id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-10695 | Futurio Extra <= 2.0.13 - Authenticated (Contributor+) Post Disclosure | The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to. | [
"cpe:2.3:a:futuriowp:futurio_extra:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2008-1177 | SQL injection vulnerability in shop/detail.php in Affiliate Market (affmarket) 0.1 BETA allows remote attackers to execute arbitrary SQL commands via the id parameter. | [
"cpe:2.3:a:affiliate_market:affiliate_market:0.1_beta:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2vrf-hg2g-ppc5 | An issue was discovered in certain Apple products. macOS before 10.12.1 is affected. The issue involves the "ImageIO" component. It allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) via a crafted PDF file. | [] | null | null | 7.8 | null |
|
CVE-2006-3461 | Heap-based buffer overflow in the PixarLog decoder in the TIFF library (libtiff) before 3.8.2 might allow context-dependent attackers to execute arbitrary code via unknown vectors. | [
"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-j5xw-gh42-g53c | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (pfe) of Juniper Networks Junos OS on MX Series allows a unauthenticated network-based attacker to cause an infinite loop, resulting in a Denial of Service (DoS).An attacker who sends malformed TCP traffic via an interface configured with PPPoE, causes an infinite loop on the respective PFE. This results in consuming all resources and a manual restart is needed to recover.This issue affects interfaces with PPPoE configured and tcp-mss enabled.This issue affects Juniper Networks Junos OSAll versions prior to 20.4R3-S7;21.1 version 21.1R1 and later versions;21.2 versions prior to 21.2R3-S6;21.3 versions prior to 21.3R3-S5;21.4 versions prior to 21.4R3-S3;22.1 versions prior to 22.1R3-S4;22.2 versions prior to 22.2R3;22.3 versions prior to 22.3R2-S2;22.4 versions prior to 22.4R2; | [] | null | 7.5 | null | null |
|
CVE-2009-4978 | Directory traversal vulnerability in down.php in MyBackup 1.4.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the filename parameter. | [
"cpe:2.3:a:tufat:mybackup:1.4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
ICSA-21-068-07 | Siemens TCP Stack of SIMATIC MV400 | The underlying TCP stack of the affected products does not correctly validate the sequence number for incoming TCP RST packages. An attacker could exploit this to terminate arbitrary TCP sessions. ISN generator is initialized with a constant value and has constant increments. An attacker could predict and hijack TCP sessions. | [] | null | 7.5 | null | null |
CVE-2010-1903 | Microsoft Office Word 2002 SP3 and 2003 SP3, and Office Word Viewer, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a malformed record in a Word file, aka "Word HTML Linked Objects Memory Corruption Vulnerability." | [
"cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
RHSA-2023:3614 | Red Hat Security Advisory: OpenShift Container Platform 4.13.4 bug fix and security update | golang.org/x/net/http2: avoid quadratic complexity in HPACK decoding | [
"cpe:/a:redhat:openshift:4.13::el8",
"cpe:/a:redhat:openshift:4.13::el9"
] | null | 7.5 | null | null |
CVE-2015-4331 | Cisco Prime Infrastructure (PI) 1.4(0.45) and earlier, when AAA authentication is used, allows remote authenticated users to bypass intended access restrictions via a username with a modified composition of lowercase and uppercase characters, aka Bug ID CSum59958. | [
"cpe:2.3:a:cisco:prime_infrastructure:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2017-3225 | Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector that may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data | Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow an attacker to decrypt the data. Das U-Boot's AES-CBC encryption feature uses a zero (0) initialization vector. This allows an attacker to perform dictionary attacks on encrypted data produced by Das U-Boot to learn information about the encrypted data. | [
"cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*"
] | null | null | 4.6 | 2.1 |
GHSA-9cvx-cr48-6ghq | The X-Frame-Options header in Rockwell Automation MicroLogix 1100/1400 Versions 21.007 and prior is not configured in the HTTP response, which could allow clickjacking attacks. | [] | null | 6.5 | null | null |
|
GHSA-34vg-2vxp-rvgw | Cross-Site Request Forgery (CSRF) vulnerability in 10up ElasticPress.This issue affects ElasticPress: from n/a through 5.1.0. | [] | null | 4.3 | null | null |
|
GHSA-7774-p5v6-hf2q | The TaxoPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Suggest Terms Title field in versions up to, and including, 3.6.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Editor+ permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.5 | null | null |
|
CVE-2022-28582 | It is found that there is a command injection vulnerability in the setWiFiSignalCfg interface in TOTOlink A7100RU (v7.4cu.2313_b20191024) router, which allows an attacker to execute arbitrary commands through a carefully constructed payload. | [
"cpe:2.3:o:totolink:a7100ru_firmware:7.4cu.2313_b20191024:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a7100ru:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-8mg7-32mm-38xq | Web Access in Lotus Domino 6.5.1 allows remote attackers to cause a denial of service (server crash) via a large e-mail message, as demonstrated using a large image attachment. | [] | null | null | null | null |
|
