id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-14934 | An issue was discovered in PDFResurrect before 0.18. pdf_load_pages_kids in pdf.c doesn't validate a certain size value, which leads to a malloc failure and out-of-bounds write. | [
"cpe:2.3:a:pdfresurrect_project:pdfresurrect:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-fmvc-54mp-h2w3 | Multiple unspecified vulnerabilities in the Arclib library (arclib.dll) before 7.3.0.15 in the CA Anti-Virus engine for CA Anti-Virus for the Enterprise 7.1, r8, and r8.1; Anti-Virus 2007 v8 and 2008; Internet Security Suite 2007 v3 and 2008; and other CA products allow remote attackers to bypass virus detection via a malformed archive file. | [] | null | null | null | null |
|
GHSA-m57p-p67h-mq74 | Command Injection Vulnerability in systeminformation | Impactcommand injection vulnerabilityPatchesProblem was fixed with a shell string sanitation fix. Please upgrade to version >= 4.31.1WorkaroundsIf you cannot upgrade, be sure to check or sanitize service parameter strings that are passed to si.inetLatency()For more informationIf you have any questions or comments about this advisory:Open an issue in [systeminformation](https://github.com/sebhildebrandt/systeminformation/issues/new?template=bug_report.md) | [] | null | 6.4 | null | null |
GHSA-9j6r-678r-mvp8 | Cross-site scripting (XSS) vulnerability in Mort Bay Jetty before 6.1.17 allows remote attackers to inject arbitrary web script or HTML via a directory listing request containing a ; (semicolon) character. | [] | null | null | null | null |
|
GHSA-j6vc-v42r-phc6 | Intel Desktop and Intel Mobile Boards with BIOS firmware DQ35JO, DQ35MP, DP35DP, DG33FB, DG33BU, DG33TL, MGM965TW, D945GCPE, and DX38BT allows local administrators with ring 0 privileges to gain additional privileges and modify code that is running in System Management Mode, or access hypervisory memory as demonstrated at Black Hat 2008 by accessing certain remapping registers in Xen 3.3. | [] | null | null | null | null |
|
CVE-2011-1119 | Google Chrome before 9.0.597.107 does not properly determine device orientation, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that lead to a "stale pointer." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2016-9693 | IBM Business Process Manager 7.5, 8.0, and 8.5 has a file download capability that is vulnerable to a set of attacks. Ultimately, an attacker can cause an unauthenticated victim to download a malicious payload. An existing file type restriction can be bypassed so that the payload might be considered executable and cause damage on the victim's machine. IBM Reference #: 1998655. | [
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:7.5.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.0.1.3:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.7.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:websphere:7.2:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere:7.2.0.1:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere:7.2.0.2:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere:7.2.0.3:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere:7.2.0.4:*:*:*:lombardi:*:*:*",
"cpe:2.3:a:ibm:websphere:7.2.0.5:*:*:*:lombardi:*:*:*"
] | null | null | 6.1 | 6.8 |
|
CVE-2016-9954 | The backtrack compilation code in the Irregex package (aka IrRegular Expressions) before 0.9.6 for Scheme allows remote attackers to cause a denial of service (memory consumption) via a crafted regular expression with a repeating pattern. | [
"cpe:2.3:a:irregex_project:irregex:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2024-37081 | The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance. | [
"cpe:2.3:a:vmware:cloud_foundation:4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-g66j-3r55-grh3 | An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c. | [] | null | 7.5 | null | null |
|
CVE-2020-27908 | An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave, macOS Big Sur 11.0.1, iOS 14.2 and iPadOS 14.2, watchOS 7.1, tvOS 14.2. Processing a maliciously crafted audio file may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
CVE-2020-11596 | A Directory Traversal issue was discovered in CIPPlanner CIPAce 9.1 Build 2019092801. An unauthenticated attacker can make HTTP GET requests to a certain URL and obtain information about what files and directories reside on the server. | [
"cpe:2.3:a:cipplanner:cipace:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
PYSEC-2024-183 | null | CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy.
Authentication method confusion allows logging in as the built-in root user from an external service. The built-in root user up until 6.24.1 is generated in a weak manner, cannot be disabled, and has universal access.This vulnerability allows an attacker who can create an account on an enabled external authentication service, to log in as the root user, and access and control everything that can be controlled via the web interface. The attacker needs to acquire the username of the root user to be successful.
