id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-gm9h-jqqh-9434
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16392.
[]
null
7.8
null
null
GHSA-cxp2-364h-667j
The Confetti Fall Animation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'confetti-fall-animation' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-7wwm-57j8-wx2j
An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32.
[]
null
8.8
null
null
GHSA-vq6c-fvxw-p45v
CSRF vulnerability in Jenkins kubernetes-cd Plugin allow capturing credentials
A cross-site request forgery (CSRF) vulnerability in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[]
null
7.1
null
null
CVE-2015-4372
Cross-site scripting (XSS) vulnerability in the Image Title module before 7.x-1.1 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:image_title_project:image_title:*:*:*:*:*:drupal:*:*" ]
null
null
null
3.5
CVE-2022-30045
An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read.
[ "cpe:2.3:a:ezxml_project:ezxml:0.8.6:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
GHSA-mvg2-4m23-mpp3
In the Linux kernel, the following vulnerability has been resolved:usb: aqc111: check packet for fixup for true limitIf a device sends a packet that is inbetween 0 and sizeof(u64) the value passed to skb_trim() as length will wrap around ending up as some very large value.The driver will then proceed to parse the header located at that position, which will either oops or process some random value.The fix is to check against sizeof(u64) rather than 0, which the driver currently does. The issue exists since the introduction of the driver.
[]
null
null
null
null
GHSA-2479-2frf-9263
Incorrect Privilege Assignment vulnerability in Drupal Private content allows Target Influence via Framing.This issue affects Private content: from 0.0.0 before 2.1.0.
[]
null
5.5
null
null
GHSA-rgfq-fxxv-9cxw
Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.8
null
null
CVE-2024-46662
A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to escalation of privilege via specifically crafted packets
[ "cpe:2.3:o:fortinet:fortimanager:7.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:7.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortimanager:7.4.1:*:*:*:*:*:*:*" ]
null
8.3
null
null
GHSA-95pm-6wjg-58qw
A vulnerability has been found in AXIS P1204, P3225, P3367, M3045, M3005 and M3007 and classified as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to improper access controls. The attack can be initiated remotely. It is recommended to upgrade the affected component.
[]
null
9.8
null
null
GHSA-vf8q-5pmf-2rv3
IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116.
[]
null
null
null
null
RHSA-2020:0945
Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 6
keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP
[ "cpe:/a:redhat:red_hat_single_sign_on:7::el6" ]
null
5.6
null
null
CVE-2023-53144
erofs: fix wrong kunmap when using LZMA on HIGHMEM platforms
In the Linux kernel, the following vulnerability has been resolved: erofs: fix wrong kunmap when using LZMA on HIGHMEM platforms As the call trace shown, the root cause is kunmap incorrect pages: BUG: kernel NULL pointer dereference, address: 00000000 CPU: 1 PID: 40 Comm: kworker/u5:0 Not tainted 6.2.0-rc5 #4 Workqueue: erofs_worker z_erofs_decompressqueue_work EIP: z_erofs_lzma_decompress+0x34b/0x8ac z_erofs_decompress+0x12/0x14 z_erofs_decompress_queue+0x7e7/0xb1c z_erofs_decompressqueue_work+0x32/0x60 process_one_work+0x24b/0x4d8 ? process_one_work+0x1a4/0x4d8 worker_thread+0x14c/0x3fc kthread+0xe6/0x10c ? rescuer_thread+0x358/0x358 ? kthread_complete_and_exit+0x18/0x18 ret_from_fork+0x1c/0x28 ---[ end trace 0000000000000000 ]--- The bug is trivial and should be fixed now. It has no impact on !HIGHMEM platforms.
[]
null
null
null
null
GHSA-hjrw-9jmp-vr8q
A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable.
[]
null
8.3
null
null
GHSA-88vx-49vv-gcx2
DataVault.Tesla/Impl/TypeSystem/AssociationHelper.cs in datavault allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of an [ (open bracket) followed by many commas, related to a certain regular expression, aka a "ReDoS" vulnerability.
