id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-g89x-ccw9-3vqf | phpMyAdmin 2.5.1 up to 2.5.7 allows remote attackers to modify configuration settings and gain unauthorized access to MySQL servers via modified $cfg['Servers'] variables. | [] | null | null | null | null |
|
RHSA-2020:2513 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 6.5 | 8.1 | null |
GHSA-rrjm-c35q-fqpq | Unspecified vulnerability in the Oracle Hospitality OPERA 5 Property Services component in Oracle Hospitality Applications 5.4.0.0 through 5.4.3.0, 5.5.0.0, and 5.5.1.0 allows remote authenticated users to affect confidentiality, integrity, and availability via vectors related to OPERA. | [] | null | null | 7.4 | null |
|
GHSA-5qm8-v274-4wjj | Buffer overflow in Flash OCX for Macromedia Flash 6 revision 23 (6,0,23,0) allows remote attackers to execute arbitrary code via a long movie parameter. | [] | null | null | null | null |
|
CVE-2024-12440 | Candifly <= 1.0.6 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Candifly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'candifly' shortcode in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
CVE-2021-33000 | Parsing a maliciously crafted project file may cause a heap-based buffer overflow, which may allow an attacker to perform arbitrary code execution. User interaction is required on the WebAccess HMI Designer (versions 2.1.9.95 and prior). | [
"cpe:2.3:a:advantech:webaccess\\/hmi_designer:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-8mx8-vqqf-jvh9 | An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. A user with valid credentials is able to create and write XML files on the filesystem via /common/vam_editXml.php in the web interface. The vulnerable PHP page checks none of these: the parameter that identifies the file name to be created, the destination path, or the extension. Thus, an attacker can manipulate the file name to create any type of file within the filesystem with arbitrary content. | [] | null | null | null | null |
|
GHSA-8mrr-p2f9-9f86 | A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM) and Cisco Unified Communications Manager Session Management Edition (Unified CM SME) could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system. This vulnerability exists because the web-based management interface inadequately validates user input. An attacker could exploit this vulnerability by authenticating to the application as a low-privileged user and sending crafted SQL queries to an affected system. A successful exploit could allow the attacker to read or modify any data on the underlying database or elevate their privileges. | [] | null | 8.8 | null | null |
|
CVE-2018-16767 | In WAVM through 2018-07-26, a crafted file sent to the WebAssembly Virtual Machine may cause a denial of service (application crash) or possibly have unspecified other impact because of an unspecified "heap-buffer-overflow" condition in FunctionValidationContext::popAndValidateOperand. | [
"cpe:2.3:a:webassembly_virtual_machine_project:webassembly_virtual_machine:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-3px7-jm2p-6h2c | encoded_id-rails potential DOS vulnerability due to URIs with extremely long encoded IDs | ImpactThe length of URIs and the various parts (eg path segments, query parameters) is usually limited by the webserver processing the incoming request. In the case of Puma the defaults are :path segment length: 8192Max URI length: 1024 * 12Max query length: 1024 * 10See https://github.com/puma/puma/blob/master/docs/compile_options.mdIf too long Puma raises:Puma caught this error: HTTP element REQUEST_PATH is longer than the (8192) allowed length (was 12503) (Puma::HttpParserError)However due to the performance of `hashids` extremely long encoded IDs will consume a large amount of CPU and allocate a huge number of intermediate objects.For example:This causes the application to spend a huge amount of time decoding the ID and the allocation of > 200MB of objects.PatchesUpgrade to `1.0.0.beta2`This introduces a new option to limit the length of IDs that can be decoded. A future release will also improve the performance and hugely reduce allocations in the underlying hashids implementation.References_Are there any links users can visit to find out more?_ | [] | null | 7.5 | null | null |
GHSA-6mch-f8jc-rpmr | The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path. | [] | null | null | null | null |
|
CVE-2020-10094 | A cross-site scripting (XSS) vulnerability in Lexmark CS31x before LW74.VYL.P273; CS41x before LW74.VY2.P273; CS51x before LW74.VY4.P273; CX310 before LW74.GM2.P273; CX410 & XC2130 before LW74.GM4.P273; CX510 & XC2132 before LW74.GM7.P273; MS310, MS312, MS317 before LW74.PRL.P273; MS410, M1140 before LW74.PRL.P273; MS315, MS415, MS417 before LW74.TL2.P273; MS51x, MS610dn, MS617 before LW74.PR2.P273; M1145, M3150dn before LW74.PR2.P273; MS610de, M3150 before LW74.PR4.P273; MS71x,M5163dn before LW74.DN2.P273; MS810, MS811, MS812, MS817, MS818 before LW74.DN2.P273; MS810de, M5155, M5163 before LW74.DN4.P273; MS812de, M5170 before LW74.DN7.P273; MS91x before LW74.SA.P273; MX31x, XM1135 before LW74.SB2.P273; MX410, MX510 & MX511 before LW74.SB4.P273; XM1140, XM1145 before LW74.SB4.P273; MX610 & MX611 before LW74.SB7.P273; XM3150 before LW74.SB7.P273; MX71x, MX81x before LW74.TU.P273; XM51xx & XM71xx before LW74.TU.P273; MX91x & XM91x before LW74.MG.P273; MX6500e before LW74.JD.P273; C746 before LHS60.CM2.P738; C748, CS748 before LHS60.CM4.P738; C792, CS796 before LHS60.HC.P738; C925 before LHS60.HV.P738; C950 before LHS60.TP.P738; X548 & XS548 before LHS60.VK.P738; X74x & XS748 before LHS60.NY.P738; X792 & XS79x before LHS60.MR.P738; X925 & XS925 before LHS60.HK.P738; X95x & XS95x before LHS60.TQ.P738; 6500e before LHS60.JR.P738;C734 LR.SK.P824 and earlier; C736 LR.SKE.P824 and earlier; E46x LR.LBH.P824 and earlier; T65x LR.JP.P824 and earlier; X46x LR.BS.P824 and earlier; X65x LR.MN.P824 and earlier; X73x LR.FL.P824 and earlier; W850 LP.JB.P823 and earlier; and X86x LP.SP.P823 and earlier. | [
"cpe:2.3:o:lexmark:cs31x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs31x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs41x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs41x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs51x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs51x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc2130_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc2132_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2132:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms310_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms312_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms312:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms317_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms317:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms315_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms417_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms417:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms51x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms51x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms610dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms610dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms617_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m1145_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