id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-gm9h-jqqh-9434 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.02.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of IFC files. Crafted data in an IFC file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16392. | []
| null | 7.8 | null | null |
|
GHSA-cxp2-364h-667j | The Confetti Fall Animation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'confetti-fall-animation' shortcode in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
|
GHSA-7wwm-57j8-wx2j | An issue was discovered in net/ceph/messenger_v2.c in the Linux kernel before 6.4.5. There is an integer signedness error, leading to a buffer overflow and remote code execution via HELLO or one of the AUTH frames. This occurs because of an untrusted length taken from a TCP packet in ceph_decode_32. | []
| null | 8.8 | null | null |
|
GHSA-vq6c-fvxw-p45v | CSRF vulnerability in Jenkins kubernetes-cd Plugin allow capturing credentials | A cross-site request forgery (CSRF) vulnerability in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | []
| null | 7.1 | null | null |
CVE-2015-4372 | Cross-site scripting (XSS) vulnerability in the Image Title module before 7.x-1.1 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:image_title_project:image_title:*:*:*:*:*:drupal:*:*"
]
| null | null | null | 3.5 |
|
CVE-2022-30045 | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_decode() performs incorrect memory handling while parsing crafted XML files, leading to a heap out-of-bounds read. | [
"cpe:2.3:a:ezxml_project:ezxml:0.8.6:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-mvg2-4m23-mpp3 | In the Linux kernel, the following vulnerability has been resolved:usb: aqc111: check packet for fixup for true limitIf a device sends a packet that is inbetween 0
and sizeof(u64) the value passed to skb_trim()
as length will wrap around ending up as some very
large value.The driver will then proceed to parse the header
located at that position, which will either oops or
process some random value.The fix is to check against sizeof(u64) rather than
0, which the driver currently does. The issue exists
since the introduction of the driver. | []
| null | null | null | null |
|
GHSA-2479-2frf-9263 | Incorrect Privilege Assignment vulnerability in Drupal Private content allows Target Influence via Framing.This issue affects Private content: from 0.0.0 before 2.1.0. | []
| null | 5.5 | null | null |
|
GHSA-rgfq-fxxv-9cxw | Active debug code in some Intel (R) SPS firmware before version SPS_E5_04.04.04.300.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | 7.8 | null | null |
|
CVE-2024-46662 | A improper neutralization of special elements used in a command ('command injection') in Fortinet FortiManager versions 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to escalation of privilege via specifically crafted packets | [
"cpe:2.3:o:fortinet:fortimanager:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.4.1:*:*:*:*:*:*:*"
]
| null | 8.3 | null | null |
|
GHSA-95pm-6wjg-58qw | A vulnerability has been found in AXIS P1204, P3225, P3367, M3045, M3005 and M3007 and classified as problematic. This vulnerability affects unknown code of the component Web Interface. The manipulation leads to improper access controls. The attack can be initiated remotely. It is recommended to upgrade the affected component. | []
| null | 9.8 | null | null |
|
GHSA-vf8q-5pmf-2rv3 | IML32.dll in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2115 and CVE-2011-2116. | []
| null | null | null | null |
|
RHSA-2020:0945 | Red Hat Security Advisory: Red Hat Single Sign-On 7.3.7 security update on RHEL 6 | keycloak: failedLogin Event not sent to BruteForceProtector when using Post Login Flow with Conditional-OTP | [
"cpe:/a:redhat:red_hat_single_sign_on:7::el6"
]
| null | 5.6 | null | null |
CVE-2023-53144 | erofs: fix wrong kunmap when using LZMA on HIGHMEM platforms | In the Linux kernel, the following vulnerability has been resolved:
erofs: fix wrong kunmap when using LZMA on HIGHMEM platforms
As the call trace shown, the root cause is kunmap incorrect pages:
BUG: kernel NULL pointer dereference, address: 00000000
CPU: 1 PID: 40 Comm: kworker/u5:0 Not tainted 6.2.0-rc5 #4
Workqueue: erofs_worker z_erofs_decompressqueue_work
EIP: z_erofs_lzma_decompress+0x34b/0x8ac
z_erofs_decompress+0x12/0x14
z_erofs_decompress_queue+0x7e7/0xb1c
z_erofs_decompressqueue_work+0x32/0x60
process_one_work+0x24b/0x4d8
? process_one_work+0x1a4/0x4d8
worker_thread+0x14c/0x3fc
kthread+0xe6/0x10c
? rescuer_thread+0x358/0x358
? kthread_complete_and_exit+0x18/0x18
ret_from_fork+0x1c/0x28
---[ end trace 0000000000000000 ]---
The bug is trivial and should be fixed now. It has no impact on
!HIGHMEM platforms. | []
| null | null | null | null |
GHSA-hjrw-9jmp-vr8q | A vulnerability in SMA100 allows a remote authenticated attacker with SSLVPN user privileges can inject a path traversal sequence to make any directory on the SMA appliance writable. | []
| null | 8.3 | null | null |
|
GHSA-88vx-49vv-gcx2 | DataVault.Tesla/Impl/TypeSystem/AssociationHelper.cs in datavault allows context-dependent attackers to cause a denial of service (CPU consumption) via an input string composed of an [ (open bracket) followed by many commas, related to a certain regular expression, aka a "ReDoS" vulnerability. | []
| null | null | null | null |
|
CVE-2023-34444 | Cross-site Scripting vulnerability on pages/ajax.searchform.php in Combodo iTop | Combodo iTop is a simple, web based IT Service Management tool. When displaying pages/ajax.searchform.php XSS are possible for scripts outside of script tags. This issue has been fixed in versions 2.7.9, 3.0.4, 3.1.0. All users are advised to upgrade. There are no known workarounds for this vulnerability. | [
"cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
CVE-2022-23549 | Discourse vulnerable to bypass of post max_length using HTML comments | Discourse is an option source discussion platform. Prior to version 2.8.14 on the `stable` branch and version 2.9.0.beta16 on the `beta` and `tests-passed` branches, users can create posts with raw body longer than the `max_length` site setting by including html comments that are not counted toward the character limit. This issue is patched in versions 2.8.14 and 2.9.0.beta16. There are no known workarounds. | [