[]
null
null
null
null
CVE-2023-34444
Cross-site Scripting vulnerability on pages/ajax.searchform.php in Combodo iTop
Combodo iTop is a simple, web based IT Service Management tool. When displaying pages/ajax.searchform.php XSS are possible for scripts outside of script tags. This issue has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability.
[ "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*" ]
null
8.8
null
null
CVE-2022-23549
Discourse vulnerable to bypass of post max_length using HTML comments
Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, users can create posts with raw body longer than the `max_length` site setting by including html comments that are not counted toward the character limit. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds.
[ "cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:*:*:*:*", "cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:*:*:*:*" ]
null
5.7
null
null
GHSA-gc43-g62c-99g2
Improper Access Control in MySQL Connectors Java
Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J.
[]
null
null
null
null
CVE-2021-41829
Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key.
[ "cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-7hfj-5jj3-9hw6
This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. An app may be able to gain root privileges
[]
null
7.8
null
null
CVE-2023-4969
GPU kernel implementations susceptible to memory leak
A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.
[ "cpe:2.3:a:khronos:opencl:*:*:*:*:*:*:*:*", "cpe:2.3:a:khronos:vulkan:*:*:*:*:*:*:*:*", "cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi300x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi300a_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi250_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi210_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:instinct_mi100_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:instinct_mi100:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_instinct_mi50_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_instinct_mi50:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_instinct_mi25_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_instinct_mi25:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_v620_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_v620:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_v520_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_v520:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w7500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w6400_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w6500m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w6300m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w5700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_pro_w5500x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7900xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7800xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7700xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7600xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6950xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6950xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6900xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6900xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6800xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_6800_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5300m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5300xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5300xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5500m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5500_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5500xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5500xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5600m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5600xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5600xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5700m_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:radeon_rx_5700xt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:radeon_rx_5700xt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7945hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7845hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7745hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7645hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7940h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_pro_7945hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7840h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_pro_7840u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7840u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7640h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7640u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7640u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7545u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7545u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7540u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7540u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_7440u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600gt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600gt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500gt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500gt:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7735hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7736u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7735u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7535hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7535u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_7335u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7520u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