id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2006-3571 | Multiple cross-site scripting (XSS) vulnerabilities in interna/hilfe.php in Papoo 3 RC3 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) titel or (2) ausgabe parameters. | [
"cpe:2.3:a:papoo:papoo:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:papoo:papoo:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:papoo:papoo:3.0.0_rc3:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2016-10721 | partclone.restore in Partclone 0.2.87 is prone to a heap-based buffer overflow vulnerability due to insufficient validation of the partclone image header. An attacker may be able to execute arbitrary code in the context of the user running the affected application. | [
"cpe:2.3:a:partclone:partclone:0.2.87:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2013-2009 | WordPress WP Super Cache Plugin 1.2 has Remote PHP Code Execution | [
"cpe:2.3:a:automattic:wp_super_cache:1.2:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | 6.8 |
|
CVE-2014-3465 | The gnutls_x509_dn_oid_name function in lib/x509/common.c in GnuTLS 3.0 before 3.1.20 and 3.2.x before 3.2.10 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted X.509 certificate, related to a missing LDAP description for an OID when printing the DN. | [
"cpe:2.3:a:gnu:gnutls:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnutls:3.2.9:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2015:1890 | Red Hat Security Advisory: spice security update | spice: insufficient validation of surface_id parameter can cause crash spice: host memory access from guest using crafted images | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null |
GHSA-v3jw-p9pj-m453 | In the Linux kernel, the following vulnerability has been resolved:fs/inode: Prevent dump_mapping() accessing invalid dentry.d_name.nameIt's observed that a crash occurs during hot-remove a memory device,
in which user is accessing the hugetlb. See calltrace as following:------------[ cut here ]------------
WARNING: CPU: 1 PID: 14045 at arch/x86/mm/fault.c:1278 do_user_addr_fault+0x2a0/0x790
Modules linked in: kmem device_dax cxl_mem cxl_pmem cxl_port cxl_pci dax_hmem dax_pmem nd_pmem cxl_acpi nd_btt cxl_core crc32c_intel nvme virtiofs fuse nvme_core nfit libnvdimm dm_multipath scsi_dh_rdac scsi_dh_emc s
mirror dm_region_hash dm_log dm_mod
CPU: 1 PID: 14045 Comm: daxctl Not tainted 6.10.0-rc2-lizhijian+ #492
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:do_user_addr_fault+0x2a0/0x790
Code: 48 8b 00 a8 04 0f 84 b5 fe ff ff e9 1c ff ff ff 4c 89 e9 4c 89 e2 be 01 00 00 00 bf 02 00 00 00 e8 b5 ef 24 00 e9 42 fe ff ff <0f> 0b 48 83 c4 08 4c 89 ea 48 89 ee 4c 89 e7 5b 5d 41 5c 41 5d 41
RSP: 0000:ffffc90000a575f0 EFLAGS: 00010046
RAX: ffff88800c303600 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000001000 RSI: ffffffff82504162 RDI: ffffffff824b2c36
RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90000a57658
R13: 0000000000001000 R14: ffff88800bc2e040 R15: 0000000000000000
FS: 00007f51cb57d880(0000) GS:ffff88807fd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000001000 CR3: 00000000072e2004 CR4: 00000000001706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? __warn+0x8d/0x190
? do_user_addr_fault+0x2a0/0x790
? report_bug+0x1c3/0x1d0
? handle_bug+0x3c/0x70
? exc_invalid_op+0x14/0x70
? asm_exc_invalid_op+0x16/0x20
? do_user_addr_fault+0x2a0/0x790
? exc_page_fault+0x31/0x200
exc_page_fault+0x68/0x200
<...snip...>
BUG: unable to handle page fault for address: 0000000000001000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
Oops: Oops: 0000 [#1] PREEMPT SMP PTI
---[ end trace 0000000000000000 ]---
BUG: unable to handle page fault for address: 0000000000001000
#PF: supervisor read access in kernel mode
#PF: error_code(0x0000) - not-present page
PGD 800000000ad92067 P4D 800000000ad92067 PUD 7677067 PMD 0
Oops: Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 1 PID: 14045 Comm: daxctl Kdump: loaded Tainted: G W 6.10.0-rc2-lizhijian+ #492
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:dentry_name+0x1f4/0x440
<...snip...>
? dentry_name+0x2fa/0x440
vsnprintf+0x1f3/0x4f0
vprintk_store+0x23a/0x540
vprintk_emit+0x6d/0x330
_printk+0x58/0x80
dump_mapping+0x10b/0x1a0
? __pfx_free_object_rcu+0x10/0x10
__dump_page+0x26b/0x3e0
? vprintk_emit+0xe0/0x330
? _printk+0x58/0x80
? dump_page+0x17/0x50
dump_page+0x17/0x50
do_migrate_range+0x2f7/0x7f0
? do_migrate_range+0x42/0x7f0
? offline_pages+0x2f4/0x8c0
offline_pages+0x60a/0x8c0
memory_subsys_offline+0x9f/0x1c0
? lockdep_hardirqs_on+0x77/0x100
? _raw_spin_unlock_irqrestore+0x38/0x60
device_offline+0xe3/0x110
state_store+0x6e/0xc0
kernfs_fop_write_iter+0x143/0x200
vfs_write+0x39f/0x560
ksys_write+0x65/0xf0
do_syscall_64+0x62/0x130Previously, some sanity check have been done in dump_mapping() before
the print facility parsing '%pd' though, it's still possible to run into
an invalid dentry.d_name.name.Since dump_mapping() only needs to dump the filename only, retrieve it
by itself in a safer way to prevent an unnecessary crash.Note that either retrieving the filename with '%pd' or
strncpy_from_kernel_nofault(), the filename could be unreliable. | [] | null | 4.6 | null | null |
|
GHSA-qgv9-9qpm-r86f | Heap-based buffer overflow in the iscsi_aio_ioctl function in block/iscsi.c in QEMU allows local guest OS users to cause a denial of service (QEMU process crash) or possibly execute arbitrary code via a crafted iSCSI asynchronous I/O ioctl call. | [] | null | 7.8 | null | null |
|
CVE-2005-4501 | MediaWiki before 1.5.4 uses a hard-coded "internal placeholder string", which allows remote attackers to bypass protection against cross-site scripting (XSS) attacks and execute Javascript using inline style attributes, which are processed by Internet Explorer. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta3:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta4:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta5:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.4_beta6:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_alpha1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_alpha2:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.5_beta2:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2021-43440 | Multiple Stored XSS Vulnerabilities in the Source Code of iOrder 1.0 allow remote attackers to execute arbitrary code via signup form in the Name and Phone number field. | [
"cpe:2.3:a:iorder_project:iorder:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2004-1101 | mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message. | [
"cpe:2.3:a:tips:mailpost:5.1.1_sv:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2015-1452 | The Control and Provisioning of Wireless Access Points (CAPWAP) daemon in Fortinet FortiOS 5.0 Patch 7 build 4457 allows remote attackers to cause a denial of service (locked CAPWAP Access Controller) via a large number of ClientHello DTLS messages. | [
"cpe:2.3:o:fortinet:fortios:5.0.7:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2024-21640 | OOB Access in CefVideoConsumerOSR::OnFrameCaptured | Chromium Embedded Framework (CEF) is a simple framework for embedding Chromium-based browsers in other applications.`CefVideoConsumerOSR::OnFrameCaptured` does not check `pixel_format` properly, which leads to out-of-bounds read out of the sandbox. This vulnerability was patched in commit 1f55d2e.
| [
"cpe:2.3:a:chromiumembedded:chromium_embedded_framework:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
GHSA-mj5f-wfm2-8fw6 | A vulnerability has been identified in XHQ (All versions < V6.0.0.2). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify contents of the web application. At the time of advisory publication no public exploitation of this security vulnerability was known. | [] | null | null | null | null |
|
CVE-2024-49868 | btrfs: fix a NULL pointer dereference when failed to start a new trasacntion | In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix a NULL pointer dereference when failed to start a new trasacntion
[BUG]
Syzbot reported a NULL pointer dereference with the following crash:
FAULT_INJECTION: forcing a failure.
start_transaction+0x830/0x1670 fs/btrfs/transaction.c:676
prepare_to_relocate+0x31f/0x4c0 fs/btrfs/relocation.c:3642
relocate_block_group+0x169/0xd20 fs/btrfs/relocation.c:3678
...
BTRFS info (device loop0): balance: ended with status: -12
Oops: general protection fault, probably for non-canonical address 0xdffffc00000000cc: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000660-0x0000000000000667]
RIP: 0010:btrfs_update_reloc_root+0x362/0xa80 fs/btrfs/relocation.c:926
Call Trace:
<TASK>
commit_fs_roots+0x2ee/0x720 fs/btrfs/transaction.c:1496
btrfs_commit_transaction+0xfaf/0x3740 fs/btrfs/transaction.c:2430
del_balance_item fs/btrfs/volumes.c:3678 [inline]
reset_balance_state+0x25e/0x3c0 fs/btrfs/volumes.c:3742
btrfs_balance+0xead/0x10c0 fs/btrfs/volumes.c:4574
btrfs_ioctl_balance+0x493/0x7c0 fs/btrfs/ioctl.c:3673
vfs_ioctl fs/ioctl.c:51 [inline]
__do_sys_ioctl fs/ioctl.c:907 [inline]
__se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
[CAUSE]
The allocation failure happens at the start_transaction() inside
prepare_to_relocate(), and during the error handling we call
unset_reloc_control(), which makes fs_info->balance_ctl to be NULL.
Then we continue the error path cleanup in btrfs_balance() by calling
reset_balance_state() which will call del_balance_item() to fully delete
the balance item in the root tree.
However during the small window between set_reloc_contrl() and
unset_reloc_control(), we can have a subvolume tree update and created a
reloc_root for that subvolume.
Then we go into the final btrfs_commit_transaction() of
del_balance_item(), and into btrfs_update_reloc_root() inside
commit_fs_roots().
That function checks if fs_info->reloc_ctl is in the merge_reloc_tree
stage, but since fs_info->reloc_ctl is NULL, it results a NULL pointer
dereference.
[FIX]
Just add extra check on fs_info->reloc_ctl inside
btrfs_update_reloc_root(), before checking
fs_info->reloc_ctl->merge_reloc_tree.
That DEAD_RELOC_TREE handling is to prevent further modification to the
reloc tree during merge stage, but since there is no reloc_ctl at all,
we do not need to bother that. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-6wq6-xj8v-gvfq | In the Linux kernel, the following vulnerability has been resolved:fpga: region: add owner module and take its refcountThe current implementation of the fpga region assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the region
during programming if the parent device does not have a driver.To address this problem, add a module owner pointer to the fpga_region
struct and use it to take the module's refcount. Modify the functions for
registering a region to take an additional owner module parameter and
rename them to avoid conflicts. Use the old function names for helper
macros that automatically set the module that registers the region as the
owner. This ensures compatibility with existing low-level control modules
and reduces the chances of registering a region without setting the owner.Also, update the documentation to keep it consistent with the new interface
for registering an fpga region. | [] | null | 5.5 | null | null |
|
CVE-2019-11201 | Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server. | [
"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:9.0.1:*:*:*:*:*:*:*"
] | null | null | 8 | 8.5 |
|
GHSA-4xqw-p5g4-297h | Cross-Site Request Forgery (CSRF) vulnerability in Aftab Muni's Disable Right Click For WP plugin <= 1.1.6 at WordPress. | [] | null | 8.8 | null | null |
|
GHSA-m4p4-hmvf-f9fj | A shell injection issue in cosa_wifi_apis.c in the RDK RDKB-20181217-1 CcspWifiAgent module allows attackers with login credentials to execute arbitrary shell commands under the CcspWifiSsp process (running as root) if the platform was compiled with the ENABLE_FEATURE_MESHWIFI macro. The attack is conducted by changing the Wi-Fi network password to include crafted escape characters. This is related to the WebUI module. | [] | null | null | null | null |
|
CVE-2021-31911 | In JetBrains TeamCity before 2020.2.3, reflected XSS was possible on several pages. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-qj23-qqxr-6g3c | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.2, tvOS 12.2, watchOS 5.2, Safari 12.1, iTunes 12.9.4 for Windows, iCloud for Windows 7.11. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2012-5063 | Unspecified vulnerability in the Oracle FLEXCUBE Universal Banking component in Oracle Financial Services Software 10.0.0, 10.0.2, 10.1.0, 10.2.0, 10.2.2, 10.3.0, 10.5.0, 11.0.0 through 11.4.0, and 12.0.0 allows remote attackers to affect integrity, related to BASE. | [
"cpe:2.3:a:oracle:financial_services_software:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:11.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:financial_services_software:12.0.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2015-0224 | qpidd in Apache Qpid 0.30 and earlier allows remote attackers to cause a denial of service (daemon crash) via a crafted protocol sequence set. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0203. | [
"cpe:2.3:a:apache:qpid:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-q566-6jpj-4x53 | Authentication Bypass vulnerability in Accellion kiteworks before 2017.01.00 allows remote attackers to execute certain API calls on behalf of a web user using a gathered token via a POST request to /oauth/token. | [] | null | null | 6.5 | null |
|
GHSA-q744-2548-mr5h | In the Linux kernel, the following vulnerability has been resolved:LoongArch: Update cpu_sibling_map when disabling nonboot CPUsUpdate cpu_sibling_map when disabling nonboot CPUs by defining & calling
clear_cpu_sibling_map(), otherwise we get such errors on SMT systems:jump label: negative count!
WARNING: CPU: 6 PID: 45 at kernel/jump_label.c:263 __static_key_slow_dec_cpuslocked+0xec/0x100
CPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340
pc 90000000004c302c ra 90000000004c302c tp 90000001005bc000 sp 90000001005bfd20
a0 000000000000001b a1 900000000224c278 a2 90000001005bfb58 a3 900000000224c280
a4 900000000224c278 a5 90000001005bfb50 a6 0000000000000001 a7 0000000000000001
t0 ce87a4763eb5234a t1 ce87a4763eb5234a t2 0000000000000000 t3 0000000000000000
t4 0000000000000006 t5 0000000000000000 t6 0000000000000064 t7 0000000000001964
t8 000000000009ebf6 u0 9000000001f2a068 s9 0000000000000000 s0 900000000246a2d8
s1 ffffffffffffffff s2 ffffffffffffffff s3 90000000021518c0 s4 0000000000000040
s5 9000000002151058 s6 9000000009828e40 s7 00000000000000b4 s8 0000000000000006
ra: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100
ERA: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100
CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)
PRMD: 00000004 (PPLV0 +PIE -PWE)
EUEN: 00000000 (-FPE -SXE -ASXE -BTE)
ECFG: 00071c1c (LIE=2-4,10-12 VS=7)
ESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)
PRID: 0014d000 (Loongson-64bit, Loongson-3A6000-HV)
CPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340
Stack : 0000000000000000 900000000203f258 900000000179afc8 90000001005bc000
90000001005bf980 0000000000000000 90000001005bf988 9000000001fe0be0
900000000224c280 900000000224c278 90000001005bf8c0 0000000000000001
0000000000000001 ce87a4763eb5234a 0000000007f38000 90000001003f8cc0
0000000000000000 0000000000000006 0000000000000000 4c206e6f73676e6f
6f4c203a656d616e 000000000009ec99 0000000007f38000 0000000000000000
900000000214b000 9000000001fe0be0 0000000000000004 0000000000000000
0000000000000107 0000000000000009 ffffffffffafdabe 00000000000000b4
0000000000000006 90000000004c302c 9000000000224528 00005555939a0c7c
00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c
...
Call Trace:
[<9000000000224528>] show_stack+0x48/0x1a0
[<900000000179afc8>] dump_stack_lvl+0x78/0xa0
[<9000000000263ed0>] __warn+0x90/0x1a0
[<90000000017419b8>] report_bug+0x1b8/0x280
[<900000000179c564>] do_bp+0x264/0x420
[<90000000004c302c>] __static_key_slow_dec_cpuslocked+0xec/0x100
[<90000000002b4d7c>] sched_cpu_deactivate+0x2fc/0x300
[<9000000000266498>] cpuhp_invoke_callback+0x178/0x8a0
[<9000000000267f70>] cpuhp_thread_fun+0xf0/0x240
[<90000000002a117c>] smpboot_thread_fn+0x1dc/0x2e0
[<900000000029a720>] kthread+0x140/0x160
[<9000000000222288>] ret_from_kernel_thread+0xc/0xa4 | [] | null | 5.5 | null | null |
|
CVE-2025-26924 | WordPress Ohio Theme Extra plugin <= 3.4.7 - Shortcode Injection vulnerability | Improper Control of Generation of Code ('Code Injection') vulnerability in NotFound Ohio Extra allows Code Injection. This issue affects Ohio Extra: from n/a through 3.4.7. | [] | null | 6.5 | null | null |
GHSA-7jrj-4gj5-f734 | SAP Startup Service, SAP KERNEL 7.45, 7.49, and 7.52, is missing an authentication check for functionalities that require user identity and cause consumption of file system storage. | [] | null | null | 7.5 | null |
|
CVE-2019-25028 | Stored cross-site scripting in Grid component in Vaadin 7 and 8 | Missing variable sanitization in Grid component in com.vaadin:vaadin-server versions 7.4.0 through 7.7.19 (Vaadin 7.4.0 through 7.7.19), and 8.0.0 through 8.8.4 (Vaadin 8.0.0 through 8.8.4) allows attacker to inject malicious JavaScript via unspecified vector | [
"cpe:2.3:a:vaadin:vaadin:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
CVE-2017-18575 | The newstatpress plugin before 1.2.5 for WordPress has multiple stored XSS issues. | [
"cpe:2.3:a:newstatpress_project:newstatpress:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
CVE-2024-35111 | IBM Control Center information disclosure | IBM Control Center 6.2.1 and 6.3.1 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. | [
"cpe:2.3:a:ibm:control_center:6.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_center:6.3.1.0:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
GHSA-hv36-vqw3-9r27 | Use after free in Tab Strip in Google Chrome prior to 91.0.4472.77 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. | [] | null | null | null | null |
|
GHSA-jrvp-3f78-8jfg | IBM Team Concert (RTC) 4.0, 5.0 and 6.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 119821. | [] | null | null | 5.4 | null |
|
GHSA-fh38-4q99-7449 | The finger client in HP TCP/IP Services for OpenVMS 5.x allows local users to read arbitrary files via a link corresponding to a (1) .plan or (2) .project file. | [] | null | null | null | null |
|
CVE-2021-45491 | 3CX System through 2022-03-17 stores cleartext passwords in a database. | [
"cpe:2.3:a:3cx:3cx:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
RHSA-2013:1803 | Red Hat Security Advisory: libjpeg-turbo security update | libjpeg: information leak (read of uninitialized memory) libjpeg: information leak (read of uninitialized memory) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2005-1313 | Cross-site scripting (XSS) vulnerability in Horde Passwd module before 2.2.2 allows remote attackers to inject arbitrary web script or HTML via the parent's frame page title. | [
"cpe:2.3:a:horde:passwd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:passwd:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:passwd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:horde:passwd:2.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-32853 | An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in Security Update 2022-005 Catalina, macOS Big Sur 11.6.8, macOS Monterey 12.5. Processing a maliciously crafted AppleScript binary may result in unexpected termination or disclosure of process memory. | [
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-008:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2022-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:10.15.7:security_update_2022-004:*:*:*:*:*:*"
] | null | 7.1 | null | null |
|
GHSA-wqqq-65v5-ppj5 | WebKit, as used in Apple iOS before 9 and iTunes before 12.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-09-16-1 and APPLE-SA-2015-09-16-3. | [] | null | null | null | null |
|
CVE-2014-7970 | The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call. | [
"cpe:2.3:o:novell:suse_linux_enterprise_server:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*"
] | null | 5.5 | null | 4.9 |
|
CVE-2023-25717 | Ruckus Wireless Admin through 10.4 allows Remote Code Execution via an unauthenticated HTTP GET Request, as demonstrated by a /forms/doLogin?login_username=admin&password=password$(curl substring. | [
"cpe:2.3:a:ruckuswireless:ruckus_wireless_admin:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:smartzone_ap:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r350:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz-144:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t310c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t310d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t310n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t310s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t350c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t350d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t350se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t710s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t750se:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t811-cm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t301n:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t301s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t504:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:smartzone:*:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:smartzone:6.1.0.0.935:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:m510-jp:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:p300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:q410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:q710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:q910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t811-cm\\(non-spf\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zd1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zd1100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zd1200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zd3000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zd5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz-144-federal:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:sz300-federal:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2019-17522 | A stored XSS vulnerability was discovered in Hotaru CMS v1.7.2 via the admin_index.php?page=settings SITE NAME field (aka SITE_NAME), a related issue to CVE-2011-4709.1. | [
"cpe:2.3:a:hotarucms:hotarucms:1.7.2:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2021-20311 | A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability. | [
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
GHSA-p799-qjp6-h93p | In “OpenCMS”, versions 10.5.0 to 11.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the Sitemap functionality. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. | [] | null | null | null | null |
|
RHSA-2024:1306 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: memcg does not limit the number of POSIX file locks allowing memory exhaustion kernel: nfp: use-after-free in area_cache_get() kernel: vmwgfx: NULL pointer dereference in vmw_cmd_dx_define_query hw: Intel: Gather Data Sampling (GDS) side channel vulnerability kernel: use-after-free in smb2_is_status_io_timeout() kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: NULL pointer dereference in can_rcv_filter kernel: Slab-out-of-bound read in compare_netdev_and_ip kernel: out-of-bounds access in relay_file_read kernel: UAF in nftables when nft_set_lookup_global triggered after handling named and anonymous sets in batch requests kernel: net/sched: cls_u32 component reference counter leak if tcf_change_indev() fails kernel: vmxnet3: NULL pointer dereference in vmxnet3_rq_cleanup() kernel: use after free in unix_stream_sendpage kernel: A heap out-of-bounds write when function perf_read_group is called and sibling_list is smaller than its child's sibling_list kernel: GSM multiplexing race condition leads to privilege escalation kernel: use-after-free in IPv4 IGMP kernel: refcount leak in ctnetlink_create_conntrack() kernel: fbcon: out-of-sync arrays in fbcon_mode_deleted due to wrong con2fb_map assignment kernel: use-after-free in l2cap_sock_release in net/bluetooth/l2cap_sock.c kernel: ktls overwrites readonly memory pages when using function splice with a ktls socket as destination | [
"cpe:/a:redhat:rhel_eus:9.0::nfv",
"cpe:/a:redhat:rhel_eus:9.0::realtime"
] | null | 7 | null | null |
CVE-2020-9849 | An information disclosure issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.0, iOS 14.0 and iPadOS 14.0, iTunes for Windows 12.10.9, iCloud for Windows 11.5, tvOS 14.0. A remote attacker may be able to leak memory. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-8cmg-37qm-wxhr | A vulnerability classified as problematic was found in WebAssembly wabt 1.0.36. Affected by this vulnerability is the function BinaryReaderInterp::BeginFunctionBody of the file src/interp/binary-reader-interp.cc. The manipulation leads to null pointer dereference. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. | [] | 2.3 | 3.1 | null | null |
|
GHSA-cm4q-8w3f-8r48 | The Selfshot - Front Flash Camera (aka com.americos.selfshot) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
GHSA-rg7c-qr9w-vgfh | In Dekart Private Disk 2.15, invalid use of the Type3 user buffer for IOCTL codes using METHOD_NEITHER results in arbitrary memory dereferencing. | [] | null | null | null | null |
|
GHSA-33m3-2pr9-32p7 | Delta Electronics DRASimuCAD STP File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Delta Electronics DRASimuCAD. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of STP files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22450. | [] | null | null | 7.8 | null |
|
CVE-2005-2840 | Multiple unknown vulnerabilities in MAXdev MD-Pro 1.0.72 and earlier have unknown impact and unspecified attack vectors, in one or more of the (1) Download, (2) Search, (3) Web links, (4) Blocks, (5) Messages, (6) News, (7) Comments, (8) Settings, (9) Stats or (10) subjects modules. | [
"cpe:2.3:a:maxdev:md-pro:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2019-3832 | It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash. | [
"cpe:2.3:a:libsndfile_project:libsndfile:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
|
CVE-2025-4143 | Missing validation of redirect_uri on authorize endpoint | The OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp , did not correctly validate that redirect_uri was on the allowed list of redirect URIs for the given client registration.
Fixed in: https://github.com/cloudflare/workers-oauth-provider/pull/26 https://github.com/cloudflare/workers-oauth-provider/pull/26
Impact:
Under certain circumstances (see below), if a victim had previously authorized with a server built on workers-oath-provider, and an attacker could later trick the victim into visiting a malicious web site, then attacker could potentially steal the victim's credentials to the same OAuth server and subsequently impersonate them.
In order for the attack to be possible, the OAuth server's authorized callback must be designed to auto-approve authorizations that appear to come from an OAuth client that the victim has authorized previously. The authorization flow is not implemented by workers-oauth-provider; it is up to the application built on top to decide whether to implement such automatic re-authorization. However, many applications do implement such logic.
Note: It is a basic, well-known requirement that OAuth servers should verify that the redirect URI is among the allowed list for the client, both during the authorization flow and subsequently when exchanging the authorization code for an access token. workers-oauth-provider implemented only the latter check, not the former. Unfortunately, the former is the much more important check. Readers who are familiar with OAuth may recognize that failing to check redirect URIs against the allowed list is a well-known, basic mistake, covered extensively in the RFC and elsewhere. The author of this library would like everyone to know that he was, in fact, well-aware of this requirement, thought about it a lot while designing the library, and then, somehow, forgot to actually make sure the check was in the code. That is, it's not that he didn't know what he was doing, it's that he knew what he was doing but flubbed it. | [] | 6 | null | null | null |
GHSA-r8fj-gpx6-mcf6 | An issue was discovered in Selesta Visual Access Manager (VAM) 4.15.0 through 4.29. A user with valid credentials is able to read XML files on the filesystem via the web interface. The PHP page /common/vam_editXml.php doesn't check the parameter that identifies the file name to be read. Thus, an attacker can manipulate the file name to access a potentially sensitive file within the filesystem. | [] | null | null | null | null |
|
GHSA-7fvv-v64m-5j34 | In wlan driver, there is a possible missing permission check. This could lead to local information disclosure. | [] | null | 5.5 | null | null |
|
GHSA-4jgx-c2mv-3qmc | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpsurface BlogLentor allows Stored XSS.This issue affects BlogLentor: from n/a through 1.0.8. | [] | null | 6.5 | null | null |
|
GHSA-wjg7-jfhg-3w3c | An issue found in Sales Tracker Management System v.1.0 allows a remote attacker to access sensitive information via sales.php component of the admin/reports endpoint. | [] | null | 7.5 | null | null |
|
GHSA-vrfg-f44j-g5c7 | The vulnerability exists within css.inc.php in Schneider Electric U.motion Builder software versions prior to v1.3.4. The 'css' parameter contains a directory traversal vulnerability. | [] | null | null | 4.3 | null |
|
GHSA-3f9w-9gh8-8jm4 | An issue was discovered in certain Apple products. iOS before 10.3 is affected. Safari before 10.1 is affected. tvOS before 10.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code via a crafted web site that leverages the mishandling of strict mode functions. | [] | null | null | 8.8 | null |
|
GHSA-wx96-h8xj-9x6g | Ghost 5.35.0 allows authorization bypass: contributors can view draft posts of other users, which is arguably inconsistent with a security policy in which a contributor's draft can only be read by editors until published by an editor. NOTE: the vendor's position is that this behavior has no security impact. | [] | null | 5.7 | null | null |
|
GHSA-vfcf-xqj2-22m3 | mailscanner can allow local users to prevent virus signatures from being updated | [] | null | 5.5 | null | null |
|
CVE-2024-33335 | SQL Injection vulnerability in H3C technology company SeaSQL DWS V2.0 allows a remote attacker to execute arbitrary code via a crafted file. | [
"cpe:2.3:a:h3c:seasql_dws:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
|
CVE-2022-48352 | Some smartphones have data initialization issues. Successful exploitation of this vulnerability may cause a system panic. | [
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2018-20580 | The WSDL import functionality in SmartBear ReadyAPI 2.5.0 and 2.6.0 allows remote attackers to execute arbitrary Java code via a crafted request parameter in a WSDL file. | [
"cpe:2.3:a:smartbear:readyapi:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:smartbear:readyapi:2.6.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2024-56602 | net: ieee802154: do not leave a dangling sk pointer in ieee802154_create() | In the Linux kernel, the following vulnerability has been resolved:
net: ieee802154: do not leave a dangling sk pointer in ieee802154_create()
sock_init_data() attaches the allocated sk object to the provided sock
object. If ieee802154_create() fails later, the allocated sk object is
freed, but the dangling pointer remains in the provided sock object, which
may allow use-after-free.
Clear the sk pointer in the sock object on error. | [] | null | 7.8 | null | null |
CVE-2024-39343 | An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service. | [] | null | 7 | null | null |
|
CVE-2020-14301 | An information disclosure vulnerability was found in libvirt in versions before 6.3.0. HTTP cookies used to access network-based disks were saved in the XML dump of the guest domain. This flaw allows an attacker to access potentially sensitive information in the domain configuration via the `dumpxml` command. | [
"cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_tus:8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:codeready_linux_builder:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-g5xp-89m7-8qwh | An issue was discovered in Mattermost Server before 5.23.0. Automatic direct message replies allow attackers to cause a denial of service (infinite loop), aka MMSA-2020-0020. | [] | null | null | null | null |
|
GHSA-559v-52x7-68xg | Remote Procedure Call Runtime Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28327, CVE-2021-28329, CVE-2021-28330, CVE-2021-28331, CVE-2021-28332, CVE-2021-28333, CVE-2021-28334, CVE-2021-28335, CVE-2021-28336, CVE-2021-28337, CVE-2021-28339, CVE-2021-28340, CVE-2021-28341, CVE-2021-28342, CVE-2021-28343, CVE-2021-28344, CVE-2021-28345, CVE-2021-28346, CVE-2021-28352, CVE-2021-28353, CVE-2021-28354, CVE-2021-28355, CVE-2021-28356, CVE-2021-28357, CVE-2021-28358, CVE-2021-28434. | [] | null | 8.8 | null | null |
|
GHSA-hgmh-vm7j-q2wp | The Post Grid WordPress plugin before 2.1.16 does not escape the keyword parameter before outputting it back in an attribute, leading to a Reflected Cross-Site Scripting in pages containing a Post Grid with a search form | [] | null | 6.1 | null | null |
|
GHSA-c5gr-g55g-cjv8 | Directory traversal vulnerability in pn-menu.php in J-Web Pics Navigator 1.0 allows remote attackers to list arbitrary directories via a .. (dot dot) in the dir parameter. | [] | null | null | null | null |
|
CVE-2004-1606 | slxweb.dll in SalesLogix 6.1 allows remote attackers to cause a denial service (application crash) via an invalid HTTP request, which might also leak sensitive information in the ErrorLogMsg cookie. | [
"cpe:2.3:a:best_software:saleslogix:*:*:*:*:*:*:*:*",
"cpe:2.3:a:saleslogix_corporation:saleslogix:2000.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-48gg-mvqw-v584 | daneren2005 DSub for Subsonic (Android client) version 5.4.1 contains a CWE-295: Improper Certificate Validation vulnerability in HTTPS Client that can result in Any non-CA signed server certificate, including self signed and expired, are accepted by the client. This attack appear to be exploitable via The victim connects to a server that's MITM/Proxied by an attacker. | [] | null | null | 5.9 | null |
|
GHSA-5phw-3354-47qw | The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Fancy Text, Countdown Widget, and Login Form shortcodes in all versions up to, and including, 3.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.4 | null | null |
|
CVE-2014-1290 | WebKit, as used in Apple iOS before 7.1 and Apple TV before 6.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2014-1289, CVE-2014-1291, CVE-2014-1292, CVE-2014-1293, and CVE-2014-1294. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-3p64-362g-h8x8 | Out-of-bounds read in appending text paragraph in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. | [] | null | 5.5 | null | null |
|
GHSA-6f79-g335-f9mf | The silc_channel_message function in ops.c in the SILC protocol plugin in libpurple in Pidgin before 2.10.1 does not perform the expected UTF-8 validation on message data, which allows remote attackers to cause a denial of service (application crash) via a crafted message, a different vulnerability than CVE-2011-3594. | [] | null | null | null | null |
|
CVE-2025-45855 | An arbitrary file upload vulnerability in the component /upload/GoodsCategory/image of erupt v1.12.19 allows attackers to execute arbitrary code via uploading a crafted file. | [] | null | 5.4 | null | null |
|
GHSA-cw93-7j95-j4hv | F5 BIG-IP ASM 15.0.0, 14.1.0-14.1.0.6, 14.0.0-14.0.0.5, 13.0.0-13.1.1.5, 12.1.0-12.1.4.1, 11.6.0-11.6.4, and 11.5.1-11.5.9 may expose sensitive information and allow the system configuration to be modified when using non-default settings. | [] | null | 9.1 | null | null |
|
CVE-2019-20082 | ASUS RT-N53 3.0.0.4.376.3754 devices have a buffer overflow via a long lan_dns1_x or lan_dns2_x parameter to Advanced_LAN_Content.asp. | [
"cpe:2.3:o:asus:rt-n53_firmware:3.0.0.4.376.3754:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:rt-n53:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2015-2897 | Sierra Wireless ALEOS before 4.4.2 on AirLink ES, GX, and LS devices has hardcoded root accounts, which makes it easier for remote attackers to obtain administrative access via a (1) SSH or (2) TELNET session. | [
"cpe:2.3:a:sierrawireless:aleos:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_es440:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_es450:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_gx440:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_gx450:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sierrawireless:airlink_ls300:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-7853-2h44-89w4 | OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e7e3d. | [] | null | 6.5 | null | null |
|
CVE-2015-2998 | SysAid Help Desk before 15.2 uses a hardcoded encryption key, which makes it easier for remote attackers to obtain sensitive information, as demonstrated by decrypting the database password in WEB-INF/conf/serverConf.xml. | [
"cpe:2.3:a:sysaid:sysaid:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-r93v-r2h3-5m93 | Under certain conditions, SAP Adaptive Server Enterprise (Web Services), versions 15.7, 16.0, allows an authenticated user to execute crafted database queries to elevate their privileges, modify database objects, or execute commands they are not otherwise authorized to execute, leading to SQL Injection. | [] | null | null | null | null |
|
GHSA-gv2w-m3wh-vwhw | LayerBB before 1.1.3 allows CSRF for adding a user via admin/new_user.php, deleting a user via admin/members.php/delete_user/, and deleting content via mod/delete.php/. | [] | null | null | 6.5 | null |
|
CVE-2017-2461 | An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. tvOS before 10.2 is affected. watchOS before 3.2 is affected. The issue involves the "CoreText" component. It allows remote attackers to cause a denial of service (resource consumption) via a crafted text message. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-wx6c-ph9m-wxqg | Shell Metacharacter Injection in the package installer on Zyxel NAS 326 version 5.21 and below allows an authenticated attacker to execute arbitrary code via multiple different requests. | [] | null | null | 8.8 | null |
|
GHSA-94h6-3834-pg82 | Memory leak in hw/net/eepro100.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (memory consumption and QEMU process crash) by repeatedly unplugging an i8255x (PRO100) NIC device. | [] | null | 6 | null | null |
|
CVE-2009-2074 | Cross-site scripting (XSS) vulnerability in Nodequeue 5.x before 5.x-2.7 and 6.x before 6.x-2.2, a module for Drupal, allows remote authenticated users with administer taxonomy permissions to inject arbitrary web script or HTML via vocabulary names. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.0-rc:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.0_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:5.x-2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:6.x-2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:6.x-2.0-rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:6.x-2.0-rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:nodequeue:6.x-2.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-2894-2ggj-v24h | A privilege escalation vulnerability exists in the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O write requests. During IOCTL 0x9c40a0d8, the first dword passed in the input buffer is the device port to write to and the byte at offset 4 is the value to write via the OUT instruction. The OUT instruction can write one byte to the given I/O device port, potentially leading to escalated privileges of unprivileged users. | [] | null | 8.8 | null | null |
|
CVE-2022-50044 | net: qrtr: start MHI channel after endpoit creation | In the Linux kernel, the following vulnerability has been resolved:
net: qrtr: start MHI channel after endpoit creation
MHI channel may generates event/interrupt right after enabling.
It may leads to 2 race conditions issues.
1)
Such event may be dropped by qcom_mhi_qrtr_dl_callback() at check:
if (!qdev || mhi_res->transaction_status)
return;
Because dev_set_drvdata(&mhi_dev->dev, qdev) may be not performed at
this moment. In this situation qrtr-ns will be unable to enumerate
services in device.
---------------------------------------------------------------
2)
Such event may come at the moment after dev_set_drvdata() and
before qrtr_endpoint_register(). In this case kernel will panic with
accessing wrong pointer at qcom_mhi_qrtr_dl_callback():
rc = qrtr_endpoint_post(&qdev->ep, mhi_res->buf_addr,
mhi_res->bytes_xferd);
Because endpoint is not created yet.
--------------------------------------------------------------
So move mhi_prepare_for_transfer_autoqueue after endpoint creation
to fix it. | [] | null | null | null | null |
RHSA-2007:0008 | Red Hat Security Advisory: dbus security update | D-Bus denial of service | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws"
] | null | null | null | null |
CVE-2020-19144 | Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the 'in _TIFFmemcpy' funtion in the component 'tif_unix.c'. | [
"cpe:2.3:a:simplesystems:libtiff:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2021-38361 | .htaccess Redirect <= 0.3.1 Reflected Cross-Site Scripting | The .htaccess Redirect WordPress plugin is vulnerable to Reflected Cross-Site Scripting via the link parameter found in the ~/htaccess-redirect.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 0.3.1. | [
"cpe:2.3:a:htaccess-redirect_project:htaccess-redirect:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
GHSA-gw98-m2pc-8pgp | The Conversios – Google Analytics 4 (GA4), Meta Pixel & more Via Google Tag Manager For WooCommerce plugin for WordPress is vulnerable to SQL Injection via the 'valueData' parameter in all versions up to, and including, 6.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 8.8 | null | null |
|
GHSA-r496-ccr2-pqhh | In Weidmueller Industrial WLAN devices in multiple versions an exploitable command injection vulnerability exists in encrypted diagnostic script functionality of the devices. A specially crafted diagnostic script file can cause arbitrary busybox commands to be executed, resulting in remote control over the device. An attacker can send diagnostic while authenticated as a low privilege user to trigger this vulnerability. | [] | null | null | null | null |
|
CVE-2007-5909 | Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910. | [
"cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*",
"cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-5h9p-4fm4-cr85 | Missing Authorization vulnerability in ldwin79 sourceplay-navermap allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects sourceplay-navermap: from n/a through 0.0.2. | [] | null | 4.3 | null | null |
|
GHSA-7hpj-7hhx-2fgx | msgpackr's conversion of property names to strings can trigger infinite recursion | ImpactWhen decoding user supplied MessagePack messages, users can trigger stuck threads by crafting messages that keep the decoder stuck in a loop.PatchesThe fix is available in v1.10.1WorkaroundsExploits seem to require structured cloning, replacing the 0x70 extension with your own (that throws an error or does something other than recursive referencing) should mitigate the issue.References | [] | null | 8.6 | null | null |
CVE-2002-0745 | Buffer overflow in uucp in AIX 4.3.3. | [
"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2023-39045 | An information leak in kokoroe_members card Line 13.6.1 allows attackers to obtain the channel access token and send crafted messages. | [
"cpe:2.3:a:kokoroe_members_card_project:kokoroe_members_card:13.6.1:*:*:*:*:line:*:*"
] | null | 6.5 | null | null |
|
CVE-2024-0693 | EFS Easy File Sharing FTP denial of service | A vulnerability classified as problematic was found in EFS Easy File Sharing FTP 2.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument username leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-251479. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:easy_file_sharing_ftp_server_project:easy_file_sharing_ftp_server:2.0:*:*:*:*:*:*:*"
] | null | 5.3 | 5.3 | 5 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.