GHSA-hfrj-92vg-95r3 | Firefox Sage extension 1.3.8 and earlier allows remote attackers to execute arbitrary Javascript in the local context via an RSS feed with an img tag containing the script followed by an extra trailing ">", which Sage modifies to close the img element before the malicious script. | [] | null | null | null | null |
|
CVE-2020-13658 | In Lansweeper 8.0.130.17, the web console is vulnerable to a CSRF attack that would allow a low-level Lansweeper user to elevate their privileges within the application. | [
"cpe:2.3:a:lansweeper:lansweeper:8.0.130.17:*:*:*:*:*:*:*"
] | null | 8 | null | 6 |
|
GHSA-mr55-pxwp-33rp | Multiple code execution vulnerabilities exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. A specially crafted malformed file can lead to an out-of-bounds read and type confusion, which could lead to code execution. An attacker can provide malicious input to trigger any of these vulnerabilities. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser<EW>::read_vertex() vh->sfaces_last(). | [] | null | 8.8 | null | null |
|
GHSA-45jj-f42x-jm68 | HAProxy before 1.9.7 mishandles a reload with rotated keys, which triggers use of uninitialized, and very predictable, HMAC keys. This is related to an include/types/ssl_sock.h error. | [] | null | 5.9 | null | null |
|
CVE-2018-7219 | application/admin/controller/Admin.php in NoneCms 1.3.0 has CSRF, as demonstrated by changing an admin password or adding an account via a public/index.php/admin/admin/edit.html request. | [
"cpe:2.3:a:5none:nonecms:1.3.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
CVE-2024-54330 | WordPress Hurrakify plugin <= 2.4 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in Hep Hep Hurra (HHH) Hurrakify allows Server Side Request Forgery.This issue affects Hurrakify: from n/a through 2.4. | [] | null | 7.2 | null | null |
CVE-2023-30570 | pluto in Libreswan before 4.11 allows a denial of service (responder SPI mishandling and daemon crash) via unauthenticated IKEv1 Aggressive Mode packets. The earliest affected version is 3.28. | [
"cpe:2.3:a:libreswan:libreswan:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-fcw9-f4mv-hhcg | Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 8.0.6 - 8.0.9. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Analytical Applications Infrastructure. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Analytical Applications Infrastructure accessible data as well as unauthorized read access to a subset of Oracle Financial Services Analytical Applications Infrastructure accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N). | [] | null | null | null | null |
|
GHSA-m528-9cvr-fx99 | Double memory free while closing TEE SE API Session management in Snapdragon Mobile in version SD 425, SD 430, SD 450, SD 625, SD 650/52, SD 820. | [] | null | null | 7.8 | null |
|
CVE-2019-0610 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0640, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655. | [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
GHSA-vpwc-qjh8-q22p | A Null Pointer Dereference vulnerability exists in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.34, in scan_unit_for_symbols, as demonstrated in addr2line, that can cause a denial of service via a crafted file. | [] | null | 5.5 | null | null |
|
RHSA-2016:0514 | Red Hat Security Advisory: java-1.8.0-openjdk security update | OpenJDK: missing type safety checks for MethodHandle calls across class loaders, incorrect CVE-2013-5838 fix (Hotspot, 8151666) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2023-39745 | TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request. | [
"cpe:2.3:h:tp-link:tl-wr941nd_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd:v5:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr940n_v2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr940n_v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr941nd_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr941nd_v5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:tp-link:tl-wr841n_v8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-wr841n_v8:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2024-27198 | In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2006-5574 | Unspecified vulnerability in the Brazilian Portuguese Grammar Checker in Microsoft Office 2003 and the Multilingual Interface for Office 2003, Project 2003, and Visio 2003 allows user-assisted remote attackers to execute arbitrary code via crafted text that is not properly parsed. | [
"cpe:2.3:a:microsoft:office:2003:sp2:*:pt:*:*:*:*",
"cpe:2.3:a:microsoft:office_multilingual_user_interface_pack:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_proofing_tools:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project_multilingual_user_interface_pack:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2003:sp2:multilingual_user_interface_pack:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2015-5111 | Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-4448, CVE-2015-5095, CVE-2015-5099, CVE-2015-5101, CVE-2015-5113, and CVE-2015-5114. | [
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-47347 | WordPress Chartify plugin <= 2.7.6 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Chart Builder Team Chartify allows Reflected XSS.This issue affects Chartify: from n/a through 2.7.6. | [] | null | 7.1 | null | null |
CVE-2016-0693 | Unspecified vulnerability in Oracle Sun Solaris 10 and 11.3 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to the PAM LDAP module. | [
"cpe:2.3:o:oracle:solaris:10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2024-11381 | Control horas <= 1.0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting | The Control horas plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ch_registro' shortcode in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