_7320u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6980hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6980hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6900hx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_6900hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_6800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_6800hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_6800u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_6600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_6600hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_6600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4980u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600hs_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4680u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_7900_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_7700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_7500f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:athlon_3000g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2018-12775
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2011-1865
Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allow remote attackers to execute arbitrary code via a request containing crafted parameters.
[ "cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*", "cpe:2.3:a:hp:openview_storage_data_protector:6.20:*:*:*:*:*:*:*" ]
null
null
null
10
GHSA-9pfw-fqv3-483p
In the Linux kernel, the following vulnerability has been resolved:ice: Fix race condition during interface enslaveCommit 5dbbbd01cbba83 ("ice: Avoid RTNL lock when re-creating auxiliary device") changes a process of re-creation of aux device so ice_plug_aux_dev() is called from ice_service_task() context. This unfortunately opens a race window that can result in dead-lock when interface has left LAG and immediately enters LAG again.Reproducer:This results in: [20976.208697] Workqueue: ice ice_service_task [ice] [20976.213422] Call Trace: [20976.215871] __schedule+0x2d1/0x830 [20976.219364] schedule+0x35/0xa0 [20976.222510] schedule_preempt_disabled+0xa/0x10 [20976.227043] __mutex_lock.isra.7+0x310/0x420 [20976.235071] enum_all_gids_of_dev_cb+0x1c/0x100 [ib_core] [20976.251215] ib_enum_roce_netdev+0xa4/0xe0 [ib_core] [20976.256192] ib_cache_setup_one+0x33/0xa0 [ib_core] [20976.261079] ib_register_device+0x40d/0x580 [ib_core] [20976.266139] irdma_ib_register_device+0x129/0x250 [irdma] [20976.281409] irdma_probe+0x2c1/0x360 [irdma] [20976.285691] auxiliary_bus_probe+0x45/0x70 [20976.289790] really_probe+0x1f2/0x480 [20976.298509] driver_probe_device+0x49/0xc0 [20976.302609] bus_for_each_drv+0x79/0xc0 [20976.306448] __device_attach+0xdc/0x160 [20976.310286] bus_probe_device+0x9d/0xb0 [20976.314128] device_add+0x43c/0x890 [20976.321287] __auxiliary_device_add+0x43/0x60 [20976.325644] ice_plug_aux_dev+0xb2/0x100 [ice] [20976.330109] ice_service_task+0xd0c/0xed0 [ice] [20976.342591] process_one_work+0x1a7/0x360 [20976.350536] worker_thread+0x30/0x390 [20976.358128] kthread+0x10a/0x120 [20976.365547] ret_from_fork+0x1f/0x40 ... [20976.438030] task:ip state:D stack: 0 pid:213658 ppid:213627 flags:0x00004084 [20976.446469] Call Trace: [20976.448921] __schedule+0x2d1/0x830 [20976.452414] schedule+0x35/0xa0 [20976.455559] schedule_preempt_disabled+0xa/0x10 [20976.460090] __mutex_lock.isra.7+0x310/0x420 [20976.464364] device_del+0x36/0x3c0 [20976.467772] ice_unplug_aux_dev+0x1a/0x40 [ice] [20976.472313] ice_lag_event_handler+0x2a2/0x520 [ice] [20976.477288] notifier_call_chain+0x47/0x70 [20976.481386] __netdev_upper_dev_link+0x18b/0x280 [20976.489845] bond_enslave+0xe05/0x1790 [bonding] [20976.494475] do_setlink+0x336/0xf50 [20976.502517] __rtnl_newlink+0x529/0x8b0 [20976.543441] rtnl_newlink+0x43/0x60 [20976.546934] rtnetlink_rcv_msg+0x2b1/0x360 [20976.559238] netlink_rcv_skb+0x4c/0x120 [20976.563079] netlink_unicast+0x196/0x230 [20976.567005] netlink_sendmsg+0x204/0x3d0 [20976.570930] sock_sendmsg+0x4c/0x50 [20976.574423] ____sys_sendmsg+0x1eb/0x250 [20976.586807] ___sys_sendmsg+0x7c/0xc0 [20976.606353] __sys_sendmsg+0x57/0xa0 [20976.609930] do_syscall_64+0x5b/0x1a0 [20976.613598] entry_SYSCALL_64_after_hwframe+0x65/0xcaCommand 'ip link ... set nomaster' causes that ice_plug_aux_dev() is called from ice_service_task() context, aux device is created and associated device->lock is taken.Command 'ip link ... set master...' calls ice's notifier under RTNL lock and that notifier calls ice_unplug_aux_dev(). That function tries to take aux device->lock but this is already taken by ice_plug_aux_dev() in step 1Later ice_plug_aux_dev() tries to take RTNL lock but this is already taken in step 2Dead-lockThe patch fixes this issue by following changes:Bit ICE_FLAG_PLUG_AUX_DEV is kept to be set during ice_plug_aux_dev() call in ice_service_task()The bit is checked in ice_clear_rdma_cap() and only if it is not set then ice_unplug_aux_dev() is called. If it is set (in other words plugging of aux device was requested and ice_plug_aux_dev() is potentially running) then the function only clears the ---truncated---
[]
null
4.7
null
null
GHSA-g73p-mjxc-vhhv
TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop the network functions of the products or execute a malicious program via a specially crafted packet.
[]
null
null
null
null
RHSA-2024:2504
Red Hat Security Advisory: libssh security update
libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests
[ "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:enterprise_linux:9::baseos" ]
null
3.7
null
null
GHSA-38hf-f26w-w4j3
Buffer overflow in the FTP service on the Tandberg MXP F7.0 allows remote attackers to cause a denial of service (process crash or device reboot) or possibly execute arbitrary code via a long USER command, as demonstrated by a command ending with many space characters.
[]
null
null
null
null
PYSEC-2021-715
null
TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[]
null
null
null
null
RHSA-2021:5236
Red Hat Security Advisory: postgresql:13 security update
postgresql: memory disclosure in certain queries postgresql: server processes unencrypted bytes from man-in-the-middle
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.1
null
null
GHSA-5w98-4m6q-799m
MapUrlToZone Security Feature Bypass Vulnerability
[]
null
4.3
null
null
CVE-2023-21924
Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Health Sciences InForm, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as unauthorized read access to a subset of Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L).
[ "cpe:2.3:a:oracle:health_sciences_inform:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:health_sciences_inform:7.0.0.0:*:*:*:*:*:*:*" ]
null
5.9
null
null
GHSA-3q3f-m2cj-5323
IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435.
[]
null
null
null
null
GHSA-fpgq-qv2c-6787
A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are affected.
[]
null
null
5.4
null
CVE-2022-44314
PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StringStrncpy function in cstdlib/string.c when called from ExpressionParseFunctionCall.
[ "cpe:2.3:a:picoc_project:picoc:3.2.2:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2023-26401
ZDI-CAN-20278: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2023-39659
An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component.
[ "cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-85fc-m2vq-4r26
Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function.
[]
null
null
null
null
CVE-2023-34142
Cleartext Transmission Vulnerability in Hitachi Device Manager
Cleartext Transmission of Sensitive Information vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Server, Device Manager Agent, Host Data Collector components) allows Interception.This issue affects Hitachi Device Manager: before 8.8.5-02.
[ "cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9
null
null
CVE-2022-36563
Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory.
[ "cpe:2.3:a:rubyinstaller:rubyinstaller2:*:*:*:*:*:ruby:*:*" ]
null
8.8
null
null
GHSA-ccvf-q4m9-xf67
This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data.
[]
null
4.6
null
null
GHSA-r4hf-7fhj-q7fq
In the Linux kernel, the following vulnerability has been resolved:ixgbe: fix unbalanced device enable/disable in suspend/resumepci_disable_device() called in __ixgbe_shutdown() decreases dev->enable_cnt by 1. pci_enable_device_mem() which increases dev->enable_cnt by 1, was removed from ixgbe_resume() in commit 6f82b2558735 ("ixgbe: use generic power management"). This caused unbalanced increase/decrease. So add pci_enable_device_mem() back.Fix the following call trace.ixgbe 0000:17:00.1: disabling already-disabled device Call Trace: __ixgbe_shutdown+0x10a/0x1e0 [ixgbe] ixgbe_suspend+0x32/0x70 [ixgbe] pci_pm_suspend+0x87/0x160 ? pci_pm_freeze+0xd0/0xd0 dpm_run_callback+0x42/0x170 __device_suspend+0x114/0x460 async_suspend+0x1f/0xa0 async_run_entry_fn+0x3c/0xf0 process_one_work+0x1dd/0x410 worker_thread+0x34/0x3f0 ? cancel_delayed_work+0x90/0x90 kthread+0x14c/0x170 ? kthread_park+0x90/0x90 ret_from_fork+0x1f/0x30
[]
null
5.5
null
null
GHSA-v92p-w44j-35xr
D-Link DCS-825L devices with firmware 1.08 do not employ a suitable mechanism to prevent denial-of-service (DoS) attacks. An attacker can harm the device availability (i.e., live-online video/audio streaming) by using the hping3 tool to perform an IPv4 flood attack. Verified attacks includes SYN flooding, UDP flooding, ICMP flooding, and SYN-ACK flooding.
[]
null
null
7.5
null
CVE-2009-4010
Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones.
[ "cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-mf4c-rpx4-7c39
The News Kit Elementor Addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.1 via the render function in includes/widgets/canvas-menu/canvas-menu.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft Elementor template data.
[]
null
4.3
null
null
GHSA-wp99-xcpc-rj24
Microsoft Exchange Server Remote Code Execution Vulnerability
[]
null
8
null
null
GHSA-vwcw-f8wh-8pv7
In the Linux kernel, the following vulnerability has been resolved:dmaengine: idxd: Refactor remove call with idxd_cleanup() helperThe idxd_cleanup() helper cleans up perfmon, interrupts, internals and so on. Refactor remove call with the idxd_cleanup() helper to avoid code duplication. Note, this also fixes the missing put_device() for idxd groups, enginces and wqs.
[]
null
null
null
null
GHSA-4w85-9rq6-pxww
A vulnerability has been found in PHPGurukul Art Gallery Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-art-type-detail.php?editid=1. The manipulation of the argument arttype leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
null
null
CVE-2022-3305
Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-v882-ccj6-jc48
Rack vulnerable to Denial of Service
Unspecified vulnerability in `Rack::Auth::AbstractRequest` in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings."
[]
null
null
null
null
GHSA-pch4-wfwx-j685
On Aspire-derived NEC PBXes, including all versions of SV8100 devices, a set of documented, static login credentials may be used to access the DIM interface.
[]
null
null
null
null
GHSA-2p69-gxpm-5469
Downloads Resources over HTTP in alto-saxophone
Affected versions of `alto-saxophone` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `alto-saxophone`.RecommendationUpdate to version 2.25.1 or later.
[]
null
null
null
null
CVE-2025-7595
code-projects Job Diary view-cad.php sql injection
A vulnerability was found in code-projects Job Diary 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view-cad.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
GHSA-gcjr-346m-7x54
This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-17544.
[]
null
7.8
null
null
GHSA-v57c-67jc-mg6g
When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation.
[]
null
null
null
null
GHSA-3f64-v74g-7p75
A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be launched remotely.
[]
5.1
2.4
null
null
GHSA-p79j-rp99-7cmv
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. This affects the libhevc library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32915871.
[]
null
null
7.8
null
GHSA-gh2w-wqm3-32m4
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request.
[]
null
8.8
null
null
GHSA-4mfr-jgjm-cvx8
OpenText Carbonite Server Backup Portal before 8.8.7 allows XSS by an authenticated user via policy creation.
[]
null
null
null
null
GHSA-vc8q-vv59-f54c
Mealie1.0.0beta3 does not terminate download tokens after a user logs out, allowing attackers to perform a man-in-the-middle attack via a crafted GET request.
[]
null
5.9
null
null
GHSA-v4qf-2m5f-gvqh
Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_expense_category.php.
[]
null
7.2
null
null
GHSA-fp87-jfrm-4f3f
An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
[]
null
6.7
null
null
CVE-2023-1597
tagDiv Cloud Library < 2.7 - Unauthenticated Arbitrary User Metadata Update to Privilege Escalation
The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog.
[ "cpe:2.3:a:tagdiv:cloud_library:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
GHSA-x998-f397-q83g
Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability."
[]
null
null
null
null
CVE-2016-6342
elog 3.1.1 allows remote attackers to post data as any username in the logbook.
[ "cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*", "cpe:2.3:a:elog_project:elog:3.1.1:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2024-8572
Gouniverse GoLang CMS FrontendHandler.go PageRenderHtmlByAlias cross site scripting
A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.1 is able to address this issue. The patch is identified as 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. It is recommended to upgrade the affected component.
[ "cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
CVE-2018-14015
The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c.
[ "cpe:2.3:a:radare:radare2:2.7.0:*:*:*:*:*:*:*" ]
null
5.5
null
4.3
GHSA-h3hj-8cpp-cwgw
Multiple SQL injection vulnerabilities in the (1) calendar and (2) infolog modules for phpgroupware 0.9.14 allow remote attackers to perform unauthorized database operations.
[]
null
null
null
null
CVE-2016-4976
Apache Ambari 2.x before 2.4.0 includes KDC administrator passwords on the kadmin command line, which allows local users to obtain sensitive information via a process listing.
[ "cpe:2.3:a:apache:ambari:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:ambari:2.2.2:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
CVE-2023-36869
Azure DevOps Server Spoofing Vulnerability
Azure DevOps Server Spoofing Vulnerability
[ "cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*" ]
null
6.3
null
null
GHSA-x7p7-8c27-hjgq
PHP remote file inclusion vulnerability in admin.wmtportfolio.php in the webmaster-tips.net wmtportfolio 1.0 (com_wmtportfolio) component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
[]
null
null
null
null
GHSA-8699-m855-cwqf
Cross-site scripting in Elasticsearch
Cross-site scripting (XSS) vulnerability in the CORS functionality in Elasticsearch before 1.4.0.Beta1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-vvvq-q595-47g3
The Streamit theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email in the 'st_Authentication_Controller::edit_profile' function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.
[]
null
8.8
null
null
GHSA-7x7r-fcfg-xc97
Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, There is a stored XSS vulnerability via the $value->gallery_name and $value->gallery_description where anyone with privileges to modify or add galleries/images and inject javascript into the database.
[]
null
null
5.4
null
GHSA-q493-fq52-3qhm
A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition.
[]
null
7.5
null
null
GHSA-r3fq-9r25-fh69
BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 contains basic SSRF vulnerability. It allow unauthenticated attackers to request to any internal and external server.
[]
null
null
null
null
RHSA-2023:6154
Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0
golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_secondary_scheduler:1.2::el8" ]
null
7.5
null
null
CVE-2021-22203
An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7.9 before 13.8.7, all versions starting from 13.9 before 13.9.5, and all versions starting from 13.10 before 13.10.1. A specially crafted Wiki page allowed attackers to read arbitrary files on the server.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.10.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:13.10.0:*:*:*:enterprise:*:*:*" ]
null
7.5
null
null
CVE-2018-19111
The Google Cardboard application 1.8 for Android and 1.2 for iOS sends potentially private cleartext information to the Unity 3D Stats web site, as demonstrated by device make, model, and OS.
[ "cpe:2.3:a:google:cardboard:1.2:*:*:*:*:iphone_os:*:*", "cpe:2.3:a:google:cardboard:1.8:*:*:*:*:android:*:*" ]
null
null
5.3
5
GHSA-463r-m79g-7hv3
PHP remote file inclusion vulnerability in hu/modules/reg-new/modstart.php in Sofi WebGui 0.6.3 PRE and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mod_dir parameter.
[]
null
null
null
null
GHSA-fr57-5xm9-fpgw
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs Elementor Button Plus allows Stored XSS.This issue affects Elementor Button Plus: from n/a through 1.3.3.
[]
null
6.5
null
null
GHSA-qgq2-9mq2-x25j
Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file.
[]
null
5.5
null
null
GHSA-mgjr-3gvp-wpc2
liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error.
[]
null
null
null
null
CVE-2024-52812
LF Edge eKuiper has Stored XSS in Rules Functionality
LF Edge eKuiper is an internet-of-things data analytics and stream processing engine. Prior to version 2.0.8, auser with rights to modify the service (e.g. kuiperUser role) can inject a cross-site scripting payload into the rule `id` parameter. Then, after any user with access to this service (e.g. admin) tries make any modifications with the rule (update, run, stop, delete), a payload acts in the victim's browser. Version 2.0.8 fixes the issue.
[]
null
5.4
null
null
GHSA-4w2r-p3vj-jj74
SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call.
[]
null
null
null
null
GHSA-42f2-f9vc-6365
Private key leak in Apache CXF
Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter `rs.security.keystore.type` to `jwk`. For this case all keys are returned in this file &quot;as is&quot;, including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. `oct` keys, which contain secret keys, are not returned at all.
[]
null
7.5
null
null
CVE-2019-7104
Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2016-0580
Unspecified vulnerability in the Oracle Report Manager component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect availability via unknown vectors.
[ "cpe:2.3:a:oracle:report_manager:11.5.10.2:*:*:*:*:*:*:*" ]
null
null
null
5
RHSA-2022:5069
Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update
nanoid: Information disclosure via valueOf() function sanitize-url: XSS due to improper sanitization in sanitizeUrl function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor prometheus/client_golang: Denial of service using InstrumentHandlerCounter go-getter: command injection vulnerability golang: crash in a golang.org/x/crypto/ssh server go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3)
[ "cpe:/a:redhat:openshift:4.11::el8" ]
null
8.6
null
null
CVE-2024-7342
Baidu UEditor unrestricted upload
A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:baidu:ueditor:1.4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*" ]
5.3
3.5
3.5
4
CVE-2024-56599
wifi: ath10k: avoid NULL pointer error during sdio remove
In the Linux kernel, the following vulnerability has been resolved: wifi: ath10k: avoid NULL pointer error during sdio remove When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON is set to yes, kernel panic will happen: Call trace: destroy_workqueue+0x1c/0x258 ath10k_sdio_remove+0x84/0x94 sdio_bus_remove+0x50/0x16c device_release_driver_internal+0x188/0x25c device_driver_detach+0x20/0x2c This is because during 'rmmod ath10k', ath10k_sdio_remove() will call ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release() will finally be called in ath10k_core_destroy(). This function will free struct cfg80211_registered_device *rdev and all its members, including wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON. After device release, destroy_workqueue() will use NULL pointer then the kernel panic happen. Call trace: ath10k_sdio_remove ->ath10k_core_unregister …… ->ath10k_core_stop ->ath10k_hif_stop ->ath10k_sdio_irq_disable ->ath10k_hif_power_down ->del_timer_sync(&ar_sdio->sleep_timer) ->ath10k_core_destroy ->ath10k_mac_destroy ->ieee80211_free_hw ->wiphy_free …… ->wiphy_dev_release ->destroy_workqueue Need to call destroy_workqueue() before ath10k_core_destroy(), free the work queue buffer first and then free pointer of work queue by ath10k_core_destroy(). This order matches the error path order in ath10k_sdio_probe(). No work will be queued on sdio workqueue between it is destroyed and ath10k_core_destroy() is called. Based on the call_stack above, the reason is: Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and ath10k_sdio_irq_disable() will queue work on sdio workqueue. Sleep timer will be deleted before ath10k_core_destroy() in ath10k_hif_power_down(). ath10k_sdio_irq_disable() only be called in ath10k_hif_stop(). ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif bus, so ath10k_sdio_hif_tx_sg() won't be called anymore. Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2022-28166
In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082.
[ "cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
RHSA-2015:2655
Red Hat Security Advisory: bind security update
bind: responses with a malformed class attribute can trigger an assertion failure in db.c
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
CVE-2017-0925
Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
7.2
4
CVE-2025-26345
A CWE-306 "Missing Authentication for Critical Function" in maxprofile/menu/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to edit user group permissions via crafted HTTP requests.
[]
null
9.8
null
null
CVE-2014-3719
Multiple SQL injection vulnerabilities in cgi-bin/review_m.cgi in Ex Libris ALEPH 500 (Integrated library management system) 18.1 and 20 allow remote attackers to execute arbitrary SQL commands via the (1) find, (2) lib, or (3) sid parameter.
[ "cpe:2.3:a:exlibrisgroup:aleph_500:18.1:*:*:*:*:*:*:*", "cpe:2.3:a:exlibrisgroup:aleph_500:20.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-3v3j-hr3p-qv6j
Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.
[]
null
null
8.8
null
GHSA-m983-q76g-cwpq
Gravity Forms plugin leak hashed passwords
common.php in the Gravity Forms plugin before 2.4.9 for WordPress can leak hashed passwords because user_pass is not considered a special case for a `$current_user->get($property)` call.
[]
null
7.5
null
null
GHSA-v4wx-vjh5-hw9r
In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862991; Issue ID: ALPS05862991.
[]
null
5.5
null
null
GHSA-px9f-597f-wmcf
Uncontrolled Resource Consumption in Apache OpenMeetings server
If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0
[]
null
7.5
null
null