id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-pjh3-v4fw-6w59 | Totolink routers s X5000R V9.1.0u.6118_B20201102 and A7000R V9.1.0u.6115_B20201022 were discovered to contain a command injection vulnerability in the setWanCfg function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | [] | null | 9.8 | null | null |
|
CVE-2023-5613 | The Super Testimonials plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'tpsscode' shortcode in all versions up to, and including, 2.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:themepoints:super_testimonials:*:*:*:*:*:wordpress:*:*"
] | null | 6.4 | null | null |
|
GHSA-3mmh-vq9w-4c3g | Microweber vulnerable to Reflected Cross-site Scripting | Microweber versions 1.3.1 and prior are vulnerable to Reflected Cross-site Scripting (XSS). A patch is available on the 1.4, dev, and laravel-sail branches. | [] | null | 6.1 | null | null |
GHSA-7888-6r8j-m965 | The all-in-one-schemaorg-rich-snippets plugin before 1.5.0 for WordPress has XSS on the settings page. | [] | null | null | 6.1 | null |
|
GHSA-9qvm-6h84-98c2 | An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Installer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1277, CVE-2020-1302, CVE-2020-1312. | [] | null | null | null | null |
|
CVE-2024-51520 | Vulnerability of input parameters not being verified in the HDC module
Impact: Successful exploitation of this vulnerability may affect availability. | [
"cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-rpvm-69vv-cpww | The Social Media Widget WordPress plugin before 4.0.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] | null | 4.8 | null | null |
|
CVE-2017-17972 | packages/subjects/pub/subjects.php in Archon 3.21 rev-1 has XSS in the referer parameter in an index.php?subjecttypeid=xxx request, aka Open Bug Bounty ID OBB-466362. | [
"cpe:2.3:a:archon_project:archon:3.21:rev-1:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-gq8w-3h98-m48x | Zettlr version 2.3.0 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Zettlr. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the contents of markdown files before rendering them. | [] | null | 5.5 | null | null |
|
CVE-2023-4594 | Cross-site Scripting in BVRP Software SLmail | Stored XSS vulnerability. This vulnerability could allow an attacker to store a malicious JavaScript payload via GET and POST methods on multiple parameters in the MailAdmin_dll.htm file. | [
"cpe:2.3:a:seattlelab:slmail:5.5.0.4433:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2020-36048 | Engine.IO before 4.0.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport. | [
"cpe:2.3:a:socket:engine.io:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2007-5210 | Arbor Networks Peakflow SP before 3.5.1 patch 14, and 3.6.x before 3.6.1 patch 5, allows remote authenticated users to bypass access restrictions and read or write unspecified data via unknown vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:arbor_networks:peakflow_sp:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:arbor_networks:peakflow_sp:3.6.1:*:*:*:*:*:*:*"
] | null | null | null | 6 |
|
GHSA-f23x-vvhx-h4pg | The ISO IS-IS parser in tcpdump before 4.9.2 has a buffer over-read in print-isoclns.c:isis_print_is_reach_subtlv(). | [] | null | null | 9.8 | null |
|
GHSA-j56w-r2wr-799x | Cross-site scripting (XSS) vulnerability in Let's PHP! p++BBS before 4.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | 6.1 | null |
|
GHSA-hvj4-qf24-vggm | A vulnerability was found in PHPGurukul HPGurukul Online Birth Certificate System 2.0. It has been classified as critical. Affected is an unknown function of the file /admin/registered-users.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
CVE-2023-0902 | SourceCodester Simple Food Ordering System process_order.php cross site scripting | A vulnerability was found in SourceCodester Simple Food Ordering System 1.0. It has been classified as problematic. This affects an unknown part of the file process_order.php. The manipulation of the argument order leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-221451. | [
"cpe:2.3:a:simple_food_ordering_system_project:simple_food_ordering_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
CVE-2005-4870 | Stack-based buffer overflows in the (1) xmlvarcharfromfile, (2) xmlclobfromfile, (3) xmlfilefromvarchar, and (4) xmlfilefromclob function calls in IBM DB2 8.1 allow remote attackers to execute arbitrary code via a 94-byte second argument, which causes the return address to be overwritten with a pointer to the argument. | [
"cpe:2.3:a:ibm:db2:8.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2022:1842 | Red Hat Security Advisory: exiv2 security, bug fix, and enhancement update | exiv2: stack exhaustion issue in the printIFDStructure function may lead to DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 6.5 | null | null |
CVE-2017-7832 | The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox < 57. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 |
|
CVE-2007-5319 | Unspecified vulnerability in the vuidmice STREAMS modules in Sun Solaris 8, 9, and 10 allows local users with console (/dev/console) access to cause a denial of service ("unusable" system console) via unspecified vectors. | [