This issue affects CodeChecker: through 6.24.1. | [] | null | null | null | null |
CVE-2021-4321 | Policy bypass in Blink in Google Chrome prior to 91.0.4472.77 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
GHSA-4fv8-w65m-3932 | efs-utils and aws-efs-csi-driver have race condition during concurrent TLS mounts | ImpactA potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below, and aws-efs-csi-driver versions v1.4.7 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS tunnel. In affected versions, concurrent mount operations can allocate the same local port, leading to either failed mount operations or an inappropriate mapping from an EFS customer’s local mount points to that customer’s EFS file systems.Affected versions: efs-utils <= v1.34.3, aws-efs-csi-driver <= v1.4.7PatchesThe patches are included in efs-utils version v1.34.4 and newer, and in aws-efs-csi-driver v1.4.8 and newer.WorkaroundsThere is no recommended work around. We recommend affected users update the installed version of efs-utils to v1.34.4+ or aws-efs-csi-driver to v1.4.8+ to address this issue.Referenceshttps://github.com/aws/efs-utils/commit/f3a8f88167d55caa2f78aeb72d4dc1987a9ed62d
https://github.com/aws/efs-utils/issues/125
https://github.com/kubernetes-sigs/aws-efs-csi-driver/issues/282
https://github.com/kubernetes-sigs/aws-efs-csi-driver/issues/635 | [] | null | 4.2 | null | null |
CVE-2019-12413 | In Apache Incubator Superset before 0.31 user could query database metadata information from a database he has no access to, by using a specially crafted complex query. | [
"cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2009-0857 | Cross-site scripting (XSS) vulnerability in /prm/reports in the Performance Reporting Module (PRM) for Sun Management Center (SunMC) 3.6.1 and 4.0 allows remote attackers to inject arbitrary web script or HTML via the msg parameter. NOTE: this can be leveraged for access to the SunMC Web Console. | [
"cpe:2.3:a:sun:management_center:3.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:a:sun:management_center:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-3hc3-93hv-h8f3 | An issue was discovered in baigo CMS 2.1.1. There is a vulnerability that allows remote attackers to execute arbitrary code. A BG_SITE_NAME parameter with malicious code can be written into the opt_base.inc.php file. | [] | null | null | 9.8 | null |
|
CVE-2018-0522 | Buffer overflow in Buffalo WXR-1900DHP2 firmware Ver.2.48 and earlier allows an attacker to execute arbitrary code via a specially crafted file. | [
"cpe:2.3:o:buffalo:wxr-1900dhp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wxr-1900dhp2:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2019-1010275 | helm Before 2.7.2 is affected by: CWE-295: Improper Certificate Validation. The impact is: Unauthorized clients could connect to the server because self-signed client certs were aloowed. The component is: helm (many files updated, see https://github.com/helm/helm/pull/3152/files/1096813bf9a425e2aa4ac755b6c991b626dfab50). The attack vector is: A malicious client could connect to the server over the network. The fixed version is: 2.7.2. | [
"cpe:2.3:a:helm:helm:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-cxqm-79p9-m968 | D-Link DAP-1360 webproc var:page Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1360 routers. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of requests to the /cgi-bin/webproc endpoint. When parsing the var:page parameter, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18422. | [] | null | null | 8.8 | null |
|
GHSA-3hf3-rvvm-859m | Cross-site Scripting (XSS) vulnerability in Web GUI of SiteManager allows logged-in user to inject scripting. This issue affects: Secomea SiteManager all versions prior to 9.7. | [] | null | 4.8 | null | null |
|
GHSA-f8hp-grmr-pp7j | RosarioSIS vulnerable to CSV Injection | RosarioSIS 10.8.4 is vulnerable to CSV injection via the Periods Module. | [] | null | 5.4 | null | null |
CVE-2023-37998 | WordPress Disabler Plugin <= 3.0.3 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Saas Disabler allows Cross Site Request Forgery.This issue affects Disabler: from n/a through 3.0.3.
| [
"cpe:2.3:a:saas:disabler:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:saas:disabler:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
GHSA-cf9g-jhqf-gm5j | An issue has been discovered in GitLab EE affecting all versions starting from 12.0 before 15.10.8, all versions starting from 15.11 before 15.11.7, all versions starting from 16.0 before 16.0.2. An attacker can clone a repository from a public project, from a disallowed IP, even after the top-level group has enabled IP restrictions on the group. | [] | null | 5.9 | null | null |
|
CVE-2022-21996 | Win32k Elevation of Privilege Vulnerability | Win32k Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
CVE-2024-22156 | WordPress SalesKing plugin <= 1.6.15 - Unauthenticated Plugin Settings Change vulnerability | Missing Authorization vulnerability in SNP Digital SalesKing.This issue affects SalesKing: from n/a through 1.6.15.