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:*:*:*:*"
]
| null | 5.7 | null | null |
GHSA-gc43-g62c-99g2 | Improper Access Control in MySQL Connectors Java | Unspecified vulnerability in the MySQL Connectors component in Oracle MySQL 5.1.34 and earlier allows remote authenticated users to affect confidentiality and integrity via unknown vectors related to Connector/J. | []
| null | null | null | null |
CVE-2021-41829 | Zoho ManageEngine Remote Access Plus before 10.1.2121.1 relies on the application's build number to calculate a certain encryption key. | [
"cpe:2.3:a:zohocorp:manageengine_remote_access_plus:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-7hfj-5jj3-9hw6 | This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. An app may be able to gain root privileges | []
| null | 7.8 | null | null |
|
CVE-2023-4969 | GPU kernel implementations susceptible to memory leak | A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures. | [
"cpe:2.3:a:khronos:opencl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:khronos:vulkan:*:*:*:*:*:*:*:*",
"cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:instinct_mi300x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:instinct_mi300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:instinct_mi300a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:instinct_mi300a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:instinct_mi250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:instinct_mi250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:instinct_mi210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:instinct_mi210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:instinct_mi100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:instinct_mi100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_instinct_mi50_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_instinct_mi50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_instinct_mi25_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_instinct_mi25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_v620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_v620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_v520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_v520:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w7600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w7500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w7500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w6400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w6500m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6500m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w6300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w6300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w5700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_pro_w5500x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_pro_w5500x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7900xtx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900xtx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7900xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7800xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7700xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7700xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7600xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_7600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_6950xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6950xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_6900xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6900xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_6800xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_6800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_6800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5300m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5300m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5300xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5300xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5500m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5500m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5500xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5500xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5600m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5600m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5600xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5600xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5700m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5700m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:radeon_rx_5700xt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:radeon_rx_5700xt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7945hx3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7945hx3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7945hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7945hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7845hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7845hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7745hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7745hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7645hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7645hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7940h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7940h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_pro_7945hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_7945hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_pro_7840hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7840hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7840h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7840h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_pro_7840u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7840u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7640hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