id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-2fp9-9cqm-x4p7
Cross-Site Request Forgery (CSRF) vulnerability in 10 Quality Post Gallery plugin <= 2.3.12 versions.
[]
null
4.3
null
null
GHSA-4fm7-m3w8-94f8
SQL injection vulnerability in e107chat.php in the eChat plugin 4.2 for e107, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the nick parameter.
[]
null
null
null
null
GHSA-ph56-qx6x-j8xv
tmux 1.3 and 1.4 does not properly drop group privileges, which allows local users to gain utmp group privileges via a filename to the -S command-line option.
[]
null
null
null
null
CVE-2015-0506
Unspecified vulnerability in Oracle MySQL Server 5.6.23 and earlier allows remote authenticated users to affect availability via unknown vectors related to InnoDB, a different vulnerability than CVE-2015-0508.
[ "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
null
null
3.5
CVE-2019-0945
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0946, CVE-2019-0947.
[ "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365:-:*:*:*:proplus:*:*:*" ]
null
null
7.8
9.3
CVE-2021-22494
An issue was discovered in the fingerprint scanner on Samsung Note20 mobile devices with Q(10.0) software. When a screen protector is used, the required image compensation is not present. Consequently, inversion can occur during fingerprint enrollment, and a high False Recognition Rate (FRR) can occur. The Samsung ID is SVE-2020-19216 (January 2021).
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:h:samsung:galaxy_note_20:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-8jf7-ggvh-m494
A vulnerability, which was classified as problematic, has been found in Lespeed WiseCleaner Wise System Monitor 1.5.3.54. This issue affects some unknown processing in the library WiseHDInfo64.dll of the component IoControlCode Handler. The manipulation leads to denial of service. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-223373 was assigned to this vulnerability.
[]
null
5.5
null
null
CVE-2007-1326
SQL injection vulnerability in index.php in Serendipity 1.1.1 allows remote attackers to execute arbitrary SQL commands via the serendipity[multiCat][] parameter.
[ "cpe:2.3:a:serendipity:serendipity:1.1.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-gqxh-p9pg-9g68
A vulnerability in the web framework of Cisco WebEx Meetings Server could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCve96608.
[]
null
null
6.1
null
CVE-2024-25940
bhyveload(8) host file access
`bhyveload -h <host-path>` may be used to grant loader access to the <host-path> directory tree on the host. Affected versions of bhyveload(8) do not make any attempt to restrict loader's access to <host-path>, allowing the loader to read any file the host user has access to. In the bhyveload(8) model, the host supplies a userboot.so to boot with, but the loader scripts generally come from the guest image. A maliciously crafted script could be used to exfiltrate sensitive data from the host accessible to the user running bhyhveload(8), which is often the system root.
[]
null
6.3
null
null
CVE-2021-31881
A vulnerability has been identified in Capital Embedded AR Classic 431-422 (All versions), Capital Embedded AR Classic R20-11 (All versions < V2303). When processing a DHCP OFFER message, the DHCP client application does not validate the length of the Vendor option(s), leading to Denial-of-Service conditions. (FSMD-2021-0008)
[ "cpe:2.3:a:siemens:capital_vstar:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:nucleus_net:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:nucleus_readystart_v3:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:nucleus_source_code:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:apogee_modular_building_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:apogee_modular_building_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:apogee_modular_equiment_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:apogee_modular_equiment_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:apogee_pxc_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:apogee_pxc_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:apogee_pxc_modular_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:apogee_pxc_modular:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:talon_tc_compact_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:talon_tc_compact:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:talon_tc_modular_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:talon_tc_modular:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
CVE-2013-1180
Buffer overflow in the SNMP implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(5) and 6.x before 6.1(1) and MDS 9000 devices 4.x and 5.x before 5.2(5) allows remote authenticated users to execute arbitrary code via a crafted SNMP request, aka Bug ID CSCtx54822.
[ "cpe:2.3:o:cisco:nx-os:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(0\\)n1\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(1a\\)n2\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.0\\(4\\)sv1\\(3d\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1\\(3\\)n2\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1.\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1.\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1.\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.1.\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)n2\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(1\\)sv1\\(5.1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:4.2.\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(2\\)n2\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n1\\(1c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(3\\)n2\\(2b\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.0\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(3\\)n1\\(1a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.1\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.2\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.0\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:6.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:mds_9000:*:*:*:*:*:*:*:*" ]
null
null
null
9
GHSA-rf88-vj2v-vj92
Lobby Track Desktop could allow a local attacker to gain elevated privileges on the system, caused by an error in the printer dialog. By visiting the kiosk and signing in as a visitor, an attacker could exploit this vulnerability using the command line to break out of kiosk mode.
[]
null
null
7.8
null
RHSA-2024:8338
Red Hat Security Advisory: NetworkManager-libreswan security update
NetworkManager-libreswan: Local privilege escalation via leftupdown
[ "cpe:/o:redhat:rhel_aus:7.7::server" ]
null
7.8
null
null
CVE-2007-4252
Absolute path traversal vulnerability in a certain ActiveX control in CkString.dll 1.1 and earlier in CHILKAT ASP String allows remote attackers to create or overwrite arbitrary files via a full pathname in the first argument to the SaveToFile method, a different vulnerability than CVE-2007-3633.
[ "cpe:2.3:a:chilkat_software:asp_string:1.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2020-0372
In ActivityManager, there is a possible access to protected data due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-119673147
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
5.5
null
2.1
RHSA-2019:1182
Red Hat Security Advisory: libvirt security update
hardware: Microarchitectural Store Buffer Data Sampling (MSBDS) hardware: Micro-architectural Load Port Data Sampling - Information Leak (MLPDS) hardware: Microarchitectural Fill Buffer Data Sampling (MFBDS) hardware: Microarchitectural Data Sampling Uncacheable Memory (MDSUM)
[ "cpe:/o:redhat:rhel_eus:7.5::computenode", "cpe:/o:redhat:rhel_eus:7.5::server" ]
null
null
3.8
null
RHSA-2011:1801
Red Hat Security Advisory: qemu-kvm security update
qemu: ccid: buffer overflow in handling of VSC_ATR message
[ "cpe:/o:redhat:enterprise_linux:6::server" ]
null
null
null
null
GHSA-2ghv-58hc-7529
aquaverde Aquarius CMS through 4.3.5 allows Information Exposure through Log Files because of an error in the Log-File writer component.