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10.0:*:x86:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2003-0098 | Unknown vulnerability in apcupsd before 3.8.6, and 3.10.x before 3.10.5, allows remote attackers to gain root privileges, possibly via format strings in a request to a slave server. | [
"cpe:2.3:a:apcupsd:apcupsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-36pg-p326-9j9j | TOTOLINK N300RT V2.1.8-B20201030.1539 contains a Store Cross-site scripting (XSS) vulnerability in Port Forwarding under the Firewall Page. | [] | null | 5.5 | null | null |
|
GHSA-cw5v-74xv-hcxg | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol. | [] | null | null | null | null |
|
CVE-2024-12697 | real.Kit <= 5.1.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The real.Kit plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 5.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
GHSA-9xcg-f7r6-v47x | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Stranger Studios (WordCamp Philly) Don't Break The Code allows Reflected XSS.This issue affects Don't Break The Code: from n/a through .3.1. | [] | null | 7.1 | null | null |
|
GHSA-frmj-xmrv-cmvv | The Registration Forms – User Registration Forms, Invitation-Based Registrations, Front-end User Profile, Login Form & Content Restriction Social Sites Login plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.9. This is due to insufficient verification on the user being returned by the social login token. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email and the user does not have an already-existing account for the service returning the token. | [] | null | 8.1 | null | null |
|
GHSA-hwhr-jcvf-mgf3 | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. | [] | null | 7.8 | null | null |
|
CVE-2024-38361 | Permissions processing error in spacedb | Spicedb is an Open Source, Google Zanzibar-inspired permissions database to enable fine-grained authorization for customer applications. Use of an exclusion under an arrow that has multiple resources may resolve to `NO_PERMISSION` when permission is expected. If the resource exists under *multiple* folders and the user has access to view more than a single folder, SpiceDB may report the user does not have access due to a failure in the exclusion dispatcher to request that *all* the folders in which the user is a member be returned. Permission is returned as `NO_PERMISSION` when `PERMISSION` is expected on the `CheckPermission` API. This issue has been addressed in version 1.33.1. All users are advised to upgrade. There are no known workarounds for this issue. | [
"cpe:2.3:a:authzed:spicedb:*:*:*:*:*:*:*:*"
] | null | 3.7 | null | null |
GHSA-wwrp-f96g-5fc7 | Cross-Site Request Forgery (CSRF) vulnerability in Tyche Softwares Currency per Product for WooCommerce.This issue affects Currency per Product for WooCommerce: from n/a through 1.6.0. | [] | null | 4.3 | null | null |
|
GHSA-724h-g6v3-gqgq | The Bodyguard for Hire (aka com.dreamstep.wBodyGuardforHire) application 0.18.13146.42280 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2007-1995 | bgpd/bgp_attr.c in Quagga 0.98.6 and earlier, and 0.99.6 and earlier 0.99 versions, does not validate length values in the MP_REACH_NLRI and MP_UNREACH_NLRI attributes, which allows remote attackers to cause a denial of service (daemon crash or exit) via crafted UPDATE messages that trigger an assertion error or out of bounds read. | [
"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*"
] | null | null | null | 6.3 |
|
GHSA-chj7-x4mx-v4qg | Integer overflow vulnerability in payable function of a smart contract implementation for an Ethereum token, as demonstrated by the smart contract implemented at address 0xB49E984A83d7A638E7F2889fc8328952BA951AbE, an implementation for MillionCoin (MON). | [] | null | null | null | null |
|
CVE-2024-9239 | Booster for WooCommerce <= 7.2.3 - Reflected Cross-Site Scripting | The Booster for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 7.2.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
CVE-2020-0889 | A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0953, CVE-2020-0959, CVE-2020-0960, CVE-2020-0988, CVE-2020-0992, CVE-2020-0994, CVE-2020-0995, CVE-2020-0999, CVE-2020-1008. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 9.3 |
|
CVE-2024-24623 | Softaculous Webuzo FTP Management Command Injection | Softaculous Webuzo contains a command injection vulnerability in the FTP management functionality. A remote, authenticated attacker can exploit this vulnerability to gain code execution on the system. | [
"cpe:2.3:a:softaculous:webuzo:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:softaculous:webuzo:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
GHSA-p428-5vgm-3pf6 | Cross-site scripting (XSS) vulnerability in index.php in Elite Forum 1.0.0.0 allows remote attackers to inject arbitrary web script or HTML via the title parameter in a ptopic action, a different vulnerability than CVE-2005-3412. | [] | null | null | null | null |
|
CVE-2017-16646 | drivers/media/usb/dvb-usb/dib0700_devices.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (BUG and system crash) or possibly have unspecified other impact via a crafted USB device. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | 6.6 | 7.2 |
|
CVE-2021-21108 | Use after free in media in Google Chrome prior to 87.0.4280.141 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 9.6 | null | 6.8 |
|