ICSA-21-056-03 | Rockwell Automation Logix Controllers (Update A) | Studio 5000 Logix Designer uses a key to verify Logix controllers are communicating with the affected Rockwell Automation products. The product is vulnerable because an unauthenticated attacker could bypass this verification mechanism and authenticate with Logix controllers.CVE-2021-22681 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). | [] | null | null | 10 | null |
CVE-2021-22753 | A CWE-125: Out-of-bounds read vulnerability exists inIGSS Definition (Def.exe) V15.0.0.21140 and prior that could result in loss of data or remote code execution due to missing length checks, when a malicious WSP file is being parsed by IGSS Definition. | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | 6.8 |
|
GHSA-qhc4-w742-6vxx | Cross-site scripting (XSS) vulnerability in pmlite.php in XOOPS 2.3.1 and 2.3.2a allows remote attackers to inject arbitrary web script or HTML via a STYLE attribute in a URL BBcode tag in a private message. | [] | null | null | null | null |
|
GHSA-9c96-4prf-rxpm | Audio in Apple OS X before 10.11.6 allows local users to obtain sensitive kernel memory-layout information or cause a denial of service (out-of-bounds read) via unspecified vectors. | [] | null | null | 5.5 | null |
|
GHSA-xv5f-2997-qhrq | Craft CMS XSS Vulnerability | Craft CMS before 2.6.2974 allows XSS attacks. | [] | null | null | 6.1 | null |
GHSA-jc6w-8r7f-vmp5 | An issue was discovered in Mattermost Server before 4.5.0, 4.4.5, 4.3.4, and 4.2.2. It allows attackers to cause a denial of service (application crash) via an @ character before a JavaScript field name. | [] | null | null | null | null |
|
RHSA-2020:2522 | Red Hat Security Advisory: kernel security and bug fix update | kernel: double free may be caused by the function allocate_trace_buffer in the file kernel/trace/trace.c kernel: denial of service via ioctl call in network tun handling kernel: usb: missing size check in the __usb_get_extra_descriptor() leading to DoS kernel: perf_event_open() and execve() race in setuid programs allows a data leak kernel: brcmfmac frame validation bypass Kernel: net: using kernel space address bits to derive IP ID may potentially break KASLR kernel: unchecked kstrdup of fwstr in drm_load_edid_firmware leads to denial of service kernel: use-after-free in arch/x86/lib/insn-eval.c kernel: integer overflow and OOB read in drivers/block/floppy.c kernel: memory leak in register_queue_kobjects() in net/core/net-sysfs.c leads to denial of service kernel: use-after-free in __blk_add_trace in kernel/trace/blktrace.c Kernel: NetLabel: null pointer dereference while receiving CIPSO packet with null category may cause kernel panic | [
"cpe:/o:redhat:rhel_eus:7.7::computenode",
"cpe:/o:redhat:rhel_eus:7.7::server"
] | null | 5.9 | 5.5 | null |
GHSA-xx8f-qf9f-5fgw | Remote code execution in zendframework and laminas-http | Laminas Project laminas-http before 2.14.2, and Zend Framework 3.0.0, has a deserialization vulnerability that can lead to remote code execution if the content is controllable, related to the __destruct method of the Zend\Http\Response\Stream class in Stream.php. NOTE: Zend Framework is no longer supported by the maintainer. NOTE: the laminas-http vendor considers this a "vulnerability in the PHP language itself" but has added certain type checking as a way to prevent exploitation in (unrecommended) use cases where attacker-supplied data can be deserialized. | [] | null | 9.8 | null | null |
GHSA-439f-fqrh-gmv2 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in National Keep Cyber Security Services CyberMath allows Stored XSS.This issue affects CyberMath: from v1.4 before v1.5. | [] | null | 5.4 | null | null |
|
GHSA-5jjp-qvmw-c36p | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to conduct phishing attacks by spoofing the address bar and other parts of the trust UI via unknown methods that allow "window content to persist" after the user has navigated to another site, aka the "Address Bar Spoofing Vulnerability." NOTE: this is a different vulnerability than CVE-2006-1626. | [] | null | null | null | null |
|
RHSA-2022:0146 | Red Hat Security Advisory: EAP XP 2 security update to CVE fixes in the EAP 7.3.x base | undertow: potential security issue in flow control over HTTP/2 may lead to DOS wildfly-elytron: possible timing attack in ScramServer wildfly: incorrect JBOSS_LOCAL_USER challenge location may lead to giving access to all the local users resteasy: Error message exposes endpoint class information jsoup: Crafted input may cause the jsoup HTML and XML parser to get stuck xml-security: XPath Transform abuse allows for information disclosure | [
"cpe:/a:redhat:jbosseapxp"
] | null | 7.5 | null | null |
GHSA-7qxc-h259-mgcx | In Jiangmin Antivirus 16.0.0.100, the driver file (KrnlCall.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x99008020. | [] | null | null | 7.8 | null |
|
CVE-2023-23535 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4, macOS Big Sur 11.7.5, iOS 15.7.4 and iPadOS 15.7.4, macOS Monterey 12.6.6, tvOS 16.4, watchOS 9.4. Processing a maliciously crafted image may result in disclosure of process memory. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2021-47479 | staging: rtl8712: fix use-after-free in rtl8712_dl_fw | In the Linux kernel, the following vulnerability has been resolved:
staging: rtl8712: fix use-after-free in rtl8712_dl_fw
Syzbot reported use-after-free in rtl8712_dl_fw(). The problem was in
race condition between r871xu_dev_remove() ->ndo_open() callback.