1145:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m3150dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3150dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms610de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms610de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m3150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms71x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms71x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5163dn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms810_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms812_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms817_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms818_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms810de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5155_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5163_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms812de_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:m5170_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:ms91x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms91x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx31x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx31x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1135_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1135:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx410_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx510_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx510:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx511_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx511:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1140_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1140:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm1145_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1145:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx610_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx611_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm3150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx71x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx71x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx81x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx81x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm51xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm51xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm71xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm71xx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx91x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx91x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm91x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm91x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx6500e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c746_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c748_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs748_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c792_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cs796_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c925_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c950_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x548_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs548_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x74x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x74x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs748_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x792_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs79x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs79x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x925_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs925_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x95x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x95x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xs95x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs95x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:6500e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:c736_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:e46x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:t65x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x46x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x65x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x73x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:w850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:x86x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 |
|
GHSA-9r4f-wr6h-rg8h | A vulnerability in the processing of inbound IPv6 packets in Juniper Networks Junos OS on QFX5000 Series and EX4600 switches may cause the memory to not be freed, leading to a packet DMA memory leak, and eventual Denial of Service (DoS) condition. Once the condition occurs, further packet processing will be impacted, creating a sustained Denial of Service (DoS) condition. The following error logs may be observed using the "show heap" command and the device may eventually run out of memory if such packets are received continuously. Jan 12 12:00:00 device-name fpc0 (buf alloc) failed allocating packet buffer Jan 12 12:00:01 device-name fpc0 (buf alloc) failed allocating packet buffer user@device-name> request pfe execute target fpc0 timeout 30 command "show heap" ID Base Total(b) Free(b) Used(b) % Name -- ---------- ----------- ----------- ----------- --- ----------- 0 246fc1a8 536870488 353653752 183216736 34 Kernel 1 91800000 16777216 12069680 4707536 28 DMA 2 92800000 75497472 69997640 5499832 7 PKT DMA DESC 3 106fc000 335544320 221425960 114118360 34 Bcm_sdk 4 97000000 176160768 200 176160568 99 Packet DMA <<<<<<<<<<<<<< 5 903fffe0 20971504 20971504 0 0 Blob This issue affects Juniper Networks Junos OS on QFX5000 Series, EX4600: 18.3R3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S9; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S3; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R2-S5, 19.4R3-S6; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S2; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2-S1, 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. This issue does not affect Juniper Networks Junos OS: Any versions prior to 17.4R3; 18.1 versions prior to 18.1R3-S6; 18.2 versions prior to 18.2R3; 18.3 versions prior to 18.3R3; 18.4 versions prior to 18.4R2; 19.1 versions prior to 19.1R2. | [] | null | null | null | null |
|
GHSA-5m62-fhcm-35jc | Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology Router Manager (SRM) before 1.1.5-6542-4 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter. | [] | null | null | 6.5 | null |
|
CVE-2019-7923 | A server-side request forgery (SSRF) vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. This can be exploited by authenticated user with admin privileges to manipulate shipment settings to execute arbitrary code. | [
"cpe:2.3:a:magento:magento:*:*:*:*:open_source:*:*:*"
] | null | null | 7.2 | 6.5 |
|
GHSA-84pf-mmw6-6g2p | Buffer overflow in ICQ 99b 1.1.1.1 client allows remote attackers to execute commands via a malformed URL within an ICQ message. | [] | null | null | null | null |
|
CVE-2024-32601 | WordPress Popup Anything plugin <= 2.8 - Broken Access Control vulnerability | Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Popup Anything.This issue affects Popup Anything: from n/a through 2.8.
| [
"cpe:2.3:a:wordpress:popup_anything:2.8:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2010-0022 | The SMB implementation in the Server service in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly validate the share and servername fields in SMB packets, which allows remote attackers to cause a denial of service (system hang) via a crafted packet, aka "SMB Null Pointer Vulnerability." | [
"cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:-:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:pro_x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 7.8 |
|
GHSA-9hx3-jmww-j882 | A vulnerability has been found in PCMan FTP Server 2.0.7 and classified as problematic. This vulnerability affects unknown code of the component PUT Command Handler. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-251554 is the identifier assigned to this vulnerability. | [] | null | 5.3 | null | null |
|
CVE-2021-27608 | An unquoted service path in SAPSetup, version - 9.0, could lead to privilege escalation during the installation process that is performed when an executable file is registered. This could further lead to complete compromise of confidentiality, Integrity and Availability. | [
"cpe:2.3:a:sap:setup:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-6pfc-w86r-54q6 | Welcome and About GeoServer pages communicate version and revision information | ImpactThe welcome and about page includes version and revision information about the software in use (including library and components used).This information is sensitive from a security point of view because it allows software used by the server to be easily identified.Proof of ConceptWelcome page footer:About page *build information*.PatchesNo patch presently available.WorkaroundsNo workaround available, although the ADMIN_CONSOLE can be disabled completely.References[About GeoServer](https://docs.geoserver.org/latest/en/user/webadmin/about.html) | [] | null | 5.3 | null | null |
GHSA-83r8-f922-m96h | An issue was discovered in a smart contract implementation for SingaporeCoinOrigin (SCO), an Ethereum token. The contract has an integer overflow. If the owner sets the value of sellPrice to a large number in setPrices() then the "amount * sellPrice" will cause an integer overflow in sell(). | [] | null | 9.8 | null | null |
|
CVE-2024-44092 | There is a possible LCS signing enforcement missing due to test/debugging code left in a production build. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
|
CVE-2008-2831 | Multiple cross-site scripting (XSS) vulnerabilities in the delegated spam management feature in the Spam Quarantine Management (SQM) component in MailMarshal SMTP 6.0.3.8 through 6.3.0.0 allow user-assisted remote authenticated users to inject arbitrary web script or HTML via (1) the list of blocked senders or (2) the list of safe senders. | [
"cpe:2.3:a:mailmarshal:e10000_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mailmarshal:smtp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mailmarshal:smtp:6.0.3.8:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2014-6041 | The Android WebView in Android before 4.4 allows remote attackers to bypass the Same Origin Policy via a crafted attribute containing a \u0000 character, as demonstrated by an onclick="window.open('\u0000javascript: sequence to the Android Browser application 4.2.1 or a third-party web browser. | [
"cpe:2.3:a:google:android_browser:4.2.1:*:*:*:*:android:*:*"
] | null | null | null | 5.8 |
|
GHSA-59x7-qh7q-fgv8 | Directory traversal vulnerability in showpage.cgi in YNP Portal System 2.2.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the p parameter. | [] | null | null | null | null |
|
RHSA-2022:1681 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.4.4 security updates and bug fixes | vm2: vulnerable to Sandbox Bypass golang.org/x/crypto: empty plaintext packet causes panic follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor node-fetch: exposure of sensitive information to an unauthorized actor follow-redirects: Exposure of Sensitive Information via Authorization Header leak urijs: Authorization Bypass Through User-Controlled Key cross-fetch: Exposure of Private Personal Information to an Unauthorized Actor nconf: Prototype pollution in memory store nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account urijs: Leading white space bypasses protocol validation node-forge: Signature verification leniency in checking `digestAlgorithm` structure can lead to signature forgery node-forge: Signature verification failing to check tailing garbage bytes can lead to signature forgery node-forge: Signature verification leniency in checking `DigestInfo` structure Moment.js: Path traversal in moment.locale | [
"cpe:/a:redhat:acm:2.4::el8"
] | null | 7.5 | null | null |
CVE-2024-43523 | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | Windows Mobile Broadband Driver Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