| [
"cpe:2.3:a:snpdigital:salesking_wordpress:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-j9mv-j7cg-hgp4 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. Crafted data in a JT file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15023. | [] | null | null | null | null |
|
CVE-2024-25003 | KiTTY versions 0.76.1.13 and before is vulnerable to a stack-based buffer overflow via the hostname, occurs due to insufficient bounds checking and input sanitization. This allows an attacker to overwrite adjacent memory, which leads to arbitrary code execution. | [
"cpe:2.3:a:9bis:kitty:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | null |
|
GHSA-72cr-6w4g-v39w | In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559819. | [] | null | 6.7 | null | null |
|
GHSA-hmmh-8x85-6jmh | A vulnerability was found in code-projects Job Recruitment 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file reset.php. The manipulation of the argument e leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-rw2h-rfm9-p3m9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in burgersoftware SpaBiz allows DOM-Based XSS. This issue affects SpaBiz: from n/a through 1.0.18. | [] | null | 6.5 | null | null |
|
CVE-2018-3949 | An exploitable information disclosure vulnerability exists in the HTTP server functionality of the TP-Link TL-R600VPN. A specially crafted URL can cause a directory traversal, resulting in the disclosure of sensitive system files. An attacker can send either an unauthenticated or an authenticated web request to trigger this vulnerability. | [
"cpe:2.3:o:tp-link:tl-r600vpn_firmware:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-r600vpn:3:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-r600vpn_firmware:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-r600vpn:2:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-pcc9-vv6w-47hr | Unspecified vulnerability in the Avaya VoIP Handset allows remote attackers to cause a denial of service (reboot) via crafted packets. NOTE: as of 20071016, the only disclosure is a vague pre-advisory with no actionable information. However, since it is from a well-known researcher, it is being assigned a CVE identifier for tracking purposes. | [] | null | null | null | null |
|
CVE-2023-33873 | AVEVA Operations Control Logger Execution with Unnecessary Privileges |
This privilege escalation vulnerability, if exploited, cloud allow a local OS-authenticated user with standard privileges to escalate to System privilege on the machine where these products are installed, resulting in complete compromise of the target machine.
| [
"cpe:2.3:a:aveva:batch_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:batch_management:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:batch_management:2020:sp1:*:*:*:*:*:*",
"cpe:2.3:a:aveva:communication_drivers:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:communication_drivers:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:communication_drivers:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:communication_drivers:2020:r2_p01:*:*:*:*:*:*",
"cpe:2.3:a:aveva:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:enterprise_licensing:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:historian:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:historian:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:historian:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:historian:2020:r2_p01:*:*:*:*:*:*",
"cpe:2.3:a:aveva:intouch:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:intouch:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:intouch:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:intouch:2020:r2_p01:*:*:*:*:*:*",
"cpe:2.3:a:aveva:manufacturing_execution_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:manufacturing_execution_system:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:manufacturing_execution_system:2020:p01:*:*:*:*:*:*",
"cpe:2.3:a:aveva:mobile_operator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:mobile_operator:2020:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:mobile_operator:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:mobile_operator:2020:r1:*:*:*:*:*:*",
"cpe:2.3:a:aveva:plant_scada:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:plant_scada:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:plant_scada:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:recipe_management:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:recipe_management:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:recipe_management:2020:update_1_patch_2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:2020:r2:*:*:*:*:*:*",
"cpe:2.3:a:aveva:system_platform:2020:r2_p01:*:*:*:*:*:*",
"cpe:2.3:a:aveva:telemetry_server:2020r2:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:telemetry_server:2020r2:sp1:*:*:*:*:*:*",
"cpe:2.3:a:aveva:work_tasks:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aveva:work_tasks:2020:-:*:*:*:*:*:*",
"cpe:2.3:a:aveva:work_tasks:2020:update_1:*:*:*:*:*:*",
"cpe:2.3:a:aveva:work_tasks:2020:update_2:*:*:*:*:*:*"
] | null | 7.8 | null | null |
RHSA-2023:6967 | Red Hat Security Advisory: qt5-qtbase security update | qt: buffer over-read via a crafted reply from a DNS server qt: allows remote attacker to bypass security restrictions caused by flaw in certificate validation qtbase: buffer overflow in QXmlStreamReader qtbase: infinite loops in QXmlStreamReader | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
GHSA-hj4m-fph4-j8r9 | PHP remote file inclusion vulnerability in prepend.php in Plume CMS 1.0.2, when register_globals is enabled, allows remote attackers to include arbitrary files via a URL in the _PX_config[manager_path] parameter. NOTE: this is a different executable and affected version than CVE-2006-2645. | [] | null | null | null | null |