It's easy to see from crash log, that driver accesses released firmware
in ->ndo_open() callback. It may happen, since driver was releasing
firmware _before_ unregistering netdev. Fix it by moving
unregister_netdev() before cleaning up resources.
Call Trace:
...
rtl871x_open_fw drivers/staging/rtl8712/hal_init.c:83 [inline]
rtl8712_dl_fw+0xd95/0xe10 drivers/staging/rtl8712/hal_init.c:170
rtl8712_hal_init drivers/staging/rtl8712/hal_init.c:330 [inline]
rtl871x_hal_init+0xae/0x180 drivers/staging/rtl8712/hal_init.c:394
netdev_open+0xe6/0x6c0 drivers/staging/rtl8712/os_intfs.c:380
__dev_open+0x2bc/0x4d0 net/core/dev.c:1484
Freed by task 1306:
...
release_firmware+0x1b/0x30 drivers/base/firmware_loader/main.c:1053
r871xu_dev_remove+0xcc/0x2c0 drivers/staging/rtl8712/usb_intf.c:599
usb_unbind_interface+0x1d8/0x8d0 drivers/usb/core/driver.c:458 | [] | null | null | null | null |
CVE-2023-28684 | Jenkins remote-jobs-view-plugin Plugin 0.0.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [
"cpe:2.3:a:jenkins:remote-jobs-view:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | null |
|
GHSA-pm7j-3492-hq9m | The do_mremap function for the mremap system call in Linux 2.2 to 2.2.25, 2.4 to 2.4.24, and 2.6 to 2.6.2, does not properly check the return value from the do_munmap function when the maximum number of VMA descriptors is exceeded, which allows local users to gain root privileges, a different vulnerability than CAN-2003-0985. | [] | null | null | null | null |
|
CVE-2021-38731 | SEMCMS SHOP v 1.1 is vulnerable to SQL Injection via Ant_Zekou.php. | [
"cpe:2.3:a:sem-cms:semcms:1.1:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
RHSA-2020:2513 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.1 Security update | mojarra: Path traversal in ResourceManager.java:getLocalePrefix() via the loc parameter thrift: Endless loop when feed with specific input data thrift: Out-of-bounds read related to TJSONProtocol or TSimpleJSONProtocol jackson-mapper-asl: XML external entity similar to CVE-2016-3720 cxf: OpenId Connect token service does not properly validate the clientId wildfly: The 'enabled-protocols' value in legacy security is not respected if OpenSSL security provider is in use cxf: reflected XSS in the services listing page resteasy: Improper validation of response header in MediaTypeHeaderDelegate.java class Wildfly: EJBContext principal is not popped back after invoking another EJB using a different Security Domain SmallRye: SecuritySupport class is incorrectly public and contains a static method to access the current threads context class loader undertow: AJP File Read/Inclusion Vulnerability undertow: servletPath is normalized incorrectly leading to dangerous application mapping which could result in security bypass Mojarra: Path traversal via either the loc parameter or the con parameter, incomplete fix of CVE-2018-14371 cryptacular: excessive memory allocation during a decode operation jackson-databind: Lacks certain xbean-reflect/JNDI blocking jackson-databind: Serialization gadgets in shaded-hikari-config jackson-databind: Serialization gadgets in ibatis-sqlmap jackson-databind: Serialization gadgets in anteros-core RESTEasy: RESTEASY003870 exception in RESTEasy can lead to a reflected XSS attack undertow: Memory exhaustion issue in HttpReadListener via "Expect: 100-continue" header undertow: invalid HTTP request with large chunk size | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 6.5 | 8.1 | null |
GHSA-v589-jqpw-96mw | Akuvox E11 contains a function that encrypts messages which are then forwarded. The IV vector and the key are static, and this may allow an attacker to decrypt messages. | [] | null | 7.5 | null | null |
|
CVE-2011-2883 | The NSEPA.NsepaCtrl.1 ActiveX control in nsepa.ocx in Citrix Access Gateway Enterprise Edition 8.1 before 8.1-67.7, 9.0 before 9.0-70.5, and 9.1 before 9.1-96.4 attempts to validate signed DLLs by checking the certificate subject, not the signature, which allows man-in-the-middle attackers to execute arbitrary code via HTTP header data referencing a DLL that was signed with a crafted certificate. | [
"cpe:2.3:a:citrix:access_gateway:8.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:citrix:access_gateway:9.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:citrix:access_gateway:9.1:*:enterprise:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-19912 | In Intland codeBeamer ALM 9.5 and earlier, a cross-site scripting (XSS) vulnerability in the Upload Flash File feature allows authenticated remote attackers to inject arbitrary scripts via an active script embedded in an SWF file. | [
"cpe:2.3:a:intland:codebeamer:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
