink chromium-browser: Insufficient policy enforcement in extensions chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Insufficient policy enforcement in Blink chromium-browser: Out of bounds read in JavaScript chromium-browser: Inappropriate implementation in Skia chromium-browser: Incorrect security UI in sharing chromium-browser: Uninitialized use in PDFium chromium-browser: Insufficient policy enforcement in AppCache chromium-browser: Inappropriate implementation in CORS chromium-browser: Insufficient validation of untrusted input in Omnibox chromium-browser: Insufficient policy enforcement in downloads chromium-browser: Incorrect security UI in Omnibox chromium-browser: Inappropriate implementation in Blink sqlite: Out-of-bounds read in SELECT with ON/USING clause chromium-browser: Use after free in audio chromium-browser: Insufficient policy enforcement in CORS chromium-browser: Inappropriate implementation in Omnibox chromium-browser: Insufficient policy enforcement in navigation chromium-browser: Insufficient validation of untrusted input in Omnibox chromium-browser: Insufficient validation of untrusted input in Omnibox chromium-browser: Inappropriate implementation in Blink chromium-browser: Insufficient policy enforcement in Safe Browsing chromium-browser: Inappropriate implementation in JavaScript chromium-browser: Insufficient data validation in streams chromium-browser: Inappropriate implementation in installer chromium-browser: Inappropriate implementation in AppCache chromium-browser: Inappropriate implementation in interstitials chromium-browser: Insufficient policy enforcement in CSP chromium-browser: Incorrect security UI in permissions
[ "cpe:/a:redhat:rhel_extras:6" ]
null
4.3
4.3
null
GHSA-5q55-gh5r-h286
In the Linux kernel, the following vulnerability has been resolved:nfsd: fix possible badness in FREE_STATEIDWhen multiple FREE_STATEIDs are sent for the same delegation stateid, it can lead to a possible either use-after-free or counter refcount underflow errors.In nfsd4_free_stateid() under the client lock we find a delegation stateid, however the code drops the lock before calling nfs4_put_stid(), that allows another FREE_STATE to find the stateid again. The first one will proceed to then free the stateid which leads to either use-after-free or decrementing already zeroed counter.
[]
null
7.8
null
null
CVE-2021-45052
Adobe Bridge TIF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Bridge version 11.1.2 (and earlier) and version 12.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious TIF file.
[ "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:bridge:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
3.3
null
null
GHSA-5jjr-h5r9-w8v2
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alordiel Dropdown Multisite selector allows Stored XSS.This issue affects Dropdown Multisite selector: from n/a through 0.9.2.
[]
null
6.5
null
null
CVE-2017-6684
A vulnerability in Cisco Elastic Services Controllers could allow an authenticated, remote attacker to log in to an affected system as the Linux admin user, aka an Insecure Default Credentials Vulnerability. More Information: CSCvc76651. Known Affected Releases: 21.0.0.
[ "cpe:2.3:a:cisco:elastic_services_controller:21.0.0:*:*:*:*:*:*:*" ]
null
null
8.8
9
GHSA-mfv7-6rh8-77p4
The Elementor Website Builder – More than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Post Navigation widget in all versions up to, and including, 3.20.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.4
null
null
PYSEC-2021-156
null
TensorFlow is an end-to-end open source platform for machine learning. The API of `tf.raw_ops.SparseCross` allows combinations which would result in a `CHECK`-failure and denial of service. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/3d782b7d47b1bf2ed32bd4a246d6d6cadc4c903d/tensorflow/core/kernels/sparse_cross_op.cc#L114-L116) is tricked to consider a tensor of type `tstring` which in fact contains integral elements. Fixing the type confusion by preventing mixing `DT_STRING` and `DT_INT64` types solves this issue. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
GHSA-m9gj-6rfv-3qrm
Stack-based buffer overflow in hydra.exe in HP SAN/iQ before 9.5 on the HP StorageWorks P4000 Virtual SAN Appliance allows remote attackers to execute arbitrary code via a crafted login request.