CVE-2021-43022 | Adobe Premiere Rush PNG File Memory Corruption Remote Code Execution | Adobe Premiere Rush version 1.5.16 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious PNG file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required to exploit this vulnerability. | [
"cpe:2.3:a:adobe:premiere_rush:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-8j38-79vm-qxr4 | A code execution vulnerability exists in the normal world’s signed code execution functionality of Microsoft Azure Sphere 20.07. A specially crafted AF_PACKET socket can cause a process to create an executable memory mapping with controllable content. An attacker can execute a shellcode that uses the PACKET_MMAP functionality to trigger this vulnerability. | [] | null | null | null | null |
|
GHSA-7p9j-prv8-54xc | The Memberpress plugin for WordPress is vulnerable to Blind Server-Side Request Forgery in all versions up to, and including, 1.11.29 via the 'mepr-user-file' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | [] | null | 8.5 | null | null |
|
GHSA-6j9g-q4qp-mq4x | IDOR vulnerability in the order processing feature from ecommerce component of Apache OFBiz before 17.12.04 | [] | null | null | null | null |
|
CVE-2023-27234 | A Cross-Site Request Forgery (CSRF) in /Sys/index.html of Jizhicms v2.4.5 allows attackers to arbitrarily make configuration changes within the application. | [
"cpe:2.3:a:jizhicms:jizhicms:2.4.5:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
CVE-2022-24312 | A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists that could cause modification of an existing file by adding at end of file or create a new file in the context of the Data Server potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior) | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system_data_server:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2024-7714 | AI Assistant with ChatGPT by AYS <= 2.0.9 - Unauthenticated AJAX Calls | The AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0 lacks sufficient access controls allowing an unauthenticated user to disconnect the AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0 from OpenAI, thereby disabling the AI ChatBot with ChatGPT and Content Generator by AYS WordPress plugin before 2.1.0. Multiple actions are accessible: 'ays_chatgpt_disconnect', 'ays_chatgpt_connect', and 'ays_chatgpt_save_feedback' | [
"cpe:2.3:a:ays-pro:ai_chatbot_with_chatgpt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ays-pro:chatgpt_assistant:*:*:*:*:free:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2002-0609 | Vulnerability in HP MPE/iX 6.0 through 7.0 allows attackers to cause a denial of service (system failure with "SA1457 out of i_port_timeout.fix_up_message_frame") via malformed IP packets. | [
"cpe:2.3:o:hp:mpe_ix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mpe_ix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:mpe_ix:7.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-wqwg-48gv-m2wp | The drmstor.dll ActiveX object in Microsoft Windows Digital Rights Management System (DRM) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long parameter to the StoreLicense function, which triggers "memory corruption" and possibly a buffer overflow. | [] | null | null | null | null |
|
GHSA-w39w-vrpr-4vxx | Cross-Site Request Forgery (CSRF) vulnerability in richtexteditor Rich Text Editor allows Stored XSS. This issue affects Rich Text Editor: from n/a through 1.0.1. | [] | null | 7.1 | null | null |
|
CVE-2015-2668 | ClamAV before 0.98.7 allows remote attackers to cause a denial of service (infinite loop) via a crafted xz archive file. | [
"cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-jhcx-mx78-228g | In CellBroadcastReceiver, there is a possible path to enable specific cellular features due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-200163477 | [] | null | 7.8 | null | null |
|
GHSA-3mfq-6299-p3w3 | A flaw was found in the Linux kernels implementation of MIDI (kernel 5.7-rc6), where an attacker with a local account and the permissions to issue an ioctl commands to midi devices, could trigger a use-after-free. A write to this specific memory while freed and before use could cause the flow of execution to change and possibly allow for memory corruption or privilege escalation. | [] | null | 7.8 | null | null |
|
GHSA-gg84-68cr-5wgm | An Allocation of Resources Without Limits or Throttling vulnerability in Juniper Networks Junos OS allows an unauthenticated, network-based attacker to cause Denial of Service (DoS).On all Junos OS QFX5000 Series and EX4000 Series platforms, when a high number of VLANs are configured, a specific DHCP packet will cause PFE hogging which will lead to dropping of socket connections.This issue affects:Juniper Networks Junos OS on QFX5000 Series and EX4000 Series21.1 versions prior to 21.1R3-S5;21.2 versions prior to 21.2R3-S5;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S4;22.1 versions prior to 22.1R3-S3;22.2 versions prior to 22.2R3-S1;22.3 versions prior to 22.3R2-S2, 22.3R3;22.4 versions prior to 22.4R2.This issue does not affect Juniper Networks Junos OS versions prior to 21.1R1 | [] | null | 7.5 | null | null |
|
CVE-2024-1758 | The SuperFaktura WooCommerce plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.40.3 via the wc_sf_url_check function. This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services. | [] | null | 5.4 | null | null |
|