GHSA-7wwv-vh3v-89cq | ReDOS vulnerabities: multiple grammars | Impact: Potential ReDOS vulnerabilities (exponential and polynomial RegEx backtracking)[oswasp](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS):The Regular expression Denial of Service (ReDoS) is a Denial of Service attack, that exploits the fact that most Regular Expression implementations may reach extreme situations that cause them to work very slowly (exponentially related to input size). An attacker can then cause a program using a Regular Expression to enter these extreme situations and then hang for a very long time.If are you are using Highlight.js to highlight user-provided data you are possibly vulnerable. On the client-side (in a browser or Electron environment) risks could include lengthy freezes or crashes... On the server-side infinite freezes could occur... effectively preventing users from accessing your app or service (ie, Denial of Service).This is an issue with grammars shipped with the parser (and potentially 3rd party grammars also), not the parser itself. If you are using Highlight.js with any of the following grammars you are vulnerable. If you are using `highlightAuto` to detect the language (and have any of these grammars registered) you are vulnerable. Exponential grammars (C, Perl, JavaScript) are auto-registered when using the common grammar subset/library `require('highlight.js/lib/common')` as of 10.4.0 - see https://cdn.jsdelivr.net/gh/highlightjs/[email protected]/build/highlight.jsAll versions prior to 10.4.1 are vulnerable, including version 9.18.5.**Grammars with exponential backtracking issues:**c-like (c, cpp, arduino)handlebars (htmlbars)gamsperljboss-clirerlang-replpowershellrouteroslivescript (10.4.0 and 9.18.5 included this fix)javascript & typescript (10.4.0 included partial fixes)And of course any aliases of those languages have the same issue. ie: `hpp` is no safer than `cpp`.**Grammars with polynomial backtracking issues:**kotlingcodedaspectjmoonscriptcoffeescript/livescriptcsharpscilabcrystalelixirbasicebnfrubyfortran/irpf90livecodeserveryamlx86asmdsconfigmarkdownruleslanguagexquerysqfAnd again: any aliases of those languages have the same issue. ie: `ruby` and `rb` share the same ruby issues.PatchesVersion 10.4.1 resolves these vulnerabilities. Please upgrade.Workarounds / MitigationsDiscontinue use the affected grammars. (or perhaps use only those with poly vs exponential issues)Attempt cherry-picking the grammar fixes into older versions...Attempt using newer CDN versions of any affected languages. (ie using an older CDN version of the library with newer CDN grammars). Your mileage may vary.Referenceshttps://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoSFor more informationIf you have any questions or comments about this advisory:Open an issue: https://github.com/highlightjs/highlight.js/issuesEmail us at [[email protected]](mailto:[email protected]) | [] | null | null | null | null |
GHSA-46w7-8prr-7wv8 | SQL injection vulnerability in the HotBrackets Tournament Brackets (com_hotbrackets) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to index.php. | [] | null | null | null | null |
|
GHSA-x97f-34rv-cq75 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Marvell QConvergeConsole 5.5.0.64. Authentication is not required to exploit this vulnerability. The specific flaw exists within the getFileUploadBytes method of the FlashValidatorServiceImpl class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-10497. | [] | null | null | null | null |
|
GHSA-ch22-x2v3-v6vq | OTF-001: Improper Input Sanitation: The path parameter of the requested URL is not sanitized before being passed to the QT frontend | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). This is an issue from that penetration test.Vulnerability ID: OTF-001Vulnerability type: Improper Input SanitizationThreat level: ElevatedDescription:The `path` parameter of the requested URL is not sanitized before being passed to the QT frontend.Technical description:The `path` parameter is not sanitized before being passed to the constructor of the `QLabel`.https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/__init__.py#L499-L509https://github.com/onionshare/onionshare/blob/d08d5f0f32f755f504494d80794886f346fbafdb/desktop/src/onionshare/tab/mode/history.py#L456-L483https://doc.qt.io/qt-5/qlabel.html#detailsWarning: When passing a QString to the constructor or calling setText(), make sure to sanitize your input, as QLabel tries to guess whether it displays the text as plain text or as rich text, a subset of HTML 4 markup. You may want to call setTextFormat() explicitly, e.g. in case you expect the text to be in plain format but cannot control the text source (for instance when displaying data loaded from the Web).This path is used in all components for displaying the server access history. This leads to a rendered HTML4 Subset (QT RichText editor) in the Onionshare frontend.In the following example an adversary injects a crafted image file into an Onionshare instance with receive mode and renders it in the history component of the Onionshare application.The only requirement is another visit to the shared site with the following parameter attached to the path of the URL:This will be rendered as a green square in the history tab where the path value is supposed to be (the value itself is shown at the bottom of the page).Possible scenarios where this could lead to remote code execution would be a 0-day in libpng or other internal image rendering (OTF-014 (page 12)) of the QT framework.The QT documentation indicates that external files could be rendered, but we were unable to find a QT code path allowing for it.Impact:An adversary with knowledge of the Onion service address in public mode or with authentication in private mode can render arbitrary HTML (QT-HTML4 Subset) in the server desktop application. This requires the desktop application with rendered history, therefore the impact is only elevated.Recommendation:Manually define the text format of the QLabel via `setTextFormat()` | [] | 6.3 | 8.7 | null | null |