|
CVE-2017-10363 | Vulnerability in the Oracle FLEXCUBE Universal Banking component of Oracle Financial Services Applications (subcomponent: Security). Supported versions that are affected are 11.3, 11.4.0, 12.0.1, 12.0.2, 12.0.3, 12.1.0, 12.2.0, 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data as well as unauthorized update, insert or delete access to some of Oracle FLEXCUBE Universal Banking accessible data. Note: Contact Support for fixes. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:11.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*"
] | null | null | 7.1 | 5.5 |
|
GHSA-xwf9-2w8q-559f | IrfanView CGM File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of CGM files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24866. | [] | null | null | 7.8 | null |
|
CVE-2022-4143 | An issue has been discovered in GitLab affecting all versions starting from 15.7 before 15.8.5, from 15.9 before 15.9.4, and from 15.10 before 15.10.1 that allows for crafted, unapproved MRs to be introduced and merged without authorization | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:15.10.0:*:*:*:enterprise:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-hgcc-qxwv-q2jh | Unspecified vulnerability in the NetEase WeiboHD (com.netease.wbhd) application 1.0.0 for Android has unknown impact and attack vectors. | [] | null | null | null | null |
|
GHSA-c95g-rpjx-pm4h | The NNSTAT (aka SYSPROC.NNSTAT) procedure in IBM DB2 8 before FP16, 9.1 before FP4a, and 9.5 before FP1 on Windows allows remote authenticated users to overwrite arbitrary files via the log file parameter. | [] | null | null | null | null |
|
GHSA-32jj-82v4-hh23 | Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | [] | null | null | null | null |
|
GHSA-46p9-g8f2-qj87 | Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0. | [] | null | 7.5 | null | null |
|
CVE-2017-8121 | The UMA product with software V200R001 and V300R001 has an information leak vulnerability. An attacker could exploit them to obtain some sensitive information, causing information leak. | [
"cpe:2.3:a:huawei:uma:v200r001:*:*:*:*:*:*:*",
"cpe:2.3:a:huawei:uma:v300r001:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
GHSA-3fv8-vq94-x7xf | The Video Gallery – Best WordPress YouTube Gallery Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the orderby parameter in all versions up to, and including, 2.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. | [] | null | 7.2 | null | null |
|
RHSA-2022:6518 | Red Hat Security Advisory: rh-mysql80-mysql security, bug fix, and enhancement update | mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Replication unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Error Handling unspecified vulnerability (CPU Oct 2021) mysql: C API unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: InnoDB unspecified vulnerability (CPU Oct 2021) mysql: Server: DML unspecified vulnerability (CPU Oct 2021) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Roles unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Options unspecified vulnerability (CPU Oct 2021) mysql: Server: GIS unspecified vulnerability (CPU Oct 2021) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2021) mysql: Server: Logging unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: PS unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Stored Procedure unspecified vulnerability (CPU Oct 2021) mysql: Server: DDL unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2021) mysql: Server: FTS unspecified vulnerability (CPU Oct 2021) mysql: Server: Security: Privileges unspecified vulnerability (CPU Jan 2022) mysql: Server: DDL unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Federated unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: DML unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jan 2022) mysql: Server: Parser unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Replication unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: InnoDB unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Compiling unspecified vulnerability (CPU Jan 2022) mysql: Server: Components Services unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jan 2022) mysql: Server: Information Schema unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Jan 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DML unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Replication unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: Server: FTS unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: DDL unspecified vulnerability (CPU Apr 2022) mysql: InnoDB unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Group Replication Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Jul 2022) mysql: Server: PAM Auth Plugin unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Logging unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Apr 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Options unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Stored Procedure unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Jul 2022) mysql: InnoDB unspecified vulnerability (CPU Jul 2022) mysql: Server: Federated unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jul 2022) mysql: Server: Security: Encryption unspecified vulnerability (CPU Oct 2022) mysql: C API unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Data Dictionary unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: InnoDB unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Oct 2022) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Optimizer unspecified vulnerability (CPU Jan 2023) mysql: Server: Replication unspecified vulnerability (CPU Jul 2023) | [
"cpe:/a:redhat:rhel_software_collections:3::el7"
] | null | 4.9 | null | null |
CVE-2017-10118 | Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u141 and 8u131; Java SE Embedded: 8u131; JRockit: R28.3.14. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:jdk:1.7.0:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.3.14:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phoenixcontact:fl_mguard_dm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_storage_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_balance:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_performance_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_unified_manager:-:*:*:*:*:7-mode:*:*",
"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:9.6:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:6.0:*:*:*:*:vmware_vsphere:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2011-3772 | phpCollab 2.5 allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by topics/noti_newtopic.php and certain other files. | [
"cpe:2.3:a:php-collab:phpcollab:2.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2019-1462 | A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka 'Microsoft PowerPoint Remote Code Execution Vulnerability'. | [
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac_os:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2009-3266 | Opera before 10.01 does not properly restrict HTML in a (1) RSS or (2) Atom feed, which allows remote attackers to conduct cross-site scripting (XSS) attacks, and conduct cross-zone scripting attacks involving the Feed Subscription Page to read feeds or create feed subscriptions, via a crafted feed, related to the rendering of the application/rss+xml content type as "scripted content." | [
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-736h-7p7r-vh9c | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [] | null | 6.5 | null | null |
|
GHSA-489p-9hgq-jg94 | The window.showHelp() method in Internet Explorer 5.x does not restrict HTML help files (.chm) to be executed from the local host, which allows remote attackers to execute arbitrary commands via Microsoft Networking. | [] | null | null | null | null |
|
CVE-2021-33981 | An insecure, direct object vulnerability in hunting/fishing license retrieval function of the "Fish | Hunt FL" iOS app versions 3.8.0 and earlier allows a remote authenticated attacker to retrieve other people's personal information and images of their hunting/fishing licenses. | [
"cpe:2.3:a:myfwc:fish_\\|_hunt_fl:*:*:*:*:*:iphone_os:*:*"
] | null | 4.3 | null | 4 |
|
GHSA-6mx5-j85j-5862 | The default console presented to users over telnet (when enabled) is restricted to a subset of commands. Commands issued at this console, however, appear to be fed directly into a system call or other similar function. This allows any authenticated user to execute arbitrary commands on the device. | [] | null | 7.8 | null | null |
|
CVE-2021-24485 | Special Text Boxes < 5.9.110 - Admin+ Stored Cross-Site Scripting | The Special Text Boxes WordPress plugin before 5.9.110 does not sanitise or escape some of its settings, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed. | [
"cpe:2.3:a:wp-special-textboxes_project:wp-special-textboxes:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 |
CVE-2010-4259 | Stack-based buffer overflow in FontForge 20100501 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long CHARSET_REGISTRY header in a BDF font file. | [
"cpe:2.3:a:alexej_kryukov:fontforge:20100501:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2021-44159 | 4MOSAn GCB Doctor - Unrestricted Upload of File | 4MOSAn GCB Doctor’s file upload function has improper user privilege control. A remote attacker can upload arbitrary files including webshell files without authentication and execute arbitrary code in order to perform arbitrary system operations or deny of service attack. | [
"cpe:2.3:a:4mosan:gcb_doctor:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2016-10092 | Heap-based buffer overflow in the readContigStripsIntoBuffer function in tif_unix.c in LibTIFF 4.0.7, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0beta7, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5 and 4.0.6 allows remote attackers to have unspecified impact via a crafted image. | [
"cpe:2.3:a:libtiff:libtiff:4.0.7:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2010-0901 | Unspecified vulnerability in the Export component in Oracle Database Server 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, 11.1.0.7, and 11.2.0.1 allows remote authenticated users to affect confidentiality via unknown vectors related to Select Any Dictionary. | [
"cpe:2.3:a:oracle:database_server:9.2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:9.2.0.8dv:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:10.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-hwh5-9mfv-g2m5 | Insecure caller check in sharevia deeplink logic prior to Samsung Internet 16.0.2 allows unstrusted applications to get current tab URL in Samsung Internet. | [] | null | null | null | null |
|
CVE-2023-28985 | SRX Series and MX Series: An FPC core is observed when IDP is enabled on the device and a specific malformed SSL packet is received | An Improper Validation of Syntactic Correctness of Input vulnerability in Intrusion Detection and Prevention (IDP) of Juniper Networks SRX Series and MX Series allows an unauthenticated, network-based attacker to cause Denial of Service (DoS). Continued receipt of this specific packet will cause a sustained Denial of Service condition.
On all SRX Series and MX Series platforms, where IDP is enabled and a specific malformed SSL packet is received, the SSL detector crashes leading to an FPC core.
This issue affects Juniper Networks SRX Series and MX Series prior to SigPack 3598.
In order to identify the current SigPack version, following command can be used:
user@junos# show security idp security-package-version | [
"cpe:2.3:o:juniper_networks:junos_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:-:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:vsrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:csrx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10003:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx10016:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx104:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2008:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2010:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx2020:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx204:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx40:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx80:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:mx960:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx1500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx210:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx220:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240h2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx240m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx345:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx3600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550_hm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx550m:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5600:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx5800:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:srx650:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
CVE-2025-38227 | media: vidtv: Terminating the subsequent process of initialization failure | In the Linux kernel, the following vulnerability has been resolved:
media: vidtv: Terminating the subsequent process of initialization failure
syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]
After PSI initialization fails, the si member is accessed again, resulting
in this uaf.
After si initialization fails, the subsequent process needs to be exited.
[1]
BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline]
BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524
Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059
CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0
Hardware name: Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:408 [inline]
print_report+0xc3/0x670 mm/kasan/report.c:521
kasan_report+0xd9/0x110 mm/kasan/report.c:634
vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78
vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194
vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973
dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]
dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537
dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564
dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
__fput+0x3ff/0xb70 fs/file_table.c:464
task_work_run+0x14e/0x250 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xad8/0x2d70 kernel/exit.c:938
do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
__do_sys_exit_group kernel/exit.c:1098 [inline]
__se_sys_exit_group kernel/exit.c:1096 [inline]
__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096
x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f871d58d169
Code: Unable to access opcode bytes at 0x7f871d58d13f.
RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003
R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840
</TASK>
Allocated by task 6059:
kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
kasan_save_track+0x14/0x30 mm/kasan/common.c:68
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
kmalloc_noprof include/linux/slab.h:901 [inline]
kzalloc_noprof include/linux/slab.h:1037 [inline]
vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970
vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423
vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194
vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973
dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]
dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537
dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564
dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
__fput+0x3ff/0xb70 fs/file_tabl
---truncated--- | [] | null | null | null | null |
CVE-2014-1968 | Cross-site scripting (XSS) vulnerability in the XooNIps module 3.47 and earlier for XOOPS allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:riken:xoonips:*:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.40:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.41:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.42:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.43:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.44:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.45:*:*:*:*:xoops:*:*",
"cpe:2.3:a:riken:xoonips:3.46:*:*:*:*:xoops:*:*"
] | null | null | null | 4.3 |
|
CVE-2020-5789 | Relative Path Traversal in Teltonika firmware TRB2_R_00.02.04.3 allows a remote, authenticated attacker to read the contents of arbitrary files on disk. | [
"cpe:2.3:o:teltonika-networks:trb245_firmware:00.02.04.03:*:*:*:*:*:*:*",
"cpe:2.3:h:teltonika-networks:trb245:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2021-40347 | An issue was discovered in views/list.py in GNU Mailman Postorius before 1.3.5. An attacker (logged into any account) can send a crafted POST request to unsubscribe any user from a mailing list, also revealing whether that address was subscribed in the first place. | [
"cpe:2.3:a:postorius_project:postorius:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 5.5 |
|
CVE-2015-4932 | Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12.1 allows remote attackers to execute arbitrary code via a crafted packet, a different vulnerability than CVE-2015-4931, CVE-2015-4933, CVE-2015-4934, and CVE-2015-4935. | [
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_storage_manager_fastback:6.1.11.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
RHSA-2021:3741 | Red Hat Security Advisory: Red Hat JBoss Web Server 5.5.1 Security Update | tomcat: Infinite loop while reading an unexpected TLS packet when using OpenSSL JSSE engine | [
"cpe:/a:redhat:jboss_enterprise_web_server:5.5::el7",
"cpe:/a:redhat:jboss_enterprise_web_server:5.5::el8"
] | null | 7.5 | null | null |
CVE-2019-8552 | A memory initialization issue was addressed with improved memory handling. This issue is fixed in iOS 12.2, macOS Mojave 10.14.4, tvOS 12.2, watchOS 5.2. A malicious application may be able to elevate privileges. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
ICSA-23-138-03 | Hitachi Energy’s MicroSCADA Pro/X SYS600 Products | The ActiveBar ActiveX control distributed in ActBar.ocx 1.0.3.8 in SYS600 product does not properly restrict the SetLayoutData method, which could allow attackers to execute arbitrary code via a crafted data argument. | [] | null | null | 6.7 | null |
CVE-2007-0779 | GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor. | [
"cpe:2.3:a:mozilla:firefox:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.9_rc:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:1.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:alpha:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:dev:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.99:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
GHSA-p3xf-gp9j-6r3v | In filterMask of SkEmbossMaskFilter.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. | [] | null | 8.8 | null | null |
|
GHSA-r58h-4phg-6hgx | Certain Huawei products (AP2000;IPS Module;NGFW Module;NIP6300;NIP6600;NIP6800;S5700;SVN5600;SVN5800;SVN5800-C;SeMG9811;Secospace AntiDDoS8000;Secospace USG6300;Secospace USG6500;Secospace USG6600;USG6000V;eSpace U1981) have a buffer overflow vulnerability. An attacker who logs in to the board may send crafted messages from the internal network port or tamper with inter-process message packets to exploit this vulnerability. Due to insufficient validation of the message, successful exploit may cause the affected board to be abnormal. | [] | null | null | null | null |
|
GHSA-r3hj-67hc-ghvr | SGI ProPack 3 SP6 kernel displays the frame buffer contents of the last session after a reboot, which might allow local users to obtain sensitive information. | [] | null | null | null | null |
|
GHSA-9crf-w79v-cmx6 | An issue was discovered in admincp.php in idreamsoft iCMS 7.0.11. When verifying CSRF_TOKEN, if CSRF_TOKEN does not exist, only the Referer header is validated, which can be bypassed via an admincp.php substring in this header. | [] | null | null | 8.8 | null |
|
CVE-2021-0372 | In getMediaOutputSliceAction of RemoteMediaSlice.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174047735 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2014-4543 | Multiple cross-site scripting (XSS) vulnerabilities in payper/payper.php in the Pay Per Media Player plugin 1.24 and earlier for WordPress allow remote attackers to inject arbitrary web script or HTML via the (1) fcolor, (2) links, (3) stitle, (4) height, (5) width, (6) host, (7) bcolor, (8) msg, (9) id, or (10) size parameter. | [
"cpe:2.3:a:pay_per_media_player_project:pay_per_media_player:*:-:-:*:-:wordpress:*:*"
] | null | null | null | 4.3 |
|
GHSA-8qgw-cc84-v94v | Tenda W30E V16.01.0.12(4843) was discovered to contain a stack overflow via the function formResetMeshNode. | [] | null | 9.8 | null | null |
|
CVE-2019-5053 | An exploitable use-after-free vulnerability exists in the Length parsing function of NitroPDF. A specially crafted PDF can cause a type confusion, resulting in a use-after-free condition. An attacker can craft a malicious PDF to trigger this vulnerability. | [
"cpe:2.3:a:gonitro:nitropdf:12.2.1.522:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2006-0715 | Cross-site scripting (XSS) vulnerability in sNews 1.3 allows remote attackers to inject arbitrary web script or HTML via the comment field. | [
"cpe:2.3:a:solucija:snews:1.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-m3c8-3887-j763 | Multiple cross-site scripting (XSS) vulnerabilities in the site creation interface in ikiwiki-hosting before 0.20131025 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-w4rw-g4m2-64c5 | An Uncontrolled Search Path Element issue was discovered in BLF-Tech LLC VisualView HMI Version 9.9.14.0 and prior. The uncontrolled search path element vulnerability has been identified, which may allow an attacker to run a malicious DLL file within the search path resulting in execution of arbitrary code. | [] | null | null | 7 | null |
|
CVE-2018-13314 | System command injection in formAliasIp in TOTOLINK A3002RU version 1.0.8 allows attackers to execute system commands via the "ipAddr" POST parameter. | [
"cpe:2.3:o:totolink:a3002ru_firmware:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-p9cc-rrr9-3869 | An exploitable out-of-bounds read exists in the handling of the MXIT protocol in Pidgin. Specially crafted MXIT contact information sent from the server can result in memory disclosure. | [] | null | null | 5.3 | null |
|
GHSA-hxj4-xq5m-hh5h | libclamav/others.c in ClamAV before 0.90.3 and 0.91 before 0.91rc1 uses insecure permissions for temporary files that are created by the cli_gentempstream function in clamd/clamdscan, which might allow local users to read sensitive files. | [] | null | null | null | null |
|
GHSA-xg7j-vjpx-w8rq | The Skaut bazar WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to the use of $_SERVER['PHP_SELF'] in the ~/skaut-bazar.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.3.2. | [] | null | null | null | null |
|
CVE-2020-19861 | When a zone file in ldns 1.7.1 is parsed, the function ldns_nsec3_salt_data is too trusted for the length value obtained from the zone file. When the memcpy is copied, the 0xfe - ldns_rdf_size(salt_rdf) byte data can be copied, causing heap overflow information leakage. | [
"cpe:2.3:a:nlnetlabs:ldns:1.7.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-8m9p-3926-gffr | wger Workout Manager Cross-site Scripting vulnerability | Cross Site Scripting vulnerability in wger Project wger Workout Manager v.2.2.0a3 allows a remote attacker to gain privileges via the `license_author `field in the add-ingredient function in the `templates/ingredients/view.html`, `models/ingredients.py`, and `views/ingredients.py` components. | [] | null | 5.4 | null | null |
GHSA-f8cc-g7j8-xxpm | XStream can cause a Denial of Service by injecting deeply nested objects raising a stack overflow | ImpactThe vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream.PatchesXStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead.WorkaroundsThe only solution is to catch the StackOverflowError in the client code calling XStream.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2022-40151](https://x-stream.github.io/CVE-2022-40151.html).CreditsThe vulnerability was discovered and reported by Henry Lin of the Google OSS-Fuzz team.For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | [] | null | 7.5 | null | null |
GHSA-86jr-59gf-89v2 | Unspecified vulnerability in the Secure Global Desktop component in Oracle Virtualization 4.6 allows remote attackers to affect integrity via unknown vectors related to Core. | [] | null | null | null | null |
|
GHSA-8gpv-8v95-g9v9 | IBM Spectrum Scale 4.2.0.0 through 4.2.3.21 and 5.0.0.0 through 5.0.4.4 could allow an authenticated GUI user to perform unauthorized actions due to missing function level access control. IBM X-Force ID: 178414 | [] | null | null | null | null |
|
GHSA-236f-m6gm-vp93 | An issue was discovered in Veritas Enterprise Vault before 15.1 UPD882911, ZDI-CAN-24698. It allows an authenticated remote attacker to inject a parameter into an HTTP request, allowing for Cross-Site Scripting while viewing archived content. This could reflect back to an authenticated user without sanitization if executed by that user. | [] | null | 5.4 | null | null |
|
GHSA-h5xv-5cpx-pf45 | VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control. A malicious actor with non-administrative privileges on a guest VM may gain ability to perform certain high privilege operations within that VM. | [] | null | 7.8 | null | null |
|
GHSA-9hgq-6x66-3wfh | The Google for WooCommerce plugin for WordPress is vulnerable to Information Disclosure in all versions up to, and including, 2.8.6. This is due to publicly accessible print_php_information.php file. This makes it possible for unauthenticated attackers to retrieve information about Webserver and PHP configuration, which can be used to aid other attacks. | [] | null | 5.3 | null | null |
|
CVE-2014-7254 | Unspecified vulnerability in ARROWS Me F-11D allows physically proximate attackers to read or modify flash memory via unknown vectors. | [
"cpe:2.3:h:fujitsu:arrows_me_f-11d:-:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-7jp4-523x-8hmf | In the Linux kernel, the following vulnerability has been resolved:KVM: x86/xen: Fix eventfd error handling in kvm_xen_eventfd_assign()Should not call eventfd_ctx_put() in case of error.[Introduce new goto target instead. - Paolo] | [] | null | null | null | null |
|
CVE-2024-6149 | Redirection of users to a vulnerable URL in Citrix Workspace app for HTML5 | [] | 4.8 | null | null | null |
|
GHSA-h9vm-3m8j-cpjv | Double free vulnerability in the writeDataError function in the ElasticSearch plugin (omelasticsearch) in rsyslog before 7.4.2 and before 7.5.2 devel, when errorfile is set to local logging, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted JSON response. | [] | null | null | null | null |
|
RHSA-2003:398 | Red Hat Security Advisory: : : : New rsync packages fix remote security vulnerability | security flaw | [
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0",
"cpe:/o:redhat:linux:9"
] | null | null | null | null |
GHSA-x9fj-vxmr-hcmm | Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 and SP2 does not properly validate attributes in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Visio Attribute Validation Memory Corruption Vulnerability." | [] | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.