[]
null
null
null
null
GHSA-g37m-wg3j-xw8v
In the Linux kernel, the following vulnerability has been resolved:net/sched: Fix UAF when resolving a clashKASAN reports the following UAF:BUG: KASAN: slab-use-after-free in tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct] Read of size 1 at addr ffff888c07603600 by task handler130/6469Call Trace: <IRQ> dump_stack_lvl+0x48/0x70 print_address_description.constprop.0+0x33/0x3d0 print_report+0xc0/0x2b0 kasan_report+0xd0/0x120 __asan_load1+0x6c/0x80 tcf_ct_flow_table_process_conn+0x12b/0x380 [act_ct] tcf_ct_act+0x886/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491 __irq_exit_rcu+0x82/0xc0 irq_exit_rcu+0xe/0x20 common_interrupt+0xa1/0xb0 </IRQ> <TASK> asm_common_interrupt+0x27/0x40Allocated by task 6469: kasan_save_stack+0x38/0x70 kasan_set_track+0x25/0x40 kasan_save_alloc_info+0x1e/0x40 __kasan_krealloc+0x133/0x190 krealloc+0xaa/0x130 nf_ct_ext_add+0xed/0x230 [nf_conntrack] tcf_ct_act+0x1095/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491Freed by task 6469: kasan_save_stack+0x38/0x70 kasan_set_track+0x25/0x40 kasan_save_free_info+0x2b/0x60 ____kasan_slab_free+0x180/0x1f0 __kasan_slab_free+0x12/0x30 slab_free_freelist_hook+0xd2/0x1a0 __kmem_cache_free+0x1a2/0x2f0 kfree+0x78/0x120 nf_conntrack_free+0x74/0x130 [nf_conntrack] nf_ct_destroy+0xb2/0x140 [nf_conntrack] __nf_ct_resolve_clash+0x529/0x5d0 [nf_conntrack] nf_ct_resolve_clash+0xf6/0x490 [nf_conntrack] __nf_conntrack_confirm+0x2c6/0x770 [nf_conntrack] tcf_ct_act+0x12ad/0x1350 [act_ct] tcf_action_exec+0xf8/0x1f0 fl_classify+0x355/0x360 [cls_flower] __tcf_classify+0x1fd/0x330 tcf_classify+0x21c/0x3c0 sch_handle_ingress.constprop.0+0x2c5/0x500 __netif_receive_skb_core.constprop.0+0xb25/0x1510 __netif_receive_skb_list_core+0x220/0x4c0 netif_receive_skb_list_internal+0x446/0x620 napi_complete_done+0x157/0x3d0 gro_cell_poll+0xcf/0x100 __napi_poll+0x65/0x310 net_rx_action+0x30c/0x5c0 __do_softirq+0x14f/0x491The ct may be dropped if a clash has been resolved but is still passed to the tcf_ct_flow_table_process_conn function for further usage. This issue can be fixed by retrieving ct from skb again after confirming conntrack.
[]
null
7
null
null
GHSA-w866-77p7-2h8x
The Gutentor – Gutenberg Blocks – Page Builder for Gutenberg Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 3.3.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-mx9g-cc8m-w7qh
Buffer overflow in Yahoo! Messenger 8.1 allows user-assisted remote authenticated users to execute arbitrary code via a long e-mail address in an address book entry. NOTE: this might overlap CVE-2007-3638.
[]
null
null
null
null
CVE-2024-25569
An out-of-bounds read vulnerability exists in the RAWCodec::DecodeBytes functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger this vulnerability.
[ "cpe:2.3:a:grassroots_dicom_project:grassroots_dicom:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
GHSA-6289-pgqj-g67g
Heap-based buffer overflow in the CalcMinMax function in coders/mat.c in ImageMagick before 6.9.4-0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted mat file.
[]
null
5.5
null
null
GHSA-r67g-69pq-w76x
IBM Cloud Pak for Security (CP4S) 1.10.0.0 through 1.10.11.0 and IBM QRadar Suite Software 1.10.12.0 through 1.10.23.0 does not invalidate session after logout which could allow another user to obtain sensitive information. IBM X-Force ID: 233672.
[]
null
4.7
null
null
GHSA-vm9x-85qm-fvq3
The api /api/snapshot and /api/get_log_file would allow unauthenticated access. It could allow a DoS attack or get arbitrary files from FE node. Please upgrade to 2.0.3 to fix these issues.