GHSA-xcr6-53hx-vmwq | HUAWEI P30 smartphones with versions earlier than 10.1.0.160(C00E160R2P11) have a denial of service vulnerability. A module does not deal with mal-crafted messages and it leads to memory leak. Attackers can exploit this vulnerability to make the device denial of service.Affected product versions include: HUAWEI P30 versions Versions earlier than 10.1.0.160(C00E160R2P11). | [] | null | null | null | null |
|
RHSA-2023:1791 | Red Hat Security Advisory: firefox security update | Mozilla: Memory Corruption in Safe Browsing Code Mozilla: libwebp: Double-free in libwebp Mozilla: Fullscreen notification obscured Mozilla: Potential Memory Corruption following Garbage Collector compaction Mozilla: Invalid free from JavaScript code Mozilla: Content-Disposition filename truncation leads to Reflected File Download Mozilla: Files with malicious extensions could have been downloaded unsafely on Linux Mozilla: Incorrect optimization result on ARM64 Mozilla: Memory safety bugs fixed in Firefox 112 and Firefox ESR 102.10 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | null | null |
CVE-2006-1705 | Oracle Database 9.2.0.0 to 10.2.0.3 allows local users with "SELECT" privileges for a base table to insert, update, or delete data by creating a crafted view then performing the operations on that view. | [
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:enterprise_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:enterprise_10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:personal_10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle10g:standard_10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:enterprise_9.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:personal_9.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:oracle9i:standard_9.2.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
RHSA-2020:4766 | Red Hat Security Advisory: libexif security, bug fix, and enhancement update | libexif: out of bounds write in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_data_save_data_entry function in exif-data.c libexif: integer overflow in exif_data_load_data_thumbnail function in exif-data.c libexif: out of bounds read due to a missing bounds check in exif_entry_get_value function in exif-entry.c libexif: integer overflow in exif_data_load_data_content function in exif-data.c libexif: divide-by-zero in exif_entry_get_value function in exif-entry.c libexif: use of uninitialized memory in EXIF Makernote handling can lead to crashes and use-after-free libexif: unrestricted size in handling Canon EXIF MakerNote data can lead to consumption of large amounts of compute time | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 7.5 | null | null |
GHSA-q5x7-3hhh-4gg3 | Vulnerability in the Sun ZFS Storage Appliance Kit (AK) component of Oracle Sun Systems Products Suite (subcomponent: IPC Frameworks). The supported version that is affected is AK 2013. Easily "exploitable" vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Sun ZFS Storage Appliance Kit (AK). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Sun ZFS Storage Appliance Kit (AK). CVSS 3.0 Base Score 7.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 7.5 | null |
|
GHSA-m2qq-52hm-x335 | Adobe Acrobat and Reader versions 2019.010.20064 and earlier, 2019.010.20064 and earlier, 2017.011.30110 and earlier version, and 2015.006.30461 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 8.8 | null |
|
RHSA-2020:2849 | Red Hat Security Advisory: nodejs:10 security update | nodejs-minimist: prototype pollution allows adding or modifying properties of Object.prototype using a constructor or __proto__ payload nodejs: memory corruption in napi_get_value_string_* functions nghttp2: overly large SETTINGS frames can lead to DoS | [
"cpe:/a:redhat:rhel_eus:8.1::appstream"
] | null | 7.5 | null | null |
CVE-2006-3241 | Cross-site scripting (XSS) vulnerability in messages.php in XennoBB 1.0.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the tid parameter. | [
"cpe:2.3:a:xennobb:xennobb:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xennobb:xennobb:1.0.5:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
GHSA-4jf5-prwh-5c2c | The IMAP Client for Outlook Express 6.00.2800.1106 allows remote malicious IMAP servers to cause a denial of service (crash) via certain large literal size values that cause either integer signedness errors or integer overflow errors. | [] | null | null | null | null |
|
GHSA-fqw7-8v6m-2f86 | Malicious Package in hulp | All versions of `hulp` contain malicious code as a preinstall script. When installed, the package calls home to a Command and Control server to execute arbitrary commands.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it. | [] | null | 9.8 | null | null |
GHSA-j72j-hjpx-v29v | ProjectSend before r1070 writes user passwords to the server logs. | [] | null | null | 7.5 | null |
|
RHSA-2007:0845 | Red Hat Security Advisory: libvorbis security update | libvorbis array boundary condition Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) Multiple libvorbis flaws (CVE-2007-4066, CVE-2007-4029) | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
GHSA-gg58-4q4g-xvcw | Use after free in Visuals in Google Chrome prior to 124.0.6367.201 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | [] | null | 9.6 | null | null |
|
CVE-2016-3698 | libndp before 1.6, as used in NetworkManager, does not properly validate the origin of Neighbor Discovery Protocol (NDP) messages, which allows remote attackers to conduct man-in-the-middle attacks or cause a denial of service (network connectivity disruption) by advertising a node as a router from a non-local network. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:libndp:libndp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
] | null | null | 8.1 | 6.8 |
|
CVE-2014-3696 | nmevent.c in the Novell GroupWise protocol plugin in libpurple in Pidgin before 2.10.10 allows remote servers to cause a denial of service (application crash) via a crafted server message that triggers a large memory allocation. | [
"cpe:2.3:a:pidgin:pidgin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:pidgin:pidgin:2.10.8:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-62hp-f6g9-xj9v | Buffer overflow in the data reference atom handling in Apple QuickTime before 7.4.5 allows remote attackers to execute arbitrary code via a crafted movie. | [] | null | null | null | null |
|
RHSA-2024:6785 | Red Hat Security Advisory: ruby:3.3 security update | rexml: DoS vulnerability in REXML rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 5.9 | null | null |
CVE-2023-5807 | SQLi in TRtek Software's Education Portal | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TRtek Software Education Portal allows SQL Injection.This issue affects Education Portal: before 3.2023.29.
| [
"cpe:2.3:a:trek_software:education_portal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:trteksolutions:education_portal:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
CVE-2016-0315 | The Report Builder and Data Collection Component (DCC) in IBM Jazz Reporting Service (JRS) 5.x before 5.0.2 ifix016 and 6.x before 6.0.1 ifix005 maintain session ID validity after a logout action, which allows remote authenticated users to hijack sessions by leveraging an unattended workstation. | [
"cpe:2.3:a:ibm:jazz_reporting_service:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:jazz_reporting_service:6.0.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
GHSA-c34f-6cmx-fcvv | A flaw was found in xorg-x11-server before 1.20.3. An incorrect permission check for -modulepath and -logfile options when starting Xorg. X server allows unprivileged users with the ability to log in to the system via physical console to escalate their privileges and run arbitrary code under root privileges. | [] | null | null | 6.6 | null |
|
GHSA-6968-rgpc-wprc | Vulnerability in the Oracle Enterprise Repository component of Oracle Fusion Middleware (subcomponent: Web Interface). Supported versions that are affected are 11.1.1.7.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Repository. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Repository, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Repository accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Repository accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | [] | null | null | 8.2 | null |
|
GHSA-2cww-fgmg-4jqc | Keycloak's admin API allows low privilege users to use administrative functions | Users with low privileges (just plain users in the realm) are able to utilize administrative functionalities within Keycloak admin interface. This issue presents a significant security risk as it allows unauthorized users to perform actions reserved for administrators, potentially leading to data breaches or system compromise.**Acknowledgements:**
Special thanks to Maurizio Agazzini for reporting this issue and helping us improve our project. | [] | null | 8.1 | null | null |
GHSA-q6wf-wh6m-ch8f | PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement. | [] | null | null | null | null |
|
GHSA-8fg7-332r-767g | SQL injection vulnerability in the download module in Free Simple Software 1.0 allows remote attackers to execute arbitrary SQL commands via the downloads_id parameter in a download_now action to index.php. | [] | null | null | null | null |
|
GHSA-5m6g-j9qj-3jwh | The Runtastic Road Bike (aka com.runtastic.android.roadbike.lite) application 2.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