[]
null
null
7.5
null
CVE-2022-28471
In ffjpeg (commit hash: caade60), the function bmp_load() in bmp.c contains an integer overflow vulnerability, which eventually results in the heap overflow in jfif_encode() in jfif.c. This is due to the incomplete patch for issue 38
[ "cpe:2.3:a:rockcarry:ffjpeg:2021-12-06:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-24xg-93rh-whf7
Cross-Site Request Forgery (CSRF) vulnerability in icyleaf WS Audio Player allows Stored XSS. This issue affects WS Audio Player: from n/a through 1.1.8.
[]
null
7.1
null
null
GHSA-gq92-wxjv-qq7g
Affected versions of Atlassian Jira Server and Data Center allow remote attackers to achieve template injection via the Web Resources Manager. The affected versions are before version 8.8.1.
[]
null
9.8
null
null
CVE-2019-11204
TIBCO Spotfire Statistics Services Exposes Sensitive Files
The web interface component of TIBCO Software Inc.'s TIBCO Spotfire Statistics Services contains a vulnerability that might theoretically allow an authenticated user to access sensitive information needed by the Spotfire Statistics Services server. The sensitive information that might be affected includes database, JMX, LDAP, Windows service account, and user credentials. Affected releases are TIBCO Software Inc.'s TIBCO Spotfire Statistics Services: versions up to and including 7.11.1; 10.0.0.
[ "cpe:2.3:a:tibco:spotfire_statistics_services:*:*:*:*:*:*:*:*", "cpe:2.3:a:tibco:spotfire_statistics_services:10.0.0:*:*:*:*:*:*:*" ]
null
null
9.9
null
GHSA-3xqp-j7cf-5q64
Integer overflow in the hpsb_alloc_packet function (incorrectly reported as alloc_hpsb_packet) in IEEE 1394 (Firewire) driver 2.4 and 2.6 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via the functions (1) raw1394_write, (2) state_connected, (3) handle_remote_request, or (4) hpsb_make_writebpacket.
[]
null
null
null
null
RHSA-2020:4627
Red Hat Security Advisory: SDL security update
SDL: buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c SDL: heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c SDL: heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c SDL: heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c SDL: buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c SDL: heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c SDL: heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c SDL: heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c SDL: heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c SDL: heap-based buffer over-read in Map1toN in video/SDL_pixels.c
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
null
8.4
null
ICSA-17-117-01B
GE Multilin SR, UR, and URplus Protective Relays (Update B)
Cipher text versions of user passwords were created with a non-random initialization vector leaving them susceptible to dictionary attacks. Cipher text of user passwords can be obtained from the front LCD panel of affected products and through issued Modbus commands.CVE-2017-7905 has been assigned to this vulnerability. A CVSS v3 base score of 8.1 has been assigned; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
8.1
null
CVE-2024-50045
netfilter: br_netfilter: fix panic with metadata_dst skb
In the Linux kernel, the following vulnerability has been resolved: netfilter: br_netfilter: fix panic with metadata_dst skb Fix a kernel panic in the br_netfilter module when sending untagged traffic via a VxLAN device. This happens during the check for fragmentation in br_nf_dev_queue_xmit. It is dependent on: 1) the br_netfilter module being loaded; 2) net.bridge.bridge-nf-call-iptables set to 1; 3) a bridge with a VxLAN (single-vxlan-device) netdevice as a bridge port; 4) untagged frames with size higher than the VxLAN MTU forwarded/flooded When forwarding the untagged packet to the VxLAN bridge port, before the netfilter hooks are called, br_handle_egress_vlan_tunnel is called and changes the skb_dst to the tunnel dst. The tunnel_dst is a metadata type of dst, i.e., skb_valid_dst(skb) is false, and metadata->dst.dev is NULL. Then in the br_netfilter hooks, in br_nf_dev_queue_xmit, there's a check for frames that needs to be fragmented: frames with higher MTU than the VxLAN device end up calling br_nf_ip_fragment, which in turns call ip_skb_dst_mtu. The ip_dst_mtu tries to use the skb_dst(skb) as if it was a valid dst with valid dst->dev, thus the crash. This case was never supported in the first place, so drop the packet instead. PING 10.0.0.2 (10.0.0.2) from 0.0.0.0 h1-eth0: 2000(2028) bytes of data. [ 176.291791] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000110 [ 176.292101] Mem abort info: [ 176.292184] ESR = 0x0000000096000004 [ 176.292322] EC = 0x25: DABT (current EL), IL = 32 bits [ 176.292530] SET = 0, FnV = 0 [ 176.292709] EA = 0, S1PTW = 0 [ 176.292862] FSC = 0x04: level 0 translation fault [ 176.293013] Data abort info: [ 176.293104] ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 [ 176.293488] CM = 0, WnR = 0, TnD = 0, TagAccess = 0 [ 176.293787] GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0 [ 176.293995] user pgtable: 4k pages, 48-bit VAs, pgdp=0000000043ef5000 [ 176.294166] [0000000000000110] pgd=0000000000000000, p4d=0000000000000000 [ 176.294827] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP [ 176.295252] Modules linked in: vxlan ip6_udp_tunnel udp_tunnel veth br_netfilter bridge stp llc ipv6 crct10dif_ce [ 176.295923] CPU: 0 PID: 188 Comm: ping Not tainted 6.8.0-rc3-g5b3fbd61b9d1 #2 [ 176.296314] Hardware name: linux,dummy-virt (DT) [ 176.296535] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 176.296808] pc : br_nf_dev_queue_xmit+0x390/0x4ec [br_netfilter] [ 176.297382] lr : br_nf_dev_queue_xmit+0x2ac/0x4ec [br_netfilter] [ 176.297636] sp : ffff800080003630 [ 176.297743] x29: ffff800080003630 x28: 0000000000000008 x27: ffff6828c49ad9f8 [ 176.298093] x26: ffff6828c49ad000 x25: 0000000000000000 x24: 00000000000003e8 [ 176.298430] x23: 0000000000000000 x22: ffff6828c4960b40 x21: ffff6828c3b16d28 [ 176.298652] x20: ffff6828c3167048 x19: ffff6828c3b16d00 x18: 0000000000000014 [ 176.298926] x17: ffffb0476322f000 x16: ffffb7e164023730 x15: 0000000095744632 [ 176.299296] x14: ffff6828c3f1c880 x13: 0000000000000002 x12: ffffb7e137926a70 [ 176.299574] x11: 0000000000000001 x10: ffff6828c3f1c898 x9 : 0000000000000000 [ 176.300049] x8 : ffff6828c49bf070 x7 : 0008460f18d5f20e x6 : f20e0100bebafeca [ 176.300302] x5 : ffff6828c7f918fe x4 : ffff6828c49bf070 x3 : 0000000000000000 [ 176.300586] x2 : 0000000000000000 x1 : ffff6828c3c7ad00 x0 : ffff6828c7f918f0 [ 176.300889] Call trace: [ 176.301123] br_nf_dev_queue_xmit+0x390/0x4ec [br_netfilter] [ 176.301411] br_nf_post_routing+0x2a8/0x3e4 [br_netfilter] [ 176.301703] nf_hook_slow+0x48/0x124 [ 176.302060] br_forward_finish+0xc8/0xe8 [bridge] [ 176.302371] br_nf_hook_thresh+0x124/0x134 [br_netfilter] [ 176.302605] br_nf_forward_finish+0x118/0x22c [br_netfilter] [ 176.302824] br_nf_forward_ip.part.0+0x264/0x290 [br_netfilter] [ 176.303136] br_nf_forward+0x2b8/0x4e0 [br_netfilter] [ 176.303359] nf_hook_slow+0x48/0x124 [ 176.303 ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-wppc-2hf4-hh9j
A potential vulnerability in a dynamically loaded AMD driver in AMD VBIOS Flash Tool SDK may allow any authenticated user to escalate privileges to NT authority system.
[]
null
null
null
null
CVE-2021-36283
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user may potentially exploit this vulnerability by using an SMI to gain arbitrary code execution in SMRAM.