GHSA-qmj6-6gg3-prp7 | Race condition in the PCNTL extension in PHP before 5.3.4, when a user-defined signal handler exists, might allow context-dependent attackers to cause a denial of service (memory corruption) via a large number of concurrent signals. | [] | null | null | null | null |
|
CVE-2024-12270 | Beautiful Taxonomy Filters <= 2.4.3 - Unauthenticated SQL Injection | The Beautiful taxonomy filters plugin for WordPress is vulnerable to SQL Injection via the 'selects[0][term]' parameter in all versions up to, and including, 2.4.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [
"cpe:2.3:a:jonatahndejong:beautiful_taxonomy_filters:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2022-25180 | Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline. | [
"cpe:2.3:a:jenkins:pipeline\\:_groovy:*:*:*:*:*:jenkins:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-w2rx-mhwj-8rc7 | Due to missing input validation in all Android releases from CAF using the Linux kernel, HLOS can write to fuses for which it should not have access. | [] | null | null | 7.8 | null |
|
RHSA-2020:2041 | Red Hat Security Advisory: squid:4 security update | squid: improper check for new member in ESIExpression::Evaluate allows for stack buffer overflow squid: parsing of header Proxy-Authentication leads to memory corruption squid: improper access restriction upon Digest Authentication nonce replay could lead to remote code execution | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.1 | 4.3 | null |
GHSA-4v3v-mrjj-3599 | Windows DNS Server Remote Code Execution Vulnerability | [] | null | 6.6 | null | null |
|
CVE-2025-22631 | WordPress Marketing Automation Plugin <= 1.2.6.8 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vbout Marketing Automation allows Reflected XSS. This issue affects Marketing Automation: from n/a through 1.2.6.8. | [] | null | 7.1 | null | null |
CVE-2023-50770 | Jenkins OpenId Connect Authentication Plugin 2.6 and earlier stores a password of a local user account used as an anti-lockout feature in a recoverable format, allowing attackers with access to the Jenkins controller file system to recover the plain text password of that account, likely gaining administrator access to Jenkins. | [
"cpe:2.3:a:jenkins:openid:*:*:*:*:*:jenkins:*:*"
] | null | 6.7 | null | null |
|
CVE-2005-2846 | PHP remote file inclusion vulnerability in lang.php in CMS Made Simple 0.10 and earlier allows remote attackers to execute arbitrary PHP code via the nls[file][vx][vxsfx] parameter. | [
"cpe:2.3:a:cmsmadesimple:cms_made_simple:0.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-rvqw-7368-wgf4 | Some Kyocera printers (such as the ECOSYS M5526cdw 2R7_2000.001.701) were affected by a buffer overflow vulnerability in the URI paths of the web application that would allow an unauthenticated attacker to perform a Denial of Service attack, crashing the device, or potentially execute arbitrary code on the device. | [] | null | null | null | null |
|
CVE-2021-35990 | Adobe Bridge JPEG2000 Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability | Adobe Bridge version 11.0.2 (and earlier) is affected by an Out-of-bounds Write vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2024-6022 | ContentLock <= 1.0.3 - Settings Update via CSRF | The ContentLock WordPress plugin through 1.0.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack | [
"cpe:2.3:a:adam_solymosi:contentlock:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adamsolymosi:contentlock:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
GHSA-v7m5-jjhm-hp24 | Multiple off-by-one buffer overflows in the IMAP capability for Mutt 1.3.28 and earlier, and Balsa 1.2.4 and earlier, allow a remote malicious IMAP server to cause a denial of service (crash) and possibly execute arbitrary code via a specially crafted mail folder, a different vulnerability than CVE-2003-0140. | [] | null | null | null | null |
|
GHSA-74pp-9w49-8mr2 | Vocera Communications wireless handsets, when using Protected Extensible Authentication Protocol (PEAP), do not validate server certificates, which allows remote wireless access points to steal hashed passwords and conduct man-in-the-middle (MITM) attacks. | [] | null | null | null | null |
|
GHSA-5rvj-4rxp-67hv | Cross-site Scripting (XSS) - Generic in GitHub repository tsolucio/corebos prior to 8.0. | [] | null | 5.4 | null | null |
|
CVE-2018-16332 | An issue was discovered in iCMS 7.0.9. There is an admincp.php?app=article&do=update CSRF vulnerability. | [
"cpe:2.3:a:idreamsoft:icms:7.0.9:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-33592 | WordPress Radio Player plugin <= 2.0.73 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in SoftLab Radio Player.This issue affects Radio Player: from n/a through 2.0.73.
| [] | null | 5.4 | null | null |
CVE-2023-46604 | Apache ActiveMQ, Apache ActiveMQ Legacy OpenWire Module: Unbounded deserialization causes ActiveMQ to be vulnerable to a remote code execution (RCE) attack | The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the OpenWire
protocol to cause either the client or the broker (respectively) to
instantiate any class on the classpath.