CVE-2019-3496 | An issue was discovered on Wifi-soft UniBox controller 3.x devices. The tools/controller/diagnostic_tools_controller Diagnostic Tools Controller is vulnerable to Remote Command Execution, allowing an attacker to execute arbitrary system commands on the server with root user privileges. Authentication for accessing this component can be bypassed by using Hard coded credentials. | [
"cpe:2.3:o:indionetworks:unibox_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:indionetworks:unibox:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2017-5943 | Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 allows remote attackers to obtain sensitive information about cross-site request forgery (CSRF) verification tokens via a crafted URL. | [
"cpe:2.3:a:bestpractical:request_tracker:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bestpractical:request_tracker:4.4.1:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-6hmg-mqf6-m38g | RPi-Jukebox-RFID v2.7.0 was discovered to contain a remote code execution (RCE) vulnerability via htdocs\manageFilesFolders.php | [] | null | 9.8 | null | null |
|
CVE-2022-38208 | Unvalidated redirect in Portal for ArcGIS | There is an unvalidated redirect vulnerability in Esri Portal for ArcGIS 11 and below that may allow a remote, unauthenticated attacker to craft a URL that could redirect a victim to an arbitrary website, simplifying phishing attacks. | [
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-7f6c-vw35-vwgh | Missing Authorization vulnerability in Metagauss EventPrime.This issue affects EventPrime: from n/a through 3.3.4. | [] | null | 8.2 | null | null |
|
GHSA-52rx-xv44-hxmv | Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable. | [] | null | null | null | null |
|
CVE-2017-0825 | An information disclosure vulnerability in the Broadcom wifi driver. Product: Android. Versions: Android kernel. Android ID: A-37305633. References: B-V2017063002. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-jvv3-c5fw-96v6 | Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7 up to 0.9.7l, and 0.9.8 up to 0.9.8f, might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738. As of 20071012, it is unknown whether code execution is possible. | [] | null | null | null | null |
|
GHSA-4w9j-m79h-8w8m | An Improper Validation of Array Index vulnerability in the SIP ALG of Juniper Networks Junos OS on SRX 5000 Series allows a network-based, unauthenticated attacker to cause a Denial of Service (DoS). When an attacker sends an SIP packets with a malformed SDP field then the SIP ALG can not process it which will lead to an FPC crash and restart. Continued receipt of these specific packets will lead to a sustained Denial of Service. This issue can only occur when both below mentioned conditions are fulfilled: 1. Call distribution needs to be enabled: [security alg sip enable-call-distribution] 2. The SIP ALG needs to be enabled, either implicitly / by default or by way of configuration. To confirm whether SIP ALG is enabled on SRX, and MX with SPC3 use the following command: user@host> show security alg status | match sip SIP : Enabled This issue affects Juniper Networks Junos OS on SRX 5000 Series: 20.4 versions prior to 20.4R3-S5; 21.1 versions prior to 21.1R3-S4; 21.2 versions prior to 21.2R3-S3; 21.3 versions prior to 21.3R3-S3; 21.4 versions prior to 21.4R3-S2; 22.1 versions prior to 22.1R2-S2, 22.1R3; 22.2 versions prior to 22.2R3; 22.3 versions prior to 22.3R1-S1, 22.3R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.4R1. | [] | null | 7.5 | null | null |
|
GHSA-pvm3-6x23-6xwp | A reflected cross-site scripting (XSS) vulnerability exists in the iHistorian Data Display of WorkstationST (<v07.09.15) could allow an attacker to compromise a victim's browser. WorkstationST is only deployed in specific, controlled environments rendering attack complexity significantly higher than if the attack were conducted on the software in isolation. WorkstationST v07.09.15 can be found in ControlST v07.09.07 SP8 and greater. | [] | null | 6.1 | null | null |
|
GHSA-g4j9-xc4c-6pmc | Buffer overflow vulnerability in framework/init.php in qinggan phpok 5.1, allows attackers to execute arbitrary code. | [] | null | null | null | null |
|
GHSA-95ch-55fh-vxfc | Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14729. | [] | null | null | 7.8 | null |
|
CVE-2003-0044 | Multiple cross-site scripting (XSS) vulnerabilities in the (1) examples and (2) ROOT web applications for Jakarta Tomcat 3.x through 3.3.1a allow remote attackers to insert arbitrary web script or HTML. | [
"cpe:2.3:a:apache:tomcat:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-g7xf-8xh4-55vr | In llcp_util_parse_link_params of llcp_util.cc, there is a possible out-of-bound read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-114238578 | [] | null | null | 6.5 | null |
|
GHSA-5vgp-5qfx-p7gg | The Simple Pricing Tables For WPBakery Page Builder(Formerly Visual Composer) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wdo_simple_pricing_table_free' shortcode in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.