7640hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7640h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7640h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7640u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7640u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7545u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7545u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7540u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7540u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_7440u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7440u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600gt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600gt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500gt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500gt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7735hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7735hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7736u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7736u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7735u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7735u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7535hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7535hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7535u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7535u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_7335u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7335u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7520u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7520u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_7320u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_7320u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6980hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6980hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6980hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6900hx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_6900hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_6900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_6800u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_6800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_6600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_6600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4980u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4980u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600hs_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4680u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4680u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7950x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7950x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7950x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7900x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_7900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_pro_7945_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_pro_7945:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7800x3d_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7700x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_7700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_7700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_pro_7745_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_pro_7745:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7600x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_pro_7645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_pro_7645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_7500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_7500f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:athlon_3000g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:athlon_3000g:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
CVE-2018-12775 | Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2011-1865 | Multiple stack-based buffer overflows in the inet service in HP OpenView Storage Data Protector 6.00 through 6.20 allow remote attackers to execute arbitrary code via a request containing crafted parameters. | [
"cpe:2.3:a:hp:openview_storage_data_protector:6.00:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_storage_data_protector:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_storage_data_protector:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_storage_data_protector:6.20:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-9pfw-fqv3-483p | In the Linux kernel, the following vulnerability has been resolved:ice: Fix race condition during interface enslaveCommit 5dbbbd01cbba83 ("ice: Avoid RTNL lock when re-creating
auxiliary device") changes a process of re-creation of aux device
so ice_plug_aux_dev() is called from ice_service_task() context.
This unfortunately opens a race window that can result in dead-lock
when interface has left LAG and immediately enters LAG again.Reproducer:This results in:
[20976.208697] Workqueue: ice ice_service_task [ice]
[20976.213422] Call Trace:
[20976.215871] __schedule+0x2d1/0x830
[20976.219364] schedule+0x35/0xa0
[20976.222510] schedule_preempt_disabled+0xa/0x10
[20976.227043] __mutex_lock.isra.7+0x310/0x420
[20976.235071] enum_all_gids_of_dev_cb+0x1c/0x100 [ib_core]
[20976.251215] ib_enum_roce_netdev+0xa4/0xe0 [ib_core]
[20976.256192] ib_cache_setup_one+0x33/0xa0 [ib_core]
[20976.261079] ib_register_device+0x40d/0x580 [ib_core]
[20976.266139] irdma_ib_register_device+0x129/0x250 [irdma]
[20976.281409] irdma_probe+0x2c1/0x360 [irdma]
[20976.285691] auxiliary_bus_probe+0x45/0x70
[20976.289790] really_probe+0x1f2/0x480
[20976.298509] driver_probe_device+0x49/0xc0
[20976.302609] bus_for_each_drv+0x79/0xc0
[20976.306448] __device_attach+0xdc/0x160
[20976.310286] bus_probe_device+0x9d/0xb0
[20976.314128] device_add+0x43c/0x890
[20976.321287] __auxiliary_device_add+0x43/0x60
[20976.325644] ice_plug_aux_dev+0xb2/0x100 [ice]
[20976.330109] ice_service_task+0xd0c/0xed0 [ice]
[20976.342591] process_one_work+0x1a7/0x360
[20976.350536] worker_thread+0x30/0x390
[20976.358128] kthread+0x10a/0x120
[20976.365547] ret_from_fork+0x1f/0x40
...