[]
null
8.2
null
null
RHSA-2020:2894
Red Hat Security Advisory: dbus security update
dbus: denial of service via file descriptor leak
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
6.5
null
null
GHSA-j3jh-c6q7-v96f
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Mobile and Snapdragon Wear MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 615/16/SD 415, SD 617, SD 650/52, SD 800, SD 808, and SD 810, TOCTOU condition could lead to a buffer overflow in function playready_reader_bind().
[]
null
null
9.8
null
CVE-2008-0278
SQL injection vulnerability in index.php in X7 Chat 2.0.5 and possibly earlier allows remote attackers to execute arbitrary SQL commands via the day parameter in a sm_window action.
[ "cpe:2.3:a:x7_group:x7_chat:*:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-wpw2-w3qc-gx5g
Heap buffer overflow in GPU in Google Chrome prior to 99.0.4844.74 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
null
6.5
null
null
CVE-2013-3615
Dahua DVR appliances use a password-hash algorithm with a short hash length, which makes it easier for context-dependent attackers to discover cleartext passwords via a brute-force attack.
[ "cpe:2.3:h:dahuasecurity:dvr0404hd-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hd-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hd-u:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-a-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-al-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0404hf-u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hd-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-a-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-al-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-l-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr0804hf-u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hd-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hd-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-a-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-al-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-l-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr1604hf-u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2104he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2108he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116hc:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2116he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2404hf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2404lf-al:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr2404lf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3204hf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3204lf-al:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3204lf-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3224l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr3232l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5104c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5104h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5104he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5108c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5108h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5108he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5116c:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5116h:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5116he:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5204a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5204l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5208a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5208l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5216a:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5216l:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5404:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5408:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5416:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5804:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5808:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr5816:-:*:*:*:*:*:*:*", "cpe:2.3:h:dahuasecurity:dvr6404lf-s:-:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-mc25-v4mw-cvr9
Telephony application has a Exposure of Sensitive Information to an Unauthorized Actor vulnerability.Successful exploitation of this vulnerability could lead to sensitive information disclosure.
[]
null
5.3
null
null
CVE-2024-33529
ILIAS 7 before 7.30 and ILIAS 8 before 8.11 as well as ILIAS 9.0 allow remote authenticated attackers with administrative privileges to execute operating system commands via file uploads with dangerous types.
[ "cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
CVE-2023-23548
XSS in business intelligence
Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30.
[ "cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p31:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p32:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p33:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p34:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p35:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p36:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p37:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*" ]
null
5.4
null
null
CVE-2023-5189
Hub: insecure galaxy-importer tarfile extraction
A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.
[ "cpe:/a:redhat:ansible_automation_platform:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el8", "cpe:/a:redhat:ansible_automation_platform:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el8", "cpe:/a:redhat:ansible_automation_platform_inside:2.4::el9", "cpe:/a:redhat:ansible_automation_platform_developer:2.4::el9", "cpe:/a:redhat:satellite_utils:6.14::el8", "cpe:/a:redhat:satellite:6.14::el8", "cpe:/a:redhat:satellite_capsule:6.14::el8", "cpe:/a:redhat:satellite_maintenance:6.15::el8", "cpe:/a:redhat:satellite:6.15::el8", "cpe:/a:redhat:satellite_capsule:6.15::el8", "cpe:/a:redhat:satellite_utils:6.15::el8", "cpe:2.3:a:redhat:ansible_automation_platform:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-3vq4-8jw3-cwr6
International Components for Unicode (ICU-20850) v66.1 was discovered to contain a use after free bug in the pkg_createWithAssemblyCode function in the file tools/pkgdata/pkgdata.cpp.
[]
null
null
null
null
CVE-2024-20762
Adobe Animate MP3 File parsing unitialized heap memory corruption
Animate versions 24.0, 23.0.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:animate:23.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:animate:24.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2025-36560
Server-side request forgery vulnerability exists in a-blog cms multiple versions. If this vulnerability is exploited, a remote unauthenticated attacker may gain access to sensitive information by sending a specially crafted request.
[]
9.2
8.6
null
null
GHSA-6wh2-cjj8-4r39
Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.
[]
null
null
4.3
null
GHSA-f2wv-jxwv-hgfp
Anne-AL00 Huawei phones with versions earlier than 8.0.0.151(C00) have an information leak vulnerability. Due to improper permission settings for specific commands, attackers who can connect to a mobile phone via the USB interface may exploit this vulnerability to obtain specific device information of the mobile phone.
[]
null
null
2.4
null
GHSA-9wvp-r465-wchv
After Affects versions 23.1 (and earlier), 22.6.3 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
GHSA-mqcf-9778-rpg5
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PhantomPDF 10.0.0.35798. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects embedded in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11190.
[]
null
null
null
null
GHSA-pfj7-2qfw-vwgm
NodeBB vulnerable to path traversal in translator module
ImpactPrior to v1.18.5, a path traversal vulnerability was present that allowed users to access JSON files outside of the expected `languages/` directory.PatchesThe vulnerability has been patched as of v1.18.5.WorkaroundsCherry-pick commit hash `c8b2fc46dc698db687379106b3f01c71b80f495f` to receive this patch in lieu of a full upgrade.For more informationIf you have any questions or comments about this advisory:Email us at [[email protected]](mailto:[email protected])
[]
null
5
null
null
GHSA-8jhg-mp96-62f4
Missing Authorization vulnerability in WPFactory WordPress Adverts Plugin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WordPress Adverts Plugin: from n/a through 1.4.
[]
null
5.3
null
null
CVE-2017-18850
Certain NETGEAR devices are affected by authentication bypass. This affects D6220 before 1.0.0.26, D6400 before 1.0.0.60, D8500 before 1.0.3.29, R6250 before 1.0.4.12, R6400 before 1.01.24, R6400v2 before 1.0.2.30, R6700 before 1.0.1.22, R6900 before 1.0.1.22, R6900P before 1.0.0.56, R7000 before 1.0.9.4, R7000P before 1.0.0.56, R7100LG before 1.0.0.32, R7300DST before 1.0.0.54, R7900 before 1.0.1.18, R8000 before 1.0.3.44, R8300 before 1.0.2.100_1.0.82, and R8500 before 1.0.2.100_1.0.82.
[ "cpe:2.3:o:netgear:d6220_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6220:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:d8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:d8500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6250_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6250:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:-:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6400:v2:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r6900p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r6900p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7000p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7300dst_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7300dst:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8300:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*" ]
null
null
8.4
null
CVE-2023-6538
System Management Unit (SMU) versions prior to 14.8.7825.01, used to manage Hitachi Vantara NAS products is susceptible to unintended information disclosure via unprivileged access to SMU configuration backup data.
SMU versions prior to 14.8.7825.01 are susceptible to unintended information disclosure, through URL manipulation. Authenticated users in Storage, Server or combined Server+Storage administrative roles are able to access SMU configuration backup, that would normally be barred to those specific administrative roles.
[ "cpe:2.3:o:hitachi:system_management_unit_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:hitachi:system_management_unit:-:*:*:*:*:*:*:*" ]
null
7.6
null
null
GHSA-rjwh-f52c-wv23
An issue in Ailand clinic mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token.
[]
null
5.4
null
null
GHSA-rhm4-r455-38cm
In the Linux kernel, the following vulnerability has been resolved:vfio/pci: Init the count variable in collecting hot-reset devicesThe count variable is used without initialization, it results in mistakes in the device counting and crashes the userspace if the get hot reset info path is triggered.