CVE-2002-1063 | Thomas Hauck Jana Server 2.x through 2.2.1, and 1.4.6 and earlier, allows remote attackers to cause a denial of service (resource exhaustion) via a large number of FTP PASV requests, which consumes all available FTP ports. | [
"cpe:2.3:a:t._hauck:jana_web_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:1.45:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:1.46:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:t._hauck:jana_web_server:2.2.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-v4hr-6g26-8757 | The TeleMessage service through 2025-05-05 stores certain cleartext information in memory, even though memory content may be accessible to an adversary through various avenues, as exploited in the wild in May 2025. | [] | null | 2.8 | null | null |
|
RHSA-2023:3265 | Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.12.3 Security and Bug fix update | jsonwebtoken: Unrestricted key type could lead to legacy keys usagen express: "qs" prototype poisoning causes the hang of the node process | [
"cpe:/a:redhat:openshift_data_foundation:4.12::el8"
] | null | 7.5 | null | null |
GHSA-3gxc-gprv-rpqq | The Java Console in IBM Domino 8.5.x before 8.5.3 FP6 IF13 and 9.x before 9.0.1 FP6, when a certain unsupported configuration involving UNC share pathnames is used, allows remote attackers to bypass authentication and possibly execute arbitrary code via unspecified vectors, aka SPR KLYHA7MM3J. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-0920. | [] | null | null | 8.1 | null |
|
GHSA-ffg3-vmf8-h87g | Authentication Bypass
vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analyticscomponent).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00. | [] | null | 9.4 | null | null |
|
CVE-2024-37759 | DataGear v5.0.0 and earlier was discovered to contain a SpEL (Spring Expression Language) expression injection vulnerability via the Data Viewing interface. | [
"cpe:2.3:a:datagear:datagear:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-c558-w58v-5fw4 | A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft Word, Office 365 ProPlus, Microsoft Office. This CVE ID is unique from CVE-2018-8539. | [] | null | null | 7.8 | null |
|
CVE-2025-30805 | WordPress Flexible Cookies plugin <= 1.1.8 - Cross Site Request Forgery (CSRF) vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in wpdesk Flexible Cookies allows Cross Site Request Forgery. This issue affects Flexible Cookies: from n/a through 1.1.8. | [] | null | 4.3 | null | null |
CVE-2022-41007 | Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'port redirect protocol (tcp|udp|tcp/udp) inport <1-65535> dstaddr A.B.C.D export <1-65535> description WORD' command template. | [
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
|
GHSA-w77v-xpxr-c6pv | Moodle cross-site scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in mod/quiz/report/statistics/statistics_question_table.php in Moodle through 2.5.9, 2.6.x before 2.6.9, 2.7.x before 2.7.6, and 2.8.x before 2.8.4 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the student role for a crafted quiz response. | [] | null | null | null | null |
CVE-2007-2229 | Microsoft Windows Vista uses insecure default permissions for unspecified "local user information data stores" in the registry and the file system, which allows local users to obtain sensitive information such as administrative passwords, aka "Permissive User Information Store ACLs Information Disclosure Vulnerability." | [
"cpe:2.3:o:microsoft:windows_vista:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:gold:x64:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-wc7h-rjv2-pvjh | Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment. | [] | null | null | null | null |
|
CVE-2009-4742 | Multiple SQL injection vulnerabilities in Docebo 3.6.0.3 allow remote attackers to execute arbitrary SQL commands via (1) the word parameter in a play help action to the faq module, reachable through index.php; (2) the word parameter in a play keyw action to the link module, reachable through index.php; (3) the id_certificate parameter in an elemmetacertificate action to the meta_certificate module, reachable through index.php; or (4) the id_certificate parameter in an elemcertificate action to the certificate module, reachable through index.php. | [
"cpe:2.3:a:docebo:docebo:3.6.0.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-w5w5-8vfh-xcjq | whoami stack buffer overflow on several Unix platforms | With versions of the whoami crate >= 0.5.3 and < 1.5.0, calling any of these functions leads to an immediate stack buffer overflow on illumos and Solaris:`whoami::username``whoami::realname``whoami::username_os``whoami::realname_os`With versions of the whoami crate >= 0.5.3 and < 1.0.1, calling any of the above functions also leads to a stack buffer overflow on these platforms:BitrigDragonFlyBSDFreeBSDNetBSDOpenBSDThis occurs because of an incorrect definition of the `passwd` struct on those platforms.As a result of this issue, denial of service and data corruption have both been observed in the wild. The issue is possibly exploitable as well.This vulnerability also affects other Unix platforms that aren't Linux or macOS.This issue has been addressed in whoami 1.5.0.For more information, see [this GitHub issue](https://github.com/ardaku/whoami/issues/91). | [] | null | 8.2 | null | null |
CVE-2025-4691 | Free Booking Plugin for Hotels, Restaurants and Car Rentals – eaSYNC Booking <= 1.3.21 - Insecure Direct Object Reference to Sensitive Information Exposure | The Free Booking Plugin for Hotels, Restaurants and Car Rentals – eaSYNC Booking plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.3.21 via the 'view_request_details' due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view the details of any booking request. The vulnerability was partially patched in versions 1.3.18 and 1.3.21. | [] | null | 5.3 | null | null |
CVE-2023-37199 |
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists that
could cause remote code execution when an admin user on DCE tampers with backups which
are then manually restored.
| [
"cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | null |
|
GHSA-j6pv-9pg5-vg52 | Hyper-V Remote Code Execution Vulnerability | [] | null | 9.9 | null | null |
|
GHSA-r2jw-c95q-rj29 | cocoon Reuses a Nonce, Key Pair in Encryption | Versions of the package cocoon before 0.4.0 are vulnerable to Reusing a Nonce, Key Pair in Encryption when the encrypt, wrap, and dump functions are sequentially called. An attacker can generate the same ciphertext by creating a new encrypted message with the same cocoon object.**Note:**
The issue does NOT affect objects created with Cocoon::new which utilizes ThreadRng. | [] | 6.3 | 4.5 | null | null |
GHSA-cc77-xhr4-385c | IBM Security Guardium Database Activity Monitor 10 allows local users to obtain sensitive information by reading cached browser data. IBM X-Force ID: 110328. | [] | null | null | 5.5 | null |
|
GHSA-wjw7-pmq5-rw6m | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in IT Path Solutions Contact Form to Any API.This issue affects Contact Form to Any API: from n/a through 1.1.8. | [] | null | 8.5 | null | null |
|
GHSA-pf38-v6qj-j23h | Malfunction of CSRF token validation in Shopware | ImpactThe CSRF tokens were not renewed after login and logout.
An attacker could impersonate the victim if the attacker is able to use the same device as the victim used beforehand.PatchesWe recommend updating to the current version 5.7.9. You can get the update to 5.7.9 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/changelog-sw5/#5-7-9For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shopware-security-plugin.htmlReferenceshttps://docs.shopware.com/en/shopware-5-en/security-updates/security-update-04-2022 | [] | null | 7.5 | null | null |
CVE-2001-0825 | Buffer overflow in internal string handling routines of xinetd before 2.1.8.8 allows remote attackers to execute arbitrary commands via a length argument of zero or less, which disables the length check. | [
"cpe:2.3:a:xinetd:xinetd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xinetd:xinetd:2.1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xinetd:xinetd:2.1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xinetd:xinetd:2.3.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-434x-65h3-cg6q | A DLL Hijacking issue discovered in Soft-o Free Password Manager 1.1.20 allows attackers to create arbitrary DLLs leading to code execution. | [] | null | 7.8 | null | null |
|
GHSA-r782-8w92-j64h | PHP remote file inclusion vulnerability in loginout.php in FarsiNews 2.1 Beta 2 and earlier, with register_globals enabled, allows remote attackers to include arbitrary files via a URL in the cutepath parameter. | [] | null | null | null | null |
|
GHSA-2rg6-3m8g-8x9g | CiscoWorks Common Management Foundation (CMF) 2.1 and earlier allows the guest user to obtain restricted information and possibly gain administrative privileges by changing the "guest" user to the Admin user on the Modify or delete users pages. | [] | null | null | null | null |
|
GHSA-v895-q24x-x3xg | A denial of service vulnerability in the Android media framework. Product: Android. Versions: 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-37094889. | [] | null | null | 5.5 | null |
|
CVE-2024-37034 | An issue was discovered in Couchbase Server before 7.2.5 and 7.6.0 before 7.6.1. It does not ensure that credentials are negotiated with the Key-Value (KV) service using SCRAM-SHA when remote link encryption is configured for Half-Secure. | [
"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:couchbase:couchbase_server:7.6.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
GHSA-6qp6-2ggr-xv6x | A memory corruption issue was addressed with improved state management. This issue is fixed in iOS 12.5.4. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. | [] | null | 8.8 | null | null |
|
CVE-2024-1597 | pgjdbc SQL Injection via line comment generation | pgjdbc, the PostgreSQL JDBC Driver, allows attacker to inject SQL if using PreferQueryMode=SIMPLE. Note this is not the default. In the default mode there is no vulnerability. A placeholder for a numeric value must be immediately preceded by a minus. There must be a second placeholder for a string value after the first placeholder; both must be on the same line. By constructing a matching string payload, the attacker can inject SQL to alter the query,bypassing the protections that parameterized queries bring against SQL Injection attacks. Versions before 42.7.2, 42.6.1, 42.5.5, 42.4.4, 42.3.9, and 42.2.28 are affected. | [
"cpe:2.3:a:pgjdbc:pgjdbc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql_jdbc_driver:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*"
] | null | 10 | null | null |
CVE-2021-21613 | Jenkins TICS Plugin 2020.3.0.6 and earlier does not escape TICS service responses, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control TICS service response content. | [
"cpe:2.3:a:jenkins:tics:*:*:*:*:*:jenkins:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-86p2-3vx8-3fwp | Apple Safari before 4.0 does not properly check for revoked Extended Validation (EV) certificates, which makes it easier for remote attackers to trick a user into accepting an invalid certificate. | [] | null | null | null | null |
|
GHSA-2mc9-cvxq-r2xq | A logic issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, macOS Big Sur 11.0.1. A malicious application may be able to access private information. | [] | null | null | null | null |
|
GHSA-4gqc-53g7-25x6 | An issue was discovered in GNU Hurd before 0.9 20210404-9. A single pager port is shared among everyone who mmaps a file, allowing anyone to modify any files that they can read. This can be trivially exploited to get full root access. | [] | null | null | null | null |
|
GHSA-r364-xr2v-cwhw | An issue was discovered on Xerox WorkCentre 3655, 3655i, 58XX, 58XXi, 59XX, 59XXi, 6655, 6655i, 72XX, 72XXi, 78XX, 78XXi, 7970, 7970i, EC7836, and EC7856 devices before R18-05 073.xxx.0487.15000. There is authenticated remote command execution. | [] | null | null | 8.8 | null |
|
CVE-2021-31345 | A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303), PLUSCONTROL 1st Gen (All versions). The total length of an UDP payload (set in the IP header) is unchecked. This may lead to various side effects, including Information Leak and Denial-of-Service conditions, depending on a user-defined applications that runs on top of the UDP protocol. (FSMD-2021-0006) | [
"cpe:2.3:a:siemens:capital_vstar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:nucleus_source_code:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_modular_equiment_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_modular_equiment_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:apogee_pxc_modular:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_compact_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc_compact:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:talon_tc_modular_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:talon_tc_modular:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2005-4696 | The Microsoft Wireless Zero Configuration system (WZCS) stores WEP keys and pair-wise Master Keys (PMK) of the WPA pre-shared key in plaintext in memory of the explorer process, which allows attackers with access to process memory to steal the keys and access the network. | [
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:media_center:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*"
] | null | null | null | 2.1 |
|
GHSA-vgw6-pfvr-vxpq | vtiger CRM before 5.3.0 does not properly recognize the disabled status of a field in the Leads module, which allows remote authenticated users to bypass intended access restrictions by reading a previously created report. | [] | null | null | null | null |
|
GHSA-m72m-mhq2-9p6c | Uncaught Exception in jsoup | Impact_What kind of vulnerability is it? Who is impacted?_
Those using jsoup to parse untrusted HTML or XML may be vulnerable to DOS attacks. If the parser is run on user supplied input, an attacker may supply content that causes the parser to get stuck (loop indefinitely until cancelled), to complete more slowly than usual, or to throw an unexpected exception. This effect may support a denial of service attack.Patches_Has the problem been patched? What versions should users upgrade to?_
Users should upgrade to jsoup 1.14.2Workarounds_Is there a way for users to fix or remediate the vulnerability without upgrading?_
Users may rate limit input parsing. Users should limit the size of inputs based on system resources. Users should implement thread watchdogs to cap and timeout parse runtimes. | [] | null | 7.5 | null | null |
GHSA-xg9w-c4g2-7vr7 | Unrestricted file upload vulnerability in process.php in Tizag Countdown Creator 3 allows remote attackers to execute arbitrary code by uploading a file with an executable extension via index.php, then accessing the uploaded file via a direct request to the file in pics/. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
CVE-2024-29019 | ESPHome vulnerable to Authentication bypass via Cross site request forgery | ESPHome is a system to control microcontrollers remotely through Home Automation systems. API endpoints in dashboard component of ESPHome version 2023.12.9 (command line installation) are vulnerable to Cross-Site Request Forgery (CSRF) allowing remote attackers to carry out attacks against a logged user of the dashboard to perform operations on configuration files (create, edit, delete). It is possible for a malicious actor to create a specifically crafted web page that triggers a cross site request against ESPHome, this allows bypassing the authentication for API calls on the platform. This vulnerability allows bypassing authentication on API calls accessing configuration file operations on the behalf of a logged user. In order to trigger the vulnerability, the victim must visit a weaponized page. In addition to this, it is possible to chain this vulnerability with GHSA-9p43-hj5j-96h5/ CVE-2024-27287 to obtain a complete takeover of the user account. Version 2024.3.0 contains a patch for this issue.
| [
"cpe:2.3:a:esphome:esphome:-:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
CVE-2023-52782 | net/mlx5e: Track xmit submission to PTP WQ after populating metadata map | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Track xmit submission to PTP WQ after populating metadata map
Ensure the skb is available in metadata mapping to skbs before tracking the
metadata index for detecting undelivered CQEs. If the metadata index is put
in the tracking list before putting the skb in the map, the metadata index
might be used for detecting undelivered CQEs before the relevant skb is
available in the map, which can lead to a null-ptr-deref.
Log:
general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
CPU: 0 PID: 1243 Comm: kworker/0:2 Not tainted 6.6.0-rc4+ #108
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
Workqueue: events mlx5e_rx_dim_work [mlx5_core]
RIP: 0010:mlx5e_ptp_napi_poll+0x9a4/0x2290 [mlx5_core]
Code: 8c 24 38 cc ff ff 4c 8d 3c c1 4c 89 f9 48 c1 e9 03 42 80 3c 31 00 0f 85 97 0f 00 00 4d 8b 3f 49 8d 7f 28 48 89 f9 48 c1 e9 03 <42> 80 3c 31 00 0f 85 8b 0f 00 00 49 8b 47 28 48 85 c0 0f 84 05 07
RSP: 0018:ffff8884d3c09c88 EFLAGS: 00010206
RAX: 0000000000000069 RBX: ffff8881160349d8 RCX: 0000000000000005
RDX: ffffed10218f48cf RSI: 0000000000000004 RDI: 0000000000000028
RBP: ffff888122707700 R08: 0000000000000001 R09: ffffed109a781383
R10: 0000000000000003 R11: 0000000000000003 R12: ffff88810c7a7a40
R13: ffff888122707700 R14: dffffc0000000000 R15: 0000000000000000
FS: 0000000000000000(0000) GS:ffff8884d3c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4f878dd6e0 CR3: 000000014d108002 CR4: 0000000000370eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<IRQ>
? die_addr+0x3c/0xa0
? exc_general_protection+0x144/0x210
? asm_exc_general_protection+0x22/0x30
? mlx5e_ptp_napi_poll+0x9a4/0x2290 [mlx5_core]
? mlx5e_ptp_napi_poll+0x8f6/0x2290 [mlx5_core]
__napi_poll.constprop.0+0xa4/0x580
net_rx_action+0x460/0xb80
? _raw_spin_unlock_irqrestore+0x32/0x60
? __napi_poll.constprop.0+0x580/0x580
? tasklet_action_common.isra.0+0x2ef/0x760
__do_softirq+0x26c/0x827
irq_exit_rcu+0xc2/0x100
common_interrupt+0x7f/0xa0
</IRQ>
<TASK>
asm_common_interrupt+0x22/0x40
RIP: 0010:__kmem_cache_alloc_node+0xb/0x330
Code: 41 5d 41 5e 41 5f c3 8b 44 24 14 8b 4c 24 10 09 c8 eb d5 e8 b7 43 ca 01 0f 1f 80 00 00 00 00 0f 1f 44 00 00 55 48 89 e5 41 57 <41> 56 41 89 d6 41 55 41 89 f5 41 54 49 89 fc 53 48 83 e4 f0 48 83
RSP: 0018:ffff88812c4079c0 EFLAGS: 00000246
RAX: 1ffffffff083c7fe RBX: ffff888100042dc0 RCX: 0000000000000218
RDX: 00000000ffffffff RSI: 0000000000000dc0 RDI: ffff888100042dc0
RBP: ffff88812c4079c8 R08: ffffffffa0289f96 R09: ffffed1025880ea9
R10: ffff888138839f80 R11: 0000000000000002 R12: 0000000000000dc0
R13: 0000000000000100 R14: 000000000000008c R15: ffff8881271fc450
? cmd_exec+0x796/0x2200 [mlx5_core]
kmalloc_trace+0x26/0xc0
cmd_exec+0x796/0x2200 [mlx5_core]
mlx5_cmd_do+0x22/0xc0 [mlx5_core]
mlx5_cmd_exec+0x17/0x30 [mlx5_core]
mlx5_core_modify_cq_moderation+0x139/0x1b0 [mlx5_core]
? mlx5_add_cq_to_tasklet+0x280/0x280 [mlx5_core]
? lockdep_set_lock_cmp_fn+0x190/0x190
? process_one_work+0x659/0x1220
mlx5e_rx_dim_work+0x9d/0x100 [mlx5_core]
process_one_work+0x730/0x1220
? lockdep_hardirqs_on_prepare+0x400/0x400
? max_active_store+0xf0/0xf0
? assign_work+0x168/0x240
worker_thread+0x70f/0x12d0
? __kthread_parkme+0xd1/0x1d0
? process_one_work+0x1220/0x1220
kthread+0x2d9/0x3b0
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x2d/0x70
? kthread_complete_and_exit+0x20/0x20
ret_from_fork_as
---truncated--- | [] | null | 5.5 | null | null |
GHSA-5cr4-4crm-rrp5 | Panasonic FPWIN Pro, all Versions 7.5.1.1 and prior, allows an attacker to craft a project file specifying a URI that causes the XML parser to access the URI and embed the contents, which may allow the attacker to disclose information that is accessible in the context of the user executing software. | [] | null | null | null | null |
|
GHSA-7rqq-78qv-fwr8 | A vulnerability was found in Ruijie RG-BCR860 2.5.13 and classified as critical. This issue affects some unknown processing of the component Network Diagnostic Page. The manipulation leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232547. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | null | 4.7 | null |
|
CVE-2020-7311 | Privilege Escalation vulnerability in MA for Windows | Privilege Escalation vulnerability in the installer in McAfee Agent (MA) for Windows prior to 5.6.6 allows local users to assume SYSTEM rights during the installation of MA via manipulation of log files. | [
"cpe:2.3:a:mcafee:mcafee_agent:*:*:*:*:*:windows:*:*"
] | null | 7.8 | null | null |
GHSA-74xm-qj29-cq8p | In github.com/pion/webrtc, failed DTLS certificate verification doesn't stop data channel communication | ImpactData channel communication was incorrectly allowed with users who have failed DTLS certificate verification.This attack requiresAttacker knows the ICE password.Only take place during PeerConnection handshake.This attack can be detected by monitoring `PeerConnectionState` in all versions of Pion WebRTC.PatchesUsers should upgrade to v3.0.15.The exact patch is https://github.com/pion/webrtc/commit/545613dcdeb5dedb01cce94175f40bcbe045df2eWorkaroundsUsers should listen for when `PeerConnectionState` changes to `PeerConnectionStateFailed`. When it enters this state users should not continue using the PeerConnection.For more informationIf you have any questions or comments about this advisory:Open an issue in https://github.com/pion/webrtcEmail us at [[email protected]](mailto:[email protected])Thank you to https://github.com/Gaukas for discovering this. | [] | null | 5.3 | null | null |
CVE-2022-36461 | TOTOLINK A3700R V9.1.2u.6134_B20201202 was discovered to contain a command injection vulnerability via the hostName parameter in the function setOpModeCfg. | [
"cpe:2.3:o:totolink:a3700r_firmware:9.1.2u.6134_b20201202:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3700r:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
GHSA-75vm-7626-f557 | In the Linux kernel, the following vulnerability has been resolved:libbpf: Handle size overflow for ringbuf mmapThe maximum size of ringbuf is 2GB on x86-64 host, so 2 * max_entries
will overflow u32 when mapping producer page and data pages. Only
casting max_entries to size_t is not enough, because for 32-bits
application on 64-bits kernel the size of read-only mmap region
also could overflow size_t.So fixing it by casting the size of read-only mmap region into a __u64
and checking whether or not there will be overflow during mmap. | [] | null | 7.8 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.