[20976.438030] task:ip state:D stack: 0 pid:213658 ppid:213627 flags:0x00004084
[20976.446469] Call Trace:
[20976.448921] __schedule+0x2d1/0x830
[20976.452414] schedule+0x35/0xa0
[20976.455559] schedule_preempt_disabled+0xa/0x10
[20976.460090] __mutex_lock.isra.7+0x310/0x420
[20976.464364] device_del+0x36/0x3c0
[20976.467772] ice_unplug_aux_dev+0x1a/0x40 [ice]
[20976.472313] ice_lag_event_handler+0x2a2/0x520 [ice]
[20976.477288] notifier_call_chain+0x47/0x70
[20976.481386] __netdev_upper_dev_link+0x18b/0x280
[20976.489845] bond_enslave+0xe05/0x1790 [bonding]
[20976.494475] do_setlink+0x336/0xf50
[20976.502517] __rtnl_newlink+0x529/0x8b0
[20976.543441] rtnl_newlink+0x43/0x60
[20976.546934] rtnetlink_rcv_msg+0x2b1/0x360
[20976.559238] netlink_rcv_skb+0x4c/0x120
[20976.563079] netlink_unicast+0x196/0x230
[20976.567005] netlink_sendmsg+0x204/0x3d0
[20976.570930] sock_sendmsg+0x4c/0x50
[20976.574423] ____sys_sendmsg+0x1eb/0x250
[20976.586807] ___sys_sendmsg+0x7c/0xc0
[20976.606353] __sys_sendmsg+0x57/0xa0
[20976.609930] do_syscall_64+0x5b/0x1a0
[20976.613598] entry_SYSCALL_64_after_hwframe+0x65/0xcaCommand 'ip link ... set nomaster' causes that ice_plug_aux_dev()
is called from ice_service_task() context, aux device is created
and associated device->lock is taken.Command 'ip link ... set master...' calls ice's notifier under
RTNL lock and that notifier calls ice_unplug_aux_dev(). That
function tries to take aux device->lock but this is already taken
by ice_plug_aux_dev() in step 1Later ice_plug_aux_dev() tries to take RTNL lock but this is already
taken in step 2Dead-lockThe patch fixes this issue by following changes:Bit ICE_FLAG_PLUG_AUX_DEV is kept to be set during ice_plug_aux_dev()
call in ice_service_task()The bit is checked in ice_clear_rdma_cap() and only if it is not set
then ice_unplug_aux_dev() is called. If it is set (in other words
plugging of aux device was requested and ice_plug_aux_dev() is
potentially running) then the function only clears the
---truncated--- | []
| null | 4.7 | null | null |
|
GHSA-g73p-mjxc-vhhv | TCP/IP function included in the firmware of Mitsubishi Electric GOT2000 series (CoreOS with version -Y and earlier installed in GT27 Model, GT25 Model, and GT23 Model) contains an improper access control vulnerability, which may which may allow a remote attacker tobypass access restriction and stop the network functions of the products or execute a malicious program via a specially crafted packet. | []
| null | null | null | null |
|
RHSA-2024:2504 | Red Hat Security Advisory: libssh security update | libssh: ProxyCommand/ProxyJump features allow injection of malicious code through hostname libssh: Missing checks for return values for digests | [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:9::baseos"
]
| null | 3.7 | null | null |
GHSA-38hf-f26w-w4j3 | Buffer overflow in the FTP service on the Tandberg MXP F7.0 allows remote attackers to cause a denial of service (process crash or device reboot) or possibly execute arbitrary code via a long USER command, as demonstrated by a command ending with many space characters. | []
| null | null | null | null |
|
PYSEC-2021-715 | null | TensorFlow is an end-to-end open source platform for machine learning. The reference implementation of the `GatherNd` TFLite operator is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/0d45ea1ca641b21b73bcf9c00e0179cda284e7e7/tensorflow/lite/kernels/internal/reference/reference_ops.h#L966). An attacker can craft a model such that `params` input would be an empty tensor. In turn, `params_shape.Dims(.)` would be zero, in at least one dimension. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | []
| null | null | null | null |
RHSA-2021:5236 | Red Hat Security Advisory: postgresql:13 security update | postgresql: memory disclosure in certain queries postgresql: server processes unencrypted bytes from man-in-the-middle | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 8.1 | null | null |
GHSA-5w98-4m6q-799m | MapUrlToZone Security Feature Bypass Vulnerability | []