Users are recommended to upgrade
both brokers and clients to version 5.15.16, 5.16.7, 5.17.6, or 5.18.3
which fixes this issue. | [
"cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:activemq_legacy_openwire_module:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services_proxy:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_storage_plugin:-:*:*:*:*:vcenter:*:*"
] | null | 10 | null | null |
GHSA-cr7c-5w66-wh22 | The Embed Peertube Playlist WordPress plugin before 1.10 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 5.4 | null | null |
|
CVE-2019-8440 | An issue was discovered in DiliCMS 2.4.0. There is a Stored XSS Vulnerability in the third textbox (aka site logo) of "System setting->site setting" of admin/index.php, aka site_logo. | [
"cpe:2.3:a:dilicms:dilicms:2.4.0:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 |
|
GHSA-qpr6-hwgq-rh24 | In btm_read_tx_power_complete of btm_acl.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure in the Bluetooth server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-260568083 | [] | null | 4.4 | null | null |
|
GHSA-2vrr-4c25-83m3 | Vulnerability in the Oracle CRM Technical Foundation component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle CRM Technical Foundation. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle CRM Technical Foundation, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle CRM Technical Foundation accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [] | null | null | 4.7 | null |
|
GHSA-fmmj-86g5-6gg3 | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Memcached). Supported versions that are affected are 8.0.25 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server. CVSS 3.1 Base Score 2.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L). | [] | null | null | null | null |
|
RHSA-2016:2915 | Red Hat Security Advisory: atomic-openshift security and bug fix update | 3: Pulling of any image is possible with it manifest | [
"cpe:/a:redhat:openshift:3.1::el7",
"cpe:/a:redhat:openshift:3.2::el7",
"cpe:/a:redhat:openshift:3.3::el7"
] | null | null | 3.1 | null |
GHSA-m26m-f94h-984c | An elevation of privilege vulnerability exists when Microsoft Windows improperly handles reparse points, aka 'Windows Elevation of Privilege Vulnerability'. | [] | null | 7.1 | null | null |
|
CVE-2024-4269 | SVG Block < 1.1.20 - Author+ Stored XSS via SVG File Upload | The SVG Block WordPress plugin before 1.1.20 does not sanitize SVG file contents, which enables users with at least the author role to SVG with malicious JavaScript to conduct Stored XSS attacks. | [
"cpe:2.3:a:phiphan:svg_block:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2021-3828 | Inefficient Regular Expression Complexity in nltk/nltk | nltk is vulnerable to Inefficient Regular Expression Complexity | [
"cpe:2.3:a:nltk:nltk:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
CVE-2018-4324 | A permissions issue existed in the handling of the Apple ID. This issue was addressed with improved access controls. This issue affected versions prior to macOS Mojave 10.14. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
GHSA-mq9q-3729-crjx | Visteon Infotainment UPDATES_ExtractFile Command Injection Remote Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Visteon Infotainment systems. Authentication is not required to exploit this vulnerability.The specific flaw exists within the UPDATES_ExtractFile function. A crafted software update file can trigger execution of a system call composed from a user-supplied string. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23422. | [] | null | null | 6.8 | null |
|
GHSA-vvcj-m38q-p82v | Multiple SQL injection vulnerabilities in Oto Galeri Sistemi 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) arac parameter to carsdetail.asp and the (2) marka parameter to twohandscars.asp. | [] | null | null | null | null |
|
CVE-2017-0491 | An elevation of privilege vulnerability in Package Manager could enable a local malicious application to prevent users from uninstalling applications or removing permissions from applications. This issue is rated as Moderate because it is a local bypass of user interaction requirements. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32553261. | [
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2010-0623 | The futex_lock_pi function in kernel/futex.c in the Linux kernel before 2.6.33-rc7 does not properly manage a certain reference count, which allows local users to cause a denial of service (OOPS) via vectors involving an unmount of an ext3 filesystem. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:-:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.33:rc6:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
GHSA-8q43-h274-m6cf | SQL injection vulnerability in the Call Detail Record (CDR) logging functionality for Asterisk allows remote attackers to execute arbitrary SQL via a CallerID string. | [] | null | null | null | null |
|
CVE-2018-7580 | Philips Hue is vulnerable to a Denial of Service attack. Sending a SYN flood on port tcp/80 will freeze Philips Hue's hub and it will stop responding. The "hub" will stop operating and be frozen until the flood stops. During the flood, the user won't be able to turn on/off the lights, and all of the hub's functionality will be unresponsive. The cloud service also won't work with the hub. | [
"cpe:2.3:o:philips:hue_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:philips:hue:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
RHSA-2020:0728 | Red Hat Security Advisory: Red Hat Data Grid 7.3.4 security update | wildfly-core: Incorrect privileges for 'Monitor', 'Auditor' and 'Deployer' user by default | [
"cpe:/a:redhat:jboss_data_grid:7.3"
] | null | null | 5.2 | null |