[]
null
5.5
null
null
RHSA-2013:1793
Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update
OpenJDK: java.util.TimeZone does not restrict setting of default time zone (Libraries, 8001029) JDK: unspecified sandbox bypass (JVM) JDK: XML4J xml entity expansion excessive memory use (XML) JDK: unspecified sandbox bypass (XML) JDK: unspecified sandbox bypass (ORB) OpenJDK: insufficient html escaping in jhat (jhat, 8011081) OpenJDK: Inet6Address class IPv6 address processing errors (Libraries, 8015743) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: image conversion out of bounds read (2D, 8014102) OpenJDK: key data leak via toString() methods (Libraries, 8011071) OpenJDK: Incorrect awt_getPixelByte/awt_getPixelShort/awt_setPixelByte/awt_setPixelShort image raster checks (2D, 8014093) OpenJDK: JTable not properly performing certain access checks (Swing, 8013744) OpenJDK: insufficient InterfaceImplementor security checks (Scripting, 8017299) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient escaping of window title string (Javadoc, 8016675) JDK: unspecified vulnerability fixed in 7u45 (2D) OpenJDK: javax.xml.transform.TransformerFactory does not properly honor XMLConstants.FEATURE_SECURE_PROCESSING (JAXP, 8012425) OpenJDK: insufficient checks of KDC replies (JGSS, 8014341) OpenJDK: javac does not ignore certain ignorable characters (Javadoc, 8016653) OpenJDK: JPEGImageReader and JPEGImageWriter missing band size checks (2D, 8013510) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: RMIConnection stub missing permission check (CORBA, 8011157) OpenJDK: VersionHelper12 does not honor modifyThreadGroup restriction (JNDI, 8013739) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient security checks (JAXWS, 8017505) OpenJDK: com.sun.org.apache.xml.internal.security.utils.UnsyncByteArrayOutputStream Denial of Service (Security, 8021290) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: XML parsing Denial of Service (JAXP, 8014530) OpenJDK: Java2d Disposer security bypass (2D, 8017287) OpenJDK: checkPackageAccess missing security check (Libraries, 8017291) JDK: unspecified vulnerability fixed in 7u45 (Deployment) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: getDeclaringClass() information leak (Libraries, 8014349) OpenJDK: ObjectInputStream/ObjectOutputStream missing checks (Libraries, 8014987) JDK: unspecified vulnerability fixed in 7u45 (2D) JDK: unspecified vulnerability fixed in 7u45 (Deployment) OpenJDK: insufficient DataFlavor security checks (AWT, 8012277) OpenJDK: Missing CORBA security checks (Libraries, 8017196) OpenJDK: XML stream factory finder information leak (JAXP, 8013502)
[ "cpe:/a:redhat:network_satellite:5.4::el5", "cpe:/a:redhat:network_satellite:5.4::el6", "cpe:/a:redhat:network_satellite:5.5::el5", "cpe:/a:redhat:network_satellite:5.5::el6", "cpe:/a:redhat:network_satellite:5.6::el5", "cpe:/a:redhat:network_satellite:5.6::el6" ]
null
null
null
null
GHSA-mvvh-r56m-m8fw
Unspecified vulnerability in the Oracle Agile component in Oracle Supply Chain Products Suite 5.2.2, 6.0.0, and 6.1.1 allows remote attackers to affect integrity, related to SCRM - Company Profiles.
[]
null
null
null
null
ICSA-24-193-02
Siemens RUGGEDCOM APE 1808
A stack-based buffer overflow in Fortinet FortiOS version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.12 and 6.4.6 through 6.4.15 and 6.2.9 through 6.2.16 and 6.0.13 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted CLI commands. A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link. A use of password hash with insufficient computational effort vulnerability [CWE-916] affecting FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions may allow a privileged attacker with super-admin profile and CLI access to decrypting the backup file. An improper neutralization of input during web page Generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiOS version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 6.4 all versions and FortiProxy version 7.4.2 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions reboot page may allow a remote privileged attacker with super-admin access to execute JavaScript code via crafted HTTP GET requests. An improper neutralization of input during web page Generation vulnerability [CWE-79] in FortiOS and FortiProxy's web SSL VPN UI may allow a remote unauthenticated attacker to perform a Cross-Site Scripting attack via social engineering the targeted user into bookmarking a malicious samba server, then opening the bookmark. A stack-based buffer overflow in Fortinet FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiWeb, FortiAuthenticator, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.1 through 7.0.3, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.15, 2.0.0 through 2.0.13, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7 allows attacker to execute unauthorized code or commands via specially crafted packets. A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets. An incorrect parsing of numbers with different radices vulnerability [CWE-1389] in FortiProxy version 7.4.3 and below, version 7.2.10 and below, version 7.0.17 and below and FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.15 and below IP address validation feature may permit an unauthenticated attacker to bypass the IP blocklist via crafted requests. An improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.16 and below; FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below; FortiSASE version 24.2.b SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests. An improper access control vulnerability [CWE-284] in FortiOS 7.4.0 through 7.4.3, 7.2.5 through 7.2.7, 7.0.12 through 7.0.14 and 6.4.x may allow an attacker who has already successfully obtained write access to the underlying system (via another hypothetical exploit) to bypass the file integrity checking system. A channel accessible by non-endpoint vulnerability [CWE-300] in Fortinet FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7 and before 7.0.14 & FortiProxy version 7.4.0 through 7.4.3, 7.2.0 through 7.2.9 and before 7.0.16 allows an unauthenticated attacker with the knowledge of device specific data to spoof the identity of a downstream device of the security fabric via crafted TCP requests. A buffer over-read vulnerability in FortiOS may allow a remote unauthenticated attacker to crash the FGFM daemon via a specially crafted request, under rare conditions that are outside of the attacker's control.
[]
null
3.7
null
null
GHSA-pjh2-f9rj-r4fc
An issue was discovered on Lutron Quantum BACnet Integration 2.0 (firmware 3.2.243) devices. Remote attackers can obtain potentially sensitive information via a /DbXmlInfo.xml request, as demonstrated by the Latitude/Longitude of the device.
[]
null
null
7.5
null
CVE-2025-49873
WordPress Elessi <= 6.3.9 - Cross Site Scripting (XSS) Vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NasaTheme Elessi allows Reflected XSS. This issue affects Elessi: from n/a through 6.3.9.
[]
null
7.1
null
null
CVE-2003-1460
Worker Filemanager 1.0 through 2.7 sets the permissions on the destination directory to world-readable and executable while copying data, which could allow local users to obtain sensitive information.
[ "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.6:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ralf_hoffmann:worker_filemanager:2.7:*:*:*:*:*:*:*" ]
null
null
null
3.6
GHSA-hxp6-963m-8348
Directory traversal vulnerability in idm/includes/helpServer.jsp in Sun Java System Identity Manager 6.0 through 6.0 SP4, 7.0, and 7.1 allows remote attackers to read arbitrary files in the filesystem of the IDM server via directory traversal sequences in the ext parameter.
[]
null
null
null
null
GHSA-wg44-6gfj-xf8p
Buffer overflow in gkrellmd for gkrellm 2.1.x before 2.1.14 may allow remote attackers to execute arbitrary code.
[]
null
null
null
null
GHSA-2982-268x-jwcx
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scripting attacks via the error handling functionality of web pages.
[]
null
null
null
null
cisco-sa-20190417-ucm-dos
Cisco Unified Communications Manager Denial of Service Vulnerability
A vulnerability in the User Data Services (UDS) API of Cisco Unified Communications Manager (Unified CM) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the management GUI. The vulnerability is due to improper validation of input parameters in the UDS API requests. An attacker could exploit this vulnerability by sending a crafted request to the UDS API of an affected device. A successful exploit could allow the attacker to make the A Cisco DB service quit unexpectedly, preventing admin access to the Unified CM management GUI. Manual intervention may be required to restore normal operation. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ucm-dos ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-ucm-dos"]
[]
null
null
5.3
null
GHSA-72x4-42p9-5q44
In the Linux kernel, the following vulnerability has been resolved:netrom: Fix data-races around sysctl_netrom_network_ttl_initialiserWe need to protect the reader reading the sysctl value because the value can be changed concurrently.
[]
null
null
null
null
CVE-2010-2474
JBoss Enterprise Service Bus (ESB) before 4.7 CP02 in JBoss Enterprise SOA Platform before 5.0.2 does not properly consider the security domain with which a service is secured, which might allow remote attackers to gain privileges by executing a service.
[ "cpe:2.3:a:redhat:jboss_enterprise_service_bus:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.2:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.4:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_service_bus:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp01:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp02:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp03:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp04:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:cp05:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.2.0:tp02:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp01:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp02:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp03:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:4.3.0:cp04:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-g93f-x4pg-4xcw
An issue was discoverered in in abhijitnathwani image-processing v0.1.0, allows local attackers to cause a denial of service via a crafted image file.
[]
null
null
null
null
CVE-2016-11020
Kunena before 5.0.4 does not restrict avatar file extensions to gif, jpeg, jpg, and png. This can lead to XSS and remote code execution.
[ "cpe:2.3:a:kunena:kunena:*:*:*:*:*:joomla\\!:*:*" ]
null
9.8
null
7.5
GHSA-2673-vwc6-q3m5
The Missing Device feature in Lookout allows physically proximate attackers to provide arbitrary location data via a "commonly available simple GPS location spoofer."
[]
null
null
null
null
GHSA-4fgf-49jq-4vc7
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ogun Labs Lenxel Core for Lenxel(LNX) LMS allows Stored XSS.This issue affects Lenxel Core for Lenxel(LNX) LMS: from n/a through 1.2.5.
[]
null
6.5
null
null
GHSA-fqqx-226c-w34m
A vulnerability was found in SourceCodester Airline Ticket Reservation System 1.0. It has been rated as critical. This issue affects some unknown processing of the file activate_jet_details_form_handler.php. The manipulation of the argument jet_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-259451.
[]
null
7.3
null
null
CVE-2004-2006
Trend Micro OfficeScan 3.0 - 6.0 has default permissions of "Everyone Full Control" on the installation directory and registry keys, which allows local users to disable virus protection.
[ "cpe:2.3:a:trend_micro:officescan:3.0:*:corporate:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:corporate_3.5:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:corporate_3.11:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:corporate_3.13:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:corporate_3.54:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:corporate_5.02:*:*:*:*:*:*:*", "cpe:2.3:a:trend_micro:officescan:corporate_5.58:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-h6gg-5gq2-7fgc
There is an integer overflow in the ION driver "/dev/ion" of Allwinner R818 SoC Android Q SDK V1.0 that could use the ioctl cmd "COMPAT_ION_IOC_SUNXI_FLUSH_RANGE" to cause a system crash (denial of service).
[]
null
null
null
null
CVE-2022-31602
NVIDIA DGX A100 contains a vulnerability in SBIOS in the IpSecDxe, where a user with elevated privileges and a preconditioned heap can exploit an out-of-bounds write vulnerability, which may lead to code execution, denial of service, data integrity impact, and information disclosure.
[ "cpe:2.3:o:nvidia:dgx_a100_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:dgx_a100:-:*:*:*:*:*:*:*" ]
null
6.4
null
null
CVE-2024-50063
bpf: Prevent tail call between progs attached to different hooks
In the Linux kernel, the following vulnerability has been resolved: bpf: Prevent tail call between progs attached to different hooks bpf progs can be attached to kernel functions, and the attached functions can take different parameters or return different return values. If prog attached to one kernel function tail calls prog attached to another kernel function, the ctx access or return value verification could be bypassed. For example, if prog1 is attached to func1 which takes only 1 parameter and prog2 is attached to func2 which takes two parameters. Since verifier assumes the bpf ctx passed to prog2 is constructed based on func2's prototype, verifier allows prog2 to access the second parameter from the bpf ctx passed to it. The problem is that verifier does not prevent prog1 from passing its bpf ctx to prog2 via tail call. In this case, the bpf ctx passed to prog2 is constructed from func1 instead of func2, that is, the assumption for ctx access verification is bypassed. Another example, if BPF LSM prog1 is attached to hook file_alloc_security, and BPF LSM prog2 is attached to hook bpf_lsm_audit_rule_known. Verifier knows the return value rules for these two hooks, e.g. it is legal for bpf_lsm_audit_rule_known to return positive number 1, and it is illegal for file_alloc_security to return positive number. So verifier allows prog2 to return positive number 1, but does not allow prog1 to return positive number. The problem is that verifier does not prevent prog1 from calling prog2 via tail call. In this case, prog2's return value 1 will be used as the return value for prog1's hook file_alloc_security. That is, the return value rule is bypassed. This patch adds restriction for tail call to prevent such bypasses.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-637q-chfg-pfcv
Ashlar-Vellum Cobalt CO File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CO files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17892.
[]
null
null
7.8
null
CVE-2020-14019
Open-iSCSI rtslib-fb through 2.1.72 has weak permissions for /etc/target/saveconfig.json because shutil.copyfile (instead of shutil.copy) is used, and thus permissions are not preserved.
[ "cpe:2.3:a:rtslib-fb_project:rtslib-fb:*:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
GHSA-xpw4-fqph-98h8
SQL injection vulnerability in modules.php in 4nNukeWare 4nForum 0.91 allows remote attackers to execute arbitrary SQL commands via the tid parameter.
[]
null
null
null
null
CVE-2025-32494
WordPress reCAPTCHA Jetpack <= 0.2.2 - Cross Site Request Forgery (CSRF) Vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in bozdoz reCAPTCHA Jetpack allows Cross Site Request Forgery. This issue affects reCAPTCHA Jetpack: from n/a through 0.2.2.
[]
null
4.3
null
null
CVE-2021-40093
A cross-site scripting (XSS) vulnerability in integration configuration in SquaredUp for SCOM 5.2.1.6654 allows remote attackers to inject arbitrary web script or HTML via dashboard actions.
[ "cpe:2.3:a:squaredup:squaredup:*:*:*:*:azure:*:*:*", "cpe:2.3:a:squaredup:squaredup:*:*:*:*:community:*:*:*", "cpe:2.3:a:squaredup:squaredup:*:*:*:*:system_center_operations_manager:*:*:*" ]
null
5.4
null
3.5
GHSA-c7ff-fqm5-qq8j
3scale API Management 2 does not perform adequate sanitation for user input in multiple fields. An authenticated user could use this flaw to inject scripts and possibly gain access to sensitive information or conduct further attacks.
[]
null
8.8
null
null
GHSA-hxj7-c89m-gvm5
Libde265 v1.0.8 was discovered to contain a heap-buffer-overflow vulnerability via put_qpel_fallback<unsigned short> in fallback-motion.cc. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted video file.
[]
null
6.5
null
null
GHSA-7hq6-g7qg-g2f8
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 does not include the HTTPOnly flag in a Set-Cookie header, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors.
[]
null
null
null
null
GHSA-7v5r-hqr9-r2x2
A flaw was discovered in postgresql where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
[]
null
8.8
null
null
GHSA-c3mg-9hrc-3m49
Insertion of Sensitive Information into Log File vulnerability in Hitachi Cosminexus Component Container allows local users to gain sensitive information.This issue affects Cosminexus Component Container: from 11-30 before 11-30-05, from 11-20 through 11-20-*, from 11-10 through 11-10-*, from 11-00 before 11-00-12, All versions of V8 and V9.
[]
null
5.6
null
null
CVE-2023-34379
WordPress Cart2Cart: Magento to WooCommerce Migration Plugin <= 2.0.0 is vulnerable to Broken Access Control
Missing Authorization vulnerability in MagneticOne Cart2Cart: Magento to WooCommerce Migration.This issue affects Cart2Cart: Magento to WooCommerce Migration: from n/a through 2.0.0.
[ "cpe:2.3:a:magneticone:magento_to_woocommerce_migration:*:*:*:*:*:wordpress:*:*" ]
null
5.4
null
null
RHSA-2020:2833
Red Hat Security Advisory: kdelibs security update
kdelibs: malicious desktop files and configuration files lead to code execution with minimal user interaction
[ "cpe:/o:redhat:rhel_eus:7.6::computenode", "cpe:/o:redhat:rhel_eus:7.6::server" ]
null
null
8.8
null
GHSA-85mg-8m94-9jrr
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragmented frames encrypted using WEP, CCMP, or GCMP, this can be abused to inject arbitrary network packets and/or exfiltrate user data.
[]
null
3.5
null
null
GHSA-jv5w-7v7v-vjcc
Google Chrome before 3.0 does not properly handle XML documents, which allows remote attackers to obtain sensitive information via a crafted web site.
[]
null
null
null
null
ICSA-17-031-01A
BINOM3 Electric Power Quality Meter (Update A)
Input sent from a malicious client is not properly verified by the server. An attacker can execute arbitrary script code in another user 's browser session.CVE-2017-5164 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H). Lack of authentication for remote service gives access to application set up and configuration.CVE-2017-5162 has been assigned to this vulnerability. A CVSS v3 base score of 10 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). There is no CSRF Token generated per page and/or per (sensitive) function. Successful exploitation of this vulnerability can allow silent execution of unauthorized actions on the device such as configuration parameter changes, and saving modified configuration.CVE-2017-5165 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H). This flaw can be used to gain privileged access to the device.CVE-2017-5166 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Users do not have any option to change their own passwords.CVE-2017-5167 has been assigned to this vulnerability. A CVSS v3 base score of 8.6 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L).
[]
null
null
8.6
null
CVE-2022-20862
Cisco Unified Communications Manager Arbitrary File Read Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request that contains directory traversal character sequences to an affected system. A successful exploit could allow the attacker to access sensitive files on the operating system.
[ "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:-:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:session_management:*:*:*", "cpe:2.3:a:cisco:unified_communications_manager:*:*:*:*:*:*:*:*" ]
null
4.3
null
null