| null | 4.3 | null | null |
|
CVE-2023-21924 | Vulnerability in the Oracle Health Sciences InForm product of Oracle Health Sciences Applications (component: Core). Supported versions that are affected are Prior to 6.3.1.3 and Prior to 7.0.0.1. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Health Sciences InForm. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Health Sciences InForm, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Health Sciences InForm accessible data as well as unauthorized read access to a subset of Oracle Health Sciences InForm accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Health Sciences InForm. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L). | [
"cpe:2.3:a:oracle:health_sciences_inform:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:health_sciences_inform:7.0.0.0:*:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
|
GHSA-3q3f-m2cj-5323 | IBM Engineering products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 192435. | []
| null | null | null | null |
|
GHSA-fpgq-qv2c-6787 | A vulnerability exists in the garbage collection mechanism of atomic-openshift. An attacker able spoof the UUID of a valid object from another namespace is able to delete children of those objects. Versions 3.6, 3.7, 3.8, 3.9, 3.10, 3.11 and 4.1 are affected. | []
| null | null | 5.4 | null |
|
CVE-2022-44314 | PicoC Version 3.2.2 was discovered to contain a heap buffer overflow in the StringStrncpy function in cstdlib/string.c when called from ExpressionParseFunctionCall. | [
"cpe:2.3:a:picoc_project:picoc:3.2.2:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2023-26401 | ZDI-CAN-20278: Adobe Dimension USD File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Dimension version 3.4.8 (and earlier) is affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2023-39659 | An issue in langchain langchain-ai v.0.0.232 and before allows a remote attacker to execute arbitrary code via a crafted script to the PythonAstREPLTool._run component. | [
"cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-85fc-m2vq-4r26 | Mozilla Firefox before 15.0 on Android does not properly implement unspecified callers of the __android_log_print function, which allows remote attackers to execute arbitrary code via a crafted web page that calls the JavaScript dump function. | []
| null | null | null | null |
|
CVE-2023-34142 | Cleartext Transmission Vulnerability in Hitachi Device Manager | Cleartext Transmission of Sensitive Information vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Server, Device Manager Agent, Host Data Collector components) allows Interception.This issue affects Hitachi Device Manager: before 8.8.5-02.
| [
"cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 9 | null | null |
CVE-2022-36563 | Incorrect access control in the install directory (C:\RailsInstaller) of Rubyinstaller2 v3.1.2 and below allows authenticated attackers to execute arbitrary code via overwriting binaries located in the directory. | [
"cpe:2.3:a:rubyinstaller:rubyinstaller2:*:*:*:*:*:ruby:*:*"
]
| null | 8.8 | null | null |
|
GHSA-ccvf-q4m9-xf67 | This issue was addressed by restricting options offered on a locked device. This issue is fixed in macOS Sonoma 14.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1. An attacker with physical access may be able to use Siri to access sensitive user data. | []
| null | 4.6 | null | null |
|
GHSA-r4hf-7fhj-q7fq | In the Linux kernel, the following vulnerability has been resolved:ixgbe: fix unbalanced device enable/disable in suspend/resumepci_disable_device() called in __ixgbe_shutdown() decreases
dev->enable_cnt by 1. pci_enable_device_mem() which increases
dev->enable_cnt by 1, was removed from ixgbe_resume() in commit
6f82b2558735 ("ixgbe: use generic power management"). This caused
unbalanced increase/decrease. So add pci_enable_device_mem() back.Fix the following call trace.ixgbe 0000:17:00.1: disabling already-disabled device
Call Trace:
__ixgbe_shutdown+0x10a/0x1e0 [ixgbe]
ixgbe_suspend+0x32/0x70 [ixgbe]