GHSA-qwxw-cr32-mppw | The generic_file_splice_write function in fs/splice.c in the Linux kernel before 2.6.19 does not properly strip setuid and setgid bits when there is a write to a file, which allows local users to gain the privileges of a different group, and obtain sensitive information or possibly have unspecified other impact, by splicing into an inode in order to create an executable file in a setgid directory, a different vulnerability than CVE-2008-4210. | [] | null | null | null | null |
|
CVE-2014-2892 | Heap-based buffer overflow in the get_answer function in mmsh.c in libmms before 0.6.4 allows remote attackers to execute arbitrary code via a long line in an MMS over HTTP (MMSH) server response. | [
"cpe:2.3:a:libmms_project:libmms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:libmms_project:libmms:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:libmms_project:libmms:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:libmms_project:libmms:0.6.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-g4px-p74v-q4c7 | Under very specific conditions a user could be impersonated using Gitlab shell. This vulnerability affects GitLab CE/EE 13.1 and later through 14.1.2, 14.0.7 and 13.12.9. | [] | null | null | null | null |
|
RHSA-2005:551 | Red Hat Security Advisory: kernel security update | security flaw Buffer overflow in moxa driver security flaw security flaw security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw"
] | null | null | null | null |
GHSA-mh42-89mv-q3ww | The ckconfig command in lsadmin for Load Sharing Facility (LSF) 5.1 allows local users to execute arbitrary programs by modifying the LSF_ENVDIR environment variable to reference an alternate lsf.conf file, then modifying LSF_SERVERDIR to point to a malicious lim program, which lsadmin then executes. | [] | null | null | null | null |
|
GHSA-cmph-x6r4-4whr | netfilter: nft_set_rbtree: skip sync GC for new elements in this transactionNew elements in this transaction might expired before such transaction
ends. Skip sync GC for such elements otherwise commit path might walk
over an already released object. Once transaction is finished, async GC
will collect such expired element. | [] | null | 4.4 | null | null |
|
GHSA-frxm-7vvw-wmmx | Buffer overflow in CDE Print Viewer (dtprintinfo) allows local users to execute arbitrary code by copying text from the clipboard into the Help window. | [] | null | null | null | null |
|
GHSA-xvc9-xwgj-4cq9 | Duplicate Advisory: Integer Overflow in HeaderMap::reserve() can cause Denial of Service | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-x7vr-c387-8w57. This link is maintained to preserve external references.Original DescriptionHeaderMap::reserve() used usize::next_power_of_two() to calculate the increased capacity. However, next_power_of_two() silently overflows to 0 if given a sufficiently large number in release mode.If the map was not empty when the overflow happens, the library will invoke self.grow(0) and start infinite probing. This allows an attacker who controls the argument to reserve() to cause a potential denial of service (DoS).The flaw was corrected in 0.1.20 release of http crate. | [] | null | 7.5 | null | null |
CVE-2020-27829 | A heap based buffer overflow in coders/tiff.c may result in program crash and denial of service in ImageMagick before 7.0.10-45. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
CVE-2014-8320 | Cross-site scripting (XSS) vulnerability in the Custom Search module 6.x-1.x before 6.x-1.12 and 7.x-1.x before 7.x-1.14 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via the "Label text" field to the results configuration page. | [
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.5:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.6:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.7:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.8:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.9:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.10:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:6.x-1.11:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.0:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.2:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.3:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.4:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.5:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.6:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.7:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.8:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.9:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.10:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.11:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.12:*:*:*:*:drupal:*:*",
"cpe:2.3:a:custom_search_project:custom_search:7.x-1.13:*:*:*:*:drupal:*:*"
] | null | null | null | 3.5 |
|
GHSA-wp95-g3h2-jhqf | The Fatal Error Notify WordPress plugin before 1.5.3 does not have authorisation and CSRF checks in its test_error AJAX action, allowing any authenticated users, such as subscriber to call it and spam the admin email address with error messages. The issue is also exploitable via CSRF | [] | null | 6.1 | null | null |
|
GHSA-cfr5-rfj7-vjc4 | TIBCO Spotfire Server 7.0.X before 7.0.2, 7.5.x before 7.5.1, 7.6.x before 7.6.1, 7.7.x before 7.7.1, and 7.8.x before 7.8.1 and Spotfire Analytics Platform for AWS Marketplace 7.8.0 and earlier contain multiple vulnerabilities which may allow authorized users to perform SQL injection attacks. | [] | null | null | 6.5 | null |
|
CVE-2023-45010 | WordPress Complete Open Graph Plugin <= 3.4.5 is vulnerable to Cross Site Scripting (XSS) | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Alex MacArthur Complete Open Graph plugin <= 3.4.5 versions. | [
"cpe:2.3:a:alexmacarthur:complete_open_graph:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null |
GHSA-9r3q-3rc4-46v4 | A vulnerability classified as critical was found in Campcodes Online Event Management System 1.0. This vulnerability affects unknown code of the file /views/index.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-259894 is the identifier assigned to this vulnerability. | [] | null | 6.3 | null | null |
|
PYSEC-2018-99 | null | pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. | [] | null | null | null | null |
RHSA-2017:3389 | Red Hat Security Advisory: Red Hat OpenShift Enterprise security, bug fix, and enhancement update | 3: authentication bypass for elasticsearch with external routes | [
"cpe:/a:redhat:openshift:3.4::el7",
"cpe:/a:redhat:openshift:3.5::el7",
"cpe:/a:redhat:openshift:3.6::el7"
] | null | null | 6.5 | null |
CVE-2022-36978 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Avalanche 6.3.2.3490. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the Notification Server service. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-15448. | [
"cpe:2.3:a:ivanti:avalanche:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null |
|
CVE-2016-9840 | inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. | [
"cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:a:oracle:database_server:18c:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update144:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:-:*:*:*",
"cpe:2.3:a:nodejs:node.js:*:*:*:*:lts:*:*:*"
] | null | 8.8 | null | 6.8 |
|
GHSA-fg47-8fhh-p6fc | The All in One SEO – Best WordPress SEO Plugin – Easily Improve Your SEO Rankings before 4.1.0.2 enables authenticated users with "aioseo_tools_settings" privilege (most of the time admin) to execute arbitrary code on the underlying host. Users can restore plugin's configuration by uploading a backup .ini file in the section "Tool > Import/Export". However, the plugin attempts to unserialize values of the .ini file. Moreover, the plugin embeds Monolog library which can be used to craft a gadget chain and thus trigger system command execution. | [] | null | 8.8 | null | null |
|
PYSEC-2019-127 | null | In trytond/model/modelstorage.py in Tryton 4.2 before 4.2.21, 4.4 before 4.4.19, 4.6 before 4.6.14, 4.8 before 4.8.10, and 5.0 before 5.0.6, an authenticated user can order records based on a field for which he has no access right. This may allow the user to guess values. | [] | null | null | null | null |
GHSA-qhcx-68c3-w8cp | SQL Injection exists in authors_post.php in Super Cms Blog Pro 1.0 via the author parameter. | [] | null | null | 9.8 | null |
|
CVE-2022-21843 | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability | Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:rt:*:*:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2017-3818 | A vulnerability in the Multipurpose Internet Mail Extensions (MIME) scanner of Cisco AsyncOS Software for Cisco Email Security Appliances (ESA) could allow an unauthenticated, remote attacker to bypass configured user filters on the device, aka a Malformed MIME Header Filtering Bypass. This vulnerability affects all releases prior to the first fixed release of Cisco AsyncOS Software for Cisco Email Security Appliances, both virtual and hardware appliances, if the software is configured to apply a message filter or content filter to incoming email attachments. More Information: CSCvb65245. Known Affected Releases: 9.7.1-066. Known Fixed Releases: 9.8.0-092. | [
"cpe:2.3:o:cisco:email_security_appliance_firmware:9.7.1-066:*:*:*:*:*:*:*"
] | null | null | 5.8 | 5 |
|
CVE-2024-50519 | WordPress Jigoshop – Store Exporter plugin <= 1.5.8 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Visser Labs Jigoshop – Store Exporter allows Reflected XSS.This issue affects Jigoshop – Store Exporter: from n/a through 1.5.8. | [] | null | 7.1 | null | null |
GHSA-cjc6-rgfp-h2p2 | In the Linux kernel, the following vulnerability has been resolved:netfilter: validate user input for expected lengthI got multiple syzbot reports showing old bugs exposed
by BPF after commit 20f2505fb436 ("bpf: Try to avoid kzalloc
in cgroup/{s,g}etsockopt")setsockopt() @optlen argument should be taken into account
before copying data.BUG: KASAN: slab-out-of-bounds in copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
BUG: KASAN: slab-out-of-bounds in copy_from_sockptr include/linux/sockptr.h:55 [inline]
BUG: KASAN: slab-out-of-bounds in do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
BUG: KASAN: slab-out-of-bounds in do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
Read of size 96 at addr ffff88802cd73da0 by task syz-executor.4/7238CPU: 1 PID: 7238 Comm: syz-executor.4 Not tainted 6.9.0-rc2-next-20240403-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
print_address_description mm/kasan/report.c:377 [inline]
print_report+0x169/0x550 mm/kasan/report.c:488
kasan_report+0x143/0x180 mm/kasan/report.c:601
kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
__asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
copy_from_sockptr_offset include/linux/sockptr.h:49 [inline]
copy_from_sockptr include/linux/sockptr.h:55 [inline]
do_replace net/ipv4/netfilter/ip_tables.c:1111 [inline]
do_ipt_set_ctl+0x902/0x3dd0 net/ipv4/netfilter/ip_tables.c:1627
nf_setsockopt+0x295/0x2c0 net/netfilter/nf_sockopt.c:101
do_sock_setsockopt+0x3af/0x720 net/socket.c:2311
__sys_setsockopt+0x1ae/0x250 net/socket.c:2334
__do_sys_setsockopt net/socket.c:2343 [inline]
__se_sys_setsockopt net/socket.c:2340 [inline]
__x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x72/0x7a
RIP: 0033:0x7fd22067dde9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 e1 20 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd21f9ff0c8 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
RAX: ffffffffffffffda RBX: 00007fd2207abf80 RCX: 00007fd22067dde9
RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003
RBP: 00007fd2206ca47a R08: 0000000000000001 R09: 0000000000000000
R10: 0000000020000880 R11: 0000000000000246 R12: 0000000000000000
R13: 000000000000000b R14: 00007fd2207abf80 R15: 00007ffd2d0170d8
</TASK>Allocated by task 7238:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:370 [inline]
__kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387
kasan_kmalloc include/linux/kasan.h:211 [inline]
__do_kmalloc_node mm/slub.c:4069 [inline]
__kmalloc_noprof+0x200/0x410 mm/slub.c:4082
kmalloc_noprof include/linux/slab.h:664 [inline]
__cgroup_bpf_run_filter_setsockopt+0xd47/0x1050 kernel/bpf/cgroup.c:1869
do_sock_setsockopt+0x6b4/0x720 net/socket.c:2293
__sys_setsockopt+0x1ae/0x250 net/socket.c:2334
__do_sys_setsockopt net/socket.c:2343 [inline]
__se_sys_setsockopt net/socket.c:2340 [inline]
__x64_sys_setsockopt+0xb5/0xd0 net/socket.c:2340
do_syscall_64+0xfb/0x240
entry_SYSCALL_64_after_hwframe+0x72/0x7aThe buggy address belongs to the object at ffff88802cd73da0
which belongs to the cache kmalloc-8 of size 8
The buggy address is located 0 bytes inside of
allocated 1-byte region [ffff88802cd73da0, ffff88802cd73da1)The buggy address belongs to the physical page:
page: refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff88802cd73020 pfn:0x2cd73
flags: 0xfff80000000000(node=0|zone=1|lastcpupid=0xfff)
page_type: 0xffffefff(slab)
raw: 00fff80000000000 ffff888015041280 dead000000000100 dead000000000122
raw: ffff88802cd73020 000000008080007f 00000001ffffefff 00
---truncated--- | [] | null | 7.1 | null | null |
|
CVE-2019-1067 | An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
GHSA-cxx9-g3h7-xchv | This vulnerability allows local attackers to disclose information on affected installations of Parallels Desktop 15.1.4. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the prl_hypervisor kext. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-11302. | [] | null | null | null | null |
|
GHSA-9w97-9rqx-8v4j | Mattermost allows demoted guests to change group names | Mattermost fails to update the permissions of the current session for a user who was just demoted to guest, allowing freshly demoted guests to change group names. | [] | 2.1 | 3.7 | null | null |
GHSA-2grq-h2qw-x3px | There is a release of invalid pointer vulnerability in some Huawei products, successful exploit may cause the process and service abnormal. Affected product versions include: CloudEngine 12800 V200R019C10SPC800, V200R019C10SPC900; CloudEngine 5800 V200R019C10SPC800, V200R020C00SPC600; CloudEngine 6800 versions V200R019C10SPC800, V200R019C10SPC900, V200R020C00SPC600, V300R020C00SPC200; CloudEngine 7800 V200R019C10SPC800. | [] | null | null | null | null |
|
CVE-2022-21310 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.34 and prior, 7.5.24 and prior, 7.6.20 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2024-28252 | CoreWCF NetFraming based services can leave connections open when they should be closed | CoreWCF is a port of the service side of Windows Communication Foundation (WCF) to .NET Core. If you have a NetFraming based CoreWCF service, extra system resources could be consumed by connections being left established instead of closing or aborting them. There are two scenarios when this can happen. When a client established a connection to the service and sends no data, the service will wait indefinitely for the client to initiate the NetFraming session handshake. Additionally, once a client has established a session, if the client doesn't send any requests for the period of time configured in the binding ReceiveTimeout, the connection is not properly closed as part of the session being aborted. The bindings affected by this behavior are NetTcpBinding, NetNamedPipeBinding, and UnixDomainSocketBinding. Only NetTcpBinding has the ability to accept non local connections. The currently supported versions of CoreWCF are v1.4.x and v1.5.x. The fix can be found in v1.4.2 and v1.5.2 of the CoreWCF packages. Users are advised to upgrade. There are no workarounds for this issue.
| [
"cpe:2.3:a:corewcf:corewcf:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2019-6781 | An Improper Input Validation issue was discovered in GitLab Community and Enterprise Edition before 11.5.8, 11.6.x before 11.6.6, and 11.7.x before 11.7.1. It was possible to use the profile name to inject a potentially malicious link into notification emails. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-g2cc-qr3j-8v4w | Missing Authorization vulnerability in WP OnlineSupport, Essential Plugin Meta slider and carousel with lightbox allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Meta slider and carousel with lightbox: from n/a through 1.6.2. | [] | null | 5.3 | null | null |
|
GHSA-3jh7-8c9c-w8mx | Chamilo LMS 1.11.10 does not properly manage privileges which could allow a user with Sessions administrator privilege to create a new user then use the edit user function to change this new user to administrator privilege. | [] | null | null | null | null |
|
CVE-2006-4057 | Buffer overflow in the preview_create function in gui.cpp in Mitch Murray Eremove 1.4 allows remote attackers to cause a denial of service (application crash), and possibly execute arbitrary code, via a large email attachment. | [
"cpe:2.3:a:mitch_murray:eremove:1.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2007-2852 | Multiple stack-based buffer overflows in ESET NOD32 Antivirus before 2.70.37.0 allow remote attackers to execute arbitrary code during (1) delete/disinfect or (2) rename operations via a crafted directory name. | [
"cpe:2.3:a:eset_software:nod32_antivirus:2.70.37.0:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2009-3325 | SQL injection vulnerability in the Focusplus Developments Survey Manager (com_surveymanager) component 1.5.0 for Joomla! allows remote attackers to execute arbitrary SQL commands via the stype parameter in an editsurvey action to index.php. | [
"cpe:2.3:a:focusdev:com_surveymanager:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
Subsets and Splits