[ "cpe:2.3:o:dell:chengming_3990_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:chengming_3991_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_3500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_3500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_3590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_3590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:g3_15_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:g3_15_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3793_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3880_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5493_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5498_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5498:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5593_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_5598_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_5598:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7391_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7391_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7500_2-in-1_silver_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7500_2-in-1_silver:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_7591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_3310_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_3310_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5300_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5310_2_in_1_firmware:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5310_2_in_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5411_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_5511_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7200_2_in_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7200_2_in_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7210_2_in_1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7210_2_in_1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7220ex_rugged_extreme_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7220ex_rugged_extreme_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7310_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7400_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7400_2-in-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_7410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9410_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:latitude_9510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_3280_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_3280_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_5480_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_5480_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7080_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7480_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7480_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:optiplex_7780_aio_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:optiplex_7780_aio:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3440_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3541_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3551_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_3640_tower_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_3640_tower:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_5750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_5750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7540_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7550_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7740_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:precision_7750_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3401_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3401:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3491_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3491:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3501_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3591_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3591:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3681_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3881_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_3888_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5490:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_5590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_5590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:vostro_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:wyse_5470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_13_9380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_17_9700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_7380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_7380:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_7590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_7590:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_7390_2-in-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_7390_2-in-1:*:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_9500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_9500:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-wgc8-2wwh-f797
Use-after-free vulnerability in Adobe Reader and Acrobat 10.x before 10.1.14 and 11.x before 11.0.11 on Windows and OS X allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-3053, CVE-2015-3054, CVE-2015-3059, and CVE-2015-3075.
[]
null
null
null
null
CVE-2014-9065
common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
[ "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*" ]
null
null
null
4.4
RHSA-2022:0317
Red Hat Security Advisory: OpenJDK 8u322 security update for Portable Linux Builds
OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
[ "cpe:/a:redhat:openjdk:1.8" ]
null
5.3
null
null
GHSA-vv35-qj4h-8c24
Nexuiz before 2.2.1 allows remote attackers to cause a denial of service (resource exhaustion or crash) via unspecified vectors related to "fake players." NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2024-49245
WordPress Ahime Image Printer plugin <= 1.0.0 - Arbitrary File Download vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Ahime Ahime Image Printer.This issue affects Ahime Image Printer: from n/a through 1.0.0.
[ "cpe:2.3:a:ahime:ahime_image_printer:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2015-8956
The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
null
null
6.1
3.6
GHSA-g7gx-c2jg-7cg5
On Lenovo VIBE mobile phones, improper access controls on the nac_server component can be abused in conjunction with CVE-2017-3749 and CVE-2017-3750 to elevate privileges to the root user (commonly known as 'rooting' or "jail breaking" a device).
[]
null
null
7.8
null
GHSA-h936-4hq7-5fvh
Multiple cross-site scripting (XSS) vulnerabilities in eyeOS before 0.9.1 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors involving (1) eyeNav and (2) system/baixar.php.
[]
null
null
null
null
GHSA-89q4-gfxm-xg78
If exploited an attacker could traverse the file system to access files or directories that would otherwise be inaccessible
[]
null
null
null
null
CVE-2022-22509
PHOENIX CONTACT: FL SWITCH 2xxx series incorrect privilege assignment
In Phoenix Contact FL SWITCH Series 2xxx in version 3.00 an incorrect privilege assignment allows an low privileged user to enable full access to the device configuration.
[ "cpe:2.3:o:phoenixcontact:fl_switch_2005_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2005:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2008_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2008:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2008f_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2008f:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2016_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2105_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2105:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2108_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2108:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2116_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2116:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2204-2tc-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2204-2tc-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206-2fx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206-2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206-2fx_sm_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206-2fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206-2fx_sm_st_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206-2fx_sm_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206-2fx_st_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206-2fx_st:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206-2sfx_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206-2sfx_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2206c-2fx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2206c-2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2207-fx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2207-fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2207-fx_sm_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2207-fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2208_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2208:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2208c_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2208c:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2208_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2208_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2212-2tc-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2212-2tc-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2214-2fx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2214-2fx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2214-2fx_sm_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2214-2fx_sm:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2214-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2214-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2214-2sfx_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2214-2sfx_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2216_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2216:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2216_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2216_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2304-2gc-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2304-2gc-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2306-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2306-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2306-2sfp_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2306-2sfp_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2308_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2308:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2308_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2308_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2312-2gc-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2312-2gc-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2314-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2314-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2314-2sfp_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2314-2sfp_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2316_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2316:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2316\\/k1_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2316\\/k1:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2316_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2316_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2404-2tc-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2404-2tc-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2406-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2406-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2406-2sfx_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2406-2sfx_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2408_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2408:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2408_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2408_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2412-2tc-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2412-2tc-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2414-2sfx_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2414-2sfx:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2414-2sfx_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2414-2sfx_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2416_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2416:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2416_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2416_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2504-2gc-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2504-2gc-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2506-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2506-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2506-2sfp\\/k1_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2506-2sfp\\/k1:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2506-2sfp_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2506-2sfp_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2508_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2508:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2508\\/k1_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2508\\/k1:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2508_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2508_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2512-2gc-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2512-2gc-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2514-2sfp_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2514-2sfp:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2514-2sfp_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2514-2sfp_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2516_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2516:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2516_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2516_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2608_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2608:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2608_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2608_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2708_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2708:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2708_pn_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2708_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:phoenixcontact:fl_switch_2205_firmware:3.00:*:*:*:*:*:*:*", "cpe:2.3:h:phoenixcontact:fl_switch_2205:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2018-11857
Improper input validation in WLAN encrypt/decrypt module can lead to a buffer copy in Snapdragon Mobile in version SD 835, SD 845, SD 850
[ "cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*" ]
null
null
7.8
7.2
CVE-2020-5655
NULL pointer dereferences vulnerability in TCP/IP function included in the firmware of MELSEC iQ-R series (RJ71EIP91 EtherNet/IP Network Interface Module First 2 digits of serial number are '02' or before, RJ71PN92 PROFINET IO Controller Module First 2 digits of serial number are '01' or before, RD81DL96 High Speed Data Logger Module First 2 digits of serial number are '08' or before, RD81MES96N MES Interface Module First 2 digits of serial number are '04' or before, and RD81OPC96 OPC UA Server Module First 2 digits of serial number are '04' or before) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet.
[ "cpe:2.3:o:mitsubishielectric:melsec_iq-rj71eip91_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-rj71eip91:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-rj71pn92_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-rj71pn92:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-rd81dl96_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-rd81dl96:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-rd81mes96n_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-rd81mes96n:-:*:*:*:*:*:*:*", "cpe:2.3:o:mitsubishielectric:melsec_iq-rd81opc96_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:mitsubishielectric:melsec_iq-rd81opc96:-:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2025-31882
WordPress WordPress Webinar Plugin <= 1.33.27 - Broken Access Control vulnerability
Missing Authorization vulnerability in WPWebinarSystem WebinarPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WebinarPress: from n/a through 1.33.27.
[]
null
4.3
null
null
PYSEC-2024-38
null
FastAPI is a web framework for building APIs with Python 3.8+ based on standard Python type hints. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests. It's a ReDoS(Regular expression Denial of Service), it only applies to those reading form data, using `python-multipart`. This vulnerability has been patched in version 0.109.1.
[]
null
7.5
null
null
CVE-2021-47461
userfaultfd: fix a race between writeprotect and exit_mmap()
In the Linux kernel, the following vulnerability has been resolved: userfaultfd: fix a race between writeprotect and exit_mmap() A race is possible when a process exits, its VMAs are removed by exit_mmap() and at the same time userfaultfd_writeprotect() is called. The race was detected by KASAN on a development kernel, but it appears to be possible on vanilla kernels as well. Use mmget_not_zero() to prevent the race as done in other userfaultfd operations.
[]
null
null
null
null
CVE-2009-3065
PHP remote file inclusion vulnerability in editor/edit_htmlarea.php in Ve-EDIT 0.1.4 allows remote attackers to execute arbitrary PHP code via a URL in the highlighter parameter.
[ "cpe:2.3:a:rein_velt:vedit:01.4:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2016-8924
IBM Maximo Asset Management 7.1, 7.5 and 7.6 could allow a remote attacker to hijack a user's session, caused by the failure to invalidate an existing session identifier. An attacker could exploit this vulnerability to gain access to another user's session. IBM X-Force ID: 118537.
[ "cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:maximo_asset_management:7.6:*:*:*:*:*:*:*" ]
null
null
5.6
4.3
CVE-2021-47103
inet: fully convert sk->sk_rx_dst to RCU rules
In the Linux kernel, the following vulnerability has been resolved: inet: fully convert sk->sk_rx_dst to RCU rules syzbot reported various issues around early demux, one being included in this changelog [1] sk->sk_rx_dst is using RCU protection without clearly documenting it. And following sequences in tcp_v4_do_rcv()/tcp_v6_do_rcv() are not following standard RCU rules. [a] dst_release(dst); [b] sk->sk_rx_dst = NULL; They look wrong because a delete operation of RCU protected pointer is supposed to clear the pointer before the call_rcu()/synchronize_rcu() guarding actual memory freeing. In some cases indeed, dst could be freed before [b] is done. We could cheat by clearing sk_rx_dst before calling dst_release(), but this seems the right time to stick to standard RCU annotations and debugging facilities. [1] BUG: KASAN: use-after-free in dst_check include/net/dst.h:470 [inline] BUG: KASAN: use-after-free in tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792 Read of size 2 at addr ffff88807f1cb73a by task syz-executor.5/9204 CPU: 0 PID: 9204 Comm: syz-executor.5 Not tainted 5.16.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Call Trace: <TASK> __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106 print_address_description.constprop.0.cold+0x8d/0x320 mm/kasan/report.c:247 __kasan_report mm/kasan/report.c:433 [inline] kasan_report.cold+0x83/0xdf mm/kasan/report.c:450 dst_check include/net/dst.h:470 [inline] tcp_v4_early_demux+0x95b/0x960 net/ipv4/tcp_ipv4.c:1792 ip_rcv_finish_core.constprop.0+0x15de/0x1e80 net/ipv4/ip_input.c:340 ip_list_rcv_finish.constprop.0+0x1b2/0x6e0 net/ipv4/ip_input.c:583 ip_sublist_rcv net/ipv4/ip_input.c:609 [inline] ip_list_rcv+0x34e/0x490 net/ipv4/ip_input.c:644 __netif_receive_skb_list_ptype net/core/dev.c:5508 [inline] __netif_receive_skb_list_core+0x549/0x8e0 net/core/dev.c:5556 __netif_receive_skb_list net/core/dev.c:5608 [inline] netif_receive_skb_list_internal+0x75e/0xd80 net/core/dev.c:5699 gro_normal_list net/core/dev.c:5853 [inline] gro_normal_list net/core/dev.c:5849 [inline] napi_complete_done+0x1f1/0x880 net/core/dev.c:6590 virtqueue_napi_complete drivers/net/virtio_net.c:339 [inline] virtnet_poll+0xca2/0x11b0 drivers/net/virtio_net.c:1557 __napi_poll+0xaf/0x440 net/core/dev.c:7023 napi_poll net/core/dev.c:7090 [inline] net_rx_action+0x801/0xb40 net/core/dev.c:7177 __do_softirq+0x29b/0x9c2 kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x123/0x180 kernel/softirq.c:637 irq_exit_rcu+0x5/0x20 kernel/softirq.c:649 common_interrupt+0x52/0xc0 arch/x86/kernel/irq.c:240 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:629 RIP: 0033:0x7f5e972bfd57 Code: 39 d1 73 14 0f 1f 80 00 00 00 00 48 8b 50 f8 48 83 e8 08 48 39 ca 77 f3 48 39 c3 73 3e 48 89 13 48 8b 50 f8 48 89 38 49 8b 0e <48> 8b 3e 48 83 c3 08 48 83 c6 08 eb bc 48 39 d1 72 9e 48 39 d0 73 RSP: 002b:00007fff8a413210 EFLAGS: 00000283 RAX: 00007f5e97108990 RBX: 00007f5e97108338 RCX: ffffffff81d3aa45 RDX: ffffffff81d3aa45 RSI: 00007f5e97108340 RDI: ffffffff81d3aa45 RBP: 00007f5e97107eb8 R08: 00007f5e97108d88 R09: 0000000093c2e8d9 R10: 0000000000000000 R11: 0000000000000000 R12: 00007f5e97107eb0 R13: 00007f5e97108338 R14: 00007f5e97107ea8 R15: 0000000000000019 </TASK> Allocated by task 13: kasan_save_stack+0x1e/0x50 mm/kasan/common.c:38 kasan_set_track mm/kasan/common.c:46 [inline] set_alloc_info mm/kasan/common.c:434 [inline] __kasan_slab_alloc+0x90/0xc0 mm/kasan/common.c:467 kasan_slab_alloc include/linux/kasan.h:259 [inline] slab_post_alloc_hook mm/slab.h:519 [inline] slab_alloc_node mm/slub.c:3234 [inline] slab_alloc mm/slub.c:3242 [inline] kmem_cache_alloc+0x202/0x3a0 mm/slub.c:3247 dst_alloc+0x146/0x1f0 net/core/dst.c:92 rt_dst_alloc+0x73/0x430 net/ipv4/route.c:1613 ip_route_input_slow+0x1817/0x3a20 net/ipv4/route.c:234 ---truncated---
[]
null
7.8
null
null
CVE-2009-1412
Argument injection vulnerability in the chromehtml: protocol handler in Google Chrome before 1.0.154.59, when invoked by Internet Explorer, allows remote attackers to determine the existence of files, and open tabs for URLs that do not satisfy the IsWebSafeScheme restriction, via a web page that sets document.location to a chromehtml: value, as demonstrated by use of a (1) javascript: or (2) data: URL. NOTE: this can be leveraged for Universal XSS by exploiting certain behavior involving persistence across page transitions.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.149.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.149.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.152.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.2.153.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.3.154.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.3.154.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:0.4.154.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.42:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:1.0.154.46:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-95px-2q98-cxrr
Unspecified vulnerability in the Map I/O Service (xpwmap) in Hitachi XP/W on HI-UX/WE2 before 20070319, and XP/W on HP-UX before 20070405, allows remote attackers to cause a denial of service via certain data to the service port.
[]
null
null
null
null
CVE-2022-40211
WordPress GiveWP plugin <= 2.25.1 - Cross Site Scripting (XSS) via render_dropdown vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GiveWP allows Stored XSS.This issue affects GiveWP: from n/a through 2.25.1.
[]
null
5.9
null
null
GHSA-jw74-9w23-mxp8
A vulnerability, which was classified as critical, was found in kiCode111 like-girl 5.2.0. Affected is an unknown function of the file /admin/CopyadminPost.php. The manipulation of the argument icp/Copyright leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
2
4.7
null
null
CVE-2021-22721
A CWE-200: Information Exposure vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could allow an attacker to get limited knowledge of javascript code when crafted malicious parameters are submitted to the charging station web server.
[ "cpe:2.3:o:schneider-electric:evlink_city_evc1s22p4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_city_evc1s22p4:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:evlink_city_evc1s7p4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_city_evc1s7p4:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:evlink_parking_evw2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_parking_evw2:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:evlink_parking_evf2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_parking_evf2:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:evlink_parking_ev.2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_parking_ev.2:-:*:*:*:*:*:*:*", "cpe:2.3:o:schneider-electric:evlink_smart_wallbox_evb1a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:schneider-electric:evlink_smart_wallbox_evb1a:-:*:*:*:*:*:*:*" ]
null
5.3
null
5
GHSA-xrvj-3vx6-wwh7
In the Linux kernel, the following vulnerability has been resolved:net/tls: Fix use-after-free after the TLS device goes down and upWhen a netdev with active TLS offload goes down, tls_device_down is called to stop the offload and tear down the TLS context. However, the socket stays alive, and it still points to the TLS context, which is now deallocated. If a netdev goes up, while the connection is still active, and the data flow resumes after a number of TCP retransmissions, it will lead to a use-after-free of the TLS context.This commit addresses this bug by keeping the context alive until its normal destruction, and implements the necessary fallbacks, so that the connection can resume in software (non-offloaded) kTLS mode.On the TX side tls_sw_fallback is used to encrypt all packets. The RX side already has all the necessary fallbacks, because receiving non-decrypted packets is supported. The thing needed on the RX side is to block resync requests, which are normally produced after receiving non-decrypted packets.The necessary synchronization is implemented for a graceful teardown: first the fallbacks are deployed, then the driver resources are released (it used to be possible to have a tls_dev_resync after tls_dev_del).A new flag called TLS_RX_DEV_DEGRADED is added to indicate the fallback mode. It's used to skip the RX resync logic completely, as it becomes useless, and some objects may be released (for example, resync_async, which is allocated and freed by the driver).
[]
null
7.8
null
null
CVE-2019-5920
Cross-site request forgery (CSRF) vulnerability in FormCraft 1.2.1 and earlier allows remote attackers to hijack the authentication of administrators via a specially crafted page.
[ "cpe:2.3:a:ncrafts:formcraft:*:*:*:*:*:wordpress:*:*" ]
null
null
8.8
6.8
CVE-2019-4117
IBM Cloud Private 3.1.1 and 3.1.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 158116.
[ "cpe:2.3:a:ibm:cloud_private:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_private:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_private:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cloud_private:3.1.2:*:*:*:*:*:*:*" ]
null
null
4.3
null
GHSA-2f4x-p9hx-9v3c
SQL injection vulnerability in index.php in TurnkeyWebTools SunShop Shopping Cart 4.0 allows remote attackers to execute arbitrary SQL commands via the (1) c or (2) quantity parameter.
[]
null
null
null
null
CVE-2017-18153
Use After Free in WLAN
A race condition exists in a driver potentially leading to a use-after-free condition.
[ "cpe:2.3:o:qualcomm:9206_lte_modem_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:9206_lte_modem:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:ar6003_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:ar6003:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_630_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_630_mobile:-:*:*:*:*:*:*:*", "cpe:2.3:o:qualcomm:snapdragon_636_mobile_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:qualcomm:snapdragon_636_mobile:-:*:*:*:*:*:*:*" ]
null
6.8
null
null
CVE-2020-0617
A denial of service vulnerability exists when Microsoft Hyper-V Virtual PCI on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Hyper-V Denial of Service Vulnerability'.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
6
null
4.9
GHSA-4mx9-fp66-8q8f
A vulnerability was found in Mark User as Spammer Plugin 1.0.0/1.0.1. It has been declared as problematic. Affected by this vulnerability is the function user_row_actions of the file plugin/plugin.php. The manipulation of the argument url leads to cross site scripting. The attack can be launched remotely. Upgrading to version 1.0.2 is able to address this issue. The name of the patch is e7059727274d2767c240c55c02c163eaa4ba6c62. It is recommended to upgrade the affected component. The identifier VDB-222325 was assigned to this vulnerability.
[]
null
5.4
null
null
GHSA-6q9g-3vfq-q2qj
Improper Authentication in moodle
Insufficient capability checks could allow users with the moodle/site:uploadusers capability to delete users, without having the necessary moodle/user:delete capability.
[]
null
4.3
null
null
GHSA-68rw-m3hm-pqp8
OpenEXR 3.1.0 through 3.1.3 has a heap-based buffer overflow in Imf_3_1::LineCompositeTask::execute (called from IlmThread_3_1::NullThreadPoolProvider::addTask and IlmThread_3_1::ThreadPool::addGlobalTask).
[]
null
5.5
null
null
GHSA-vgpf-vwh6-qmfx
Cryptographic key material leaked in debug messages - GERAN in snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9645, MDM9650, MDM9655, MSM8909W, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 625, SD 650/52, SD 800, SD 810, SD 820, SD 835, SD 855, SDX24, Snapdragon_High_Med_2016.
[]
null
null
5.5
null
CVE-2017-15919
The ultimate-form-builder-lite plugin before 1.3.7 for WordPress has SQL Injection, with resultant PHP Object Injection, via wp-admin/admin-ajax.php.
[ "cpe:2.3:a:accesspressthemes:ultimate-form-builder-lite:*:*:*:*:*:wordpress:*:*" ]
null
null
9.8
7.5
GHSA-jjrp-3hrg-cj26
Denial of Service in NetScaler Console (formerly NetScaler ADM), NetScaler Agent, and NetScaler SDX
[]
7.1
7.5
null
null
GHSA-xw99-fqpg-v257
Missing Authorization vulnerability in Awesome Support Team Awesome Support.This issue affects Awesome Support: from n/a through 6.1.5.
[]
null
5.3
null
null
GHSA-j839-cx92-9fpc
Multiple cross-site scripting (XSS) vulnerabilities in Xigla Absolute Banner Manager XE 2.0 allow remote authenticated administrators to inject arbitrary web script or HTML via the text parameter in (1) searchbanners.asp and (2) listadvertisers.asp, and other unspecified fields. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
CVE-2006-0837
IBM Tivoli Micromuse Netcool/NeuSecure 3.0.236 has world-readable permissions for (1) /etc/neusecure.conf, (2) /opt/NeuSecure/etc/cms-3.0.236.buildconf, and (3) /opt/NeuSecure/bin/ns_archiver.log, which allows local users to read sensitive information such as passwords. NOTE: IBM has privately confirmed to CVE that a fix is available for these issues.
[ "cpe:2.3:a:micromuse:netcool_neusecure:3.0.236:*:*:*:*:*:*:*" ]
null
null
null
2.1
GHSA-hffh-jrv7-cqxq
In the pre connection stage, an improper enforcement of message integrity vulnerability exists in BIG-IP Edge Client for Windows and Mac OS.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
[]
null
5.9
null
null
CVE-2021-47347
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
In the Linux kernel, the following vulnerability has been resolved: wl1251: Fix possible buffer overflow in wl1251_cmd_scan Function wl1251_cmd_scan calls memcpy without checking the length. Harden by checking the length is within the maximum allowed size.
[]
null
8.8
null
null
GHSA-pc38-jx4p-rvj5
Missing Authorization vulnerability in YITH YITH WooCommerce Product Add-Ons allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects YITH WooCommerce Product Add-Ons: from n/a through 4.2.0.
[]
null
5.3
null
null
CVE-2017-17555
The swri_audio_convert function in audioconvert.c in FFmpeg libswresample through 3.0.101, as used in FFmpeg 3.4.1, aubio 0.4.6, and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.
[ "cpe:2.3:a:aubio:aubio:0.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:ffmpeg:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ffmpeg:libswresample:*:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2022-2556
MailChimp for Woocommerce < 2.7.2 - Admin+ SSRF
The Mailchimp for WooCommerce WordPress plugin before 2.7.2 has an AJAX action that allows high privilege users to perform a POST request on behalf of the server to the internal network/LAN, the body of the request is also appended to the response so it can be used to scan private network for example
[ "cpe:2.3:a:mailchimp:mailchimp_for_woocommerce:*:*:*:*:*:wordpress:*:*" ]
null
2.7
null
null
GHSA-c4c9-f467-hxxv
Cisco IOS 11.x and 12.0 through 12.2 allows remote attackers to cause a denial of service (traffic block) by sending a particular sequence of IPv4 packets to an interface on the device, causing the input queue on that interface to be marked as full.
[]
null
null
null
null
CVE-2025-4757
PHPGurukul Beauty Parlour Management System forgot-password.php sql injection
A vulnerability was found in PHPGurukul Beauty Parlour Management System 1.1. It has been rated as critical. This issue affects some unknown processing of the file /forgot-password.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
CVE-2023-50859
WordPress WP Crowdfunding Plugin <= 2.1.6 is vulnerable to Cross Site Scripting (XSS)
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeum WP Crowdfunding allows Stored XSS.This issue affects WP Crowdfunding: from n/a through 2.1.6.
[ "cpe:2.3:a:themeum:wp_crowdfunding:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
null
CVE-2024-4077
WordPress UDesign theme <= 4.7.3 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AndonDesign UDesign allows Reflected XSS.This issue affects UDesign: from n/a through 4.7.3.
[]
null
7.1
null
null
GHSA-246w-4q6g-jh9h
MiCasaVerde VeraLite with firmware 1.5.408 does not properly restrict access, which allows remote authenticated users to (1) update the firmware via the squashfs parameter to upgrade_step2.sh or (2) obtain hashed passwords via the cgi-bin/cmh/backup.sh page.
[]
null
null
null
null
CVE-2023-6882
The Simple Membership plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘environment_mode’ parameter in all versions up to, and including, 4.3.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
GHSA-295v-8pjh-5r5h
Buffer overflow in SGI IRIX mailx program.
[]
null
null
null
null
CVE-2025-49845
Discourse users are able to see their own whispers even after being removed from a group that has been configured to see whispers
Discourse is an open-source discussion platform. The visibility of posts typed `whisper` is controlled via the `whispers_allowed_groups` site setting. Only users that belong to groups specified in the site setting are allowed to view posts typed `whisper`. However, it has been discovered that users of versions prior to 3.4.6 on the `stable` branch and prior to 3.5.0.beta8-dev on the `tests-passed` branch can continue to see their own whispers even after losing visibility of posts typed `whisper`. This issue is patched in versions 3.4.6 and 3.5.0.beta8-dev. No known workarounds are available.
[]
6.3
null
null
null
GHSA-q48w-7782-482q
The Conquest Of Fantasia (aka air.com.ingen.studios.cof.sg) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2020-19318
Buffer Overflow vulnerability in D-Link DIR-605L, hardware version AX, firmware version 1.17beta and below, allows authorized attackers execute arbitrary code via sending crafted data to the webserver service program.
[ "cpe:2.3:h:d-link:dir-605l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dir-605l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-605l:a1:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-jh2m-j8pp-55rc
Prototype Pollution in gedi
All versions of package gedi up to and including version 1.6.3 are vulnerable to Prototype Pollution via the set function.
[]
null
9.8
null
null
CVE-2024-44309
A cookie management issue was addressed with improved state management. This issue is fixed in Safari 18.1.1, iOS 17.7.2 and iPadOS 17.7.2, macOS Sequoia 15.1.1, iOS 18.1.1 and iPadOS 18.1.1, visionOS 2.1.1. Processing maliciously crafted web content may lead to a cross site scripting attack. Apple is aware of a report that this issue may have been actively exploited on Intel-based Mac systems.
[ "cpe:2.3:a:apple:safari:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:visionos:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:iphone:*", "cpe:2.3:o:apple:ipad_os:-:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*" ]
null
6.3
null
null
CVE-2023-38681
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0002). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted IGS file. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-21270)
[ "cpe:2.3:a:siemens:tecnomatix:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-vmwj-88gq-629h
On Juniper Networks Junos OS platforms with link aggregation (lag) configured, executing any operation that fetches Aggregated Ethernet (AE) interface statistics, including but not limited to SNMP GET requests, causes a slow kernel memory leak. If all the available memory is consumed, the traffic will be impacted and a reboot might be required. The following log can be seen if this issue happens. /kernel: rt_pfe_veto: Memory over consumed. Op 1 err 12, rtsm_id 0:-1, msg type 72 /kernel: rt_pfe_veto: free kmem_map memory = (20770816) curproc = kmd An administrator can use the following CLI command to monitor the status of memory consumption (ifstat bucket): user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 2588977 162708K - 19633958 <<<< user@device > show system virtual-memory no-forwarding | match ifstat Type InUse MemUse HighUse Limit Requests Limit Limit Size(s) ifstat 3021629 189749K - 22914415 <<<< This issue does not affect the following platforms: Juniper Networks MX Series. Juniper Networks PTX1000-72Q, PTX3000, PTX5000, PTX10001, PTX10002-60C, PTX10003_160C, PTX10003_80C, PTX10003_81CD, PTX10004, PTX10008, PTX10016 Series. Juniper Networks EX9200 Series. Juniper Networks ACX710, ACX6360 Series. Juniper Networks NFX Series. This issue affects Juniper Networks Junos OS: 17.1 versions 17.1R3 and above prior to 17.3R3-S11; 17.4 versions prior to 17.4R3-S5; 18.2 versions prior to 18.2R3-S7, 18.2R3-S8; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R2-S7, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R3-S1; 20.1 versions prior to 20.1R2, 20.1R3; 20.2 versions prior to 20.2R2-S2, 20.2R3; 20.3 versions prior to 20.3R1-S2, 20.3R2. This issue does not affect Juniper Networks Junos OS prior to 17.1R3.
[]
null
7.5
null
null
GHSA-wmvf-f464-vfjg
Elevation of privilege
[]
null
9.8
null
null
GHSA-w238-2fh9-9v9c
A vulnerability classified as critical was found in PHPGurukul Medical Card Generation System 1.0. This vulnerability affects unknown code of the file /admin/view-card-detail.php of the component Managecard View Detail Page. The manipulation of the argument viewid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.1
4.7
null
null
CVE-2022-43641
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit PDF Reader 12.0.1.12430. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18894.
[ "cpe:2.3:a:foxit:pdf_editor:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
3.3
null
GHSA-pxpm-gqm6-6pwh
A vulnerability, which was classified as critical, was found in Tenda AC10 up to 15.03.06.47. This affects the function formSetPPTPServer of the file /goform/SetPptpServerCfg of the component HTTP Handler. The manipulation of the argument startIp/endIp leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
8.7
8.8
null
null
CVE-2005-1031
RUNCMS 1.1A, and possibly other products based on e-Xoops (exoops), when "Allow custom avatar upload" is enabled, does not properly verify uploaded files, which allows remote attackers to upload arbitrary files.
[ "cpe:2.3:a:e-xoops:e-xoops:1.05r3:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.1a:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-g4cv-h327-hxr6
WebKit in Apple Safari before 4.0 does not prevent references to file: URLs within (1) audio and (2) video elements, which allows remote attackers to determine the existence of arbitrary files via a crafted HTML document.
[]
null
null
null
null
GHSA-rpgj-f22q-phgr
EMC Elastic Cloud Storage (ECS) before 3.1 is affected by an undocumented account vulnerability that could potentially be leveraged by malicious users to compromise the affected system.
[]
null
9.8
null
null
GHSA-8q3r-wcm3-84jc
In ged, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494107; Issue ID: ALPS07494107.
[]
null
6.7
null
null
GHSA-wgf7-h292-8fqj
Unspecified vulnerability in the com.sap.aii.mdt.amt.web.AMTPageProcessor servlet in SAP NetWeaver 7.0 allows remote attackers to obtain sensitive information about the Adapter Monitor via unspecified vectors, possibly related to the EnableInvokerServletGlobally property in the servlet_jsp service.
[]
null
null
null
null
GHSA-4w35-q3v2-v3v5
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability."
[]
null
null
null
null
CVE-2023-6250
BestWebSoft's Like & Share < 2.74 - Unauthenticated Password Protected Post Read
The BestWebSoft's Like & Share WordPress plugin before 2.74 discloses the content of password protected posts to unauthenticated users via a meta tag
[ "cpe:2.3:a:bestwebsoft:like_\\&_share:*:*:*:*:*:wordpress:*:*" ]
null
7.5
null
null
GHSA-356c-rcq8-p23g
Sangoma FreePBX 1805 through 2302 (when obtained as a ,.ISO file) places AMPDBUSER, AMPDBPASS, AMPMGRUSER, and AMPMGRPASS in the list of global variables. This exposes cleartext authentication credentials for the Asterisk Database (MariaDB/MySQL) and Asterisk Manager Interface. For example, an attacker can make a /ari/asterisk/variable?variable=AMPDBPASS API call.
[]
null
8.1
null
null
GHSA-5v2g-8pw8-cqg5
The Accordion plugin for WordPress is vulnerable to unauthorized access of data and modification of data due to a missing capability check on the 'accordions_duplicate_post_as_draft' function in all versions up to, and including, 2.2.96. This makes it possible for authenticated attackers, with contributor access and above, to duplicate arbitrary posts, allowing access to the contents of password-protected posts.
[]
null
5.4
null
null
GHSA-jgxg-2h9p-r7fh
The Password for WP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.3. This is due to missing or incorrect nonce validation on the get3_init_admin_page() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
[]
null
6.1
null
null