pci_pm_suspend+0x87/0x160
? pci_pm_freeze+0xd0/0xd0
dpm_run_callback+0x42/0x170
__device_suspend+0x114/0x460
async_suspend+0x1f/0xa0
async_run_entry_fn+0x3c/0xf0
process_one_work+0x1dd/0x410
worker_thread+0x34/0x3f0
? cancel_delayed_work+0x90/0x90
kthread+0x14c/0x170
? kthread_park+0x90/0x90
ret_from_fork+0x1f/0x30 | []
| null | 5.5 | null | null |
|
GHSA-v92p-w44j-35xr | D-Link DCS-825L devices with firmware 1.08 do not employ a suitable mechanism to prevent denial-of-service (DoS) attacks. An attacker can harm the device availability (i.e., live-online video/audio streaming) by using the hping3 tool to perform an IPv4 flood attack. Verified attacks includes SYN flooding, UDP flooding, ICMP flooding, and SYN-ACK flooding. | []
| null | null | 7.5 | null |
|
CVE-2009-4010 | Unspecified vulnerability in PowerDNS Recursor before 3.1.7.2 allows remote attackers to spoof DNS data via crafted zones. | [
"cpe:2.3:a:powerdns:recursor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:2.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:2.9.15:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:2.9.16:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:2.9.17:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:2.9.18:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:powerdns:recursor:3.1.7.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-mf4c-rpx4-7c39 | The News Kit Elementor Addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.1 via the render function in includes/widgets/canvas-menu/canvas-menu.php. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive private, pending, and draft Elementor template data. | []
| null | 4.3 | null | null |
|
GHSA-wp99-xcpc-rj24 | Microsoft Exchange Server Remote Code Execution Vulnerability | []
| null | 8 | null | null |
|
GHSA-vwcw-f8wh-8pv7 | In the Linux kernel, the following vulnerability has been resolved:dmaengine: idxd: Refactor remove call with idxd_cleanup() helperThe idxd_cleanup() helper cleans up perfmon, interrupts, internals and
so on. Refactor remove call with the idxd_cleanup() helper to avoid code
duplication. Note, this also fixes the missing put_device() for idxd
groups, enginces and wqs. | []
| null | null | null | null |
|
GHSA-4w85-9rq6-pxww | A vulnerability has been found in PHPGurukul Art Gallery Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-art-type-detail.php?editid=1. The manipulation of the argument arttype leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | null | null |
|
CVE-2022-3305 | Use after free in survey in Google Chrome on ChromeOS prior to 106.0.5249.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-v882-ccj6-jc48 | Rack vulnerable to Denial of Service | Unspecified vulnerability in `Rack::Auth::AbstractRequest` in Rack 1.1.x before 1.1.5, 1.2.x before 1.2.7, 1.3.x before 1.3.9, and 1.4.x before 1.4.4 allows remote attackers to cause a denial of service via unknown vectors related to "symbolized arbitrary strings." | []
| null | null | null | null |
GHSA-pch4-wfwx-j685 | On Aspire-derived NEC PBXes, including all versions of SV8100 devices, a set of documented, static login credentials may be used to access the DIM interface. | []
| null | null | null | null |
|
GHSA-2p69-gxpm-5469 | Downloads Resources over HTTP in alto-saxophone | Affected versions of `alto-saxophone` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `alto-saxophone`.RecommendationUpdate to version 2.25.1 or later. | []
| null | null | null | null |
CVE-2025-7595 | code-projects Job Diary view-cad.php sql injection | A vulnerability was found in code-projects Job Diary 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /view-cad.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | []
| 6.9 | 7.3 | 7.3 | 7.5 |
GHSA-gcjr-346m-7x54 | This vulnerability allows local attackers to escalate privileges on affected Tesla vehicles. An attacker must first obtain the ability to execute privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the bcmdhd driver. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-17544. | []
| null | 7.8 | null | null |
|
GHSA-v57c-67jc-mg6g | When SAP Commerce Cloud version 100, hosts a JavaScript storefront, it is vulnerable to MIME sniffing, which, in certain circumstances, could be used to facilitate an XSS attack or malware proliferation. | []
| null | null | null | null |
|
GHSA-3f64-v74g-7p75 | A vulnerability was found in PHPGurukul Maid Hiring Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to cross site scripting. The attack may be launched remotely. | []
| 5.1 | 2.4 | null | null |
|
GHSA-p79j-rp99-7cmv | A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process. This affects the libhevc library. Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32915871. | []
| null | null | 7.8 | null |
|
GHSA-gh2w-wqm3-32m4 | compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. | []
| null | 8.8 | null | null |
|
GHSA-4mfr-jgjm-cvx8 | OpenText Carbonite Server Backup Portal before 8.8.7 allows XSS by an authenticated user via policy creation. | []
| null | null | null | null |
|
GHSA-vc8q-vv59-f54c | Mealie1.0.0beta3 does not terminate download tokens after a user logs out, allowing attackers to perform a man-in-the-middle attack via a crafted GET request. | []
| null | 5.9 | null | null |
|
GHSA-v4qf-2m5f-gvqh | Online Tours & Travels Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/update_expense_category.php. | []
| null | 7.2 | null | null |
|
GHSA-fp87-jfrm-4f3f | An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | []
| null | 6.7 | null | null |
|
CVE-2023-1597 | tagDiv Cloud Library < 2.7 - Unauthenticated Arbitrary User Metadata Update to Privilege Escalation | The tagDiv Cloud Library WordPress plugin before 2.7 does not have authorisation and CSRF in an AJAX action accessible to both unauthenticated and authenticated users, allowing unauthenticated users to change arbitrary user metadata, which could lead to privilege escalation by setting themselves as an admin of the blog. | [
"cpe:2.3:a:tagdiv:cloud_library:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | null |
GHSA-x998-f397-q83g | Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability." | []
| null | null | null | null |
|
CVE-2016-6342 | elog 3.1.1 allows remote attackers to post data as any username in the logbook. | [
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:a:elog_project:elog:3.1.1:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
CVE-2024-8572 | Gouniverse GoLang CMS FrontendHandler.go PageRenderHtmlByAlias cross site scripting | A vulnerability was found in Gouniverse GoLang CMS 1.4.0. It has been declared as problematic. This vulnerability affects the function PageRenderHtmlByAlias of the file FrontendHandler.go. The manipulation of the argument alias leads to cross site scripting. The attack can be initiated remotely. Upgrading to version 1.4.1 is able to address this issue. The patch is identified as 3e661cdfb4beeb9fe2ad507cdb8104c0b17d072c. It is recommended to upgrade the affected component. | [
"cpe:2.3:a:gouniverse:golang_cms:*:*:*:*:*:*:*:*"
]
| 5.3 | 3.5 | 3.5 | 4 |
CVE-2018-14015 | The sdb_set_internal function in sdb.c in radare2 2.7.0 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted ELF file because of missing input validation in r_bin_dwarf_parse_comp_unit in libr/bin/dwarf.c. | [
"cpe:2.3:a:radare:radare2:2.7.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-h3hj-8cpp-cwgw | Multiple SQL injection vulnerabilities in the (1) calendar and (2) infolog modules for phpgroupware 0.9.14 allow remote attackers to perform unauthorized database operations. | []
| null | null | null | null |
|
CVE-2016-4976 | Apache Ambari 2.x before 2.4.0 includes KDC administrator passwords on the kadmin command line, which allows local users to obtain sensitive information via a process listing. | [
"cpe:2.3:a:apache:ambari:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ambari:2.2.2:*:*:*:*:*:*:*"
]
| null | null | 5.5 | 2.1 |
|
CVE-2023-36869 | Azure DevOps Server Spoofing Vulnerability | Azure DevOps Server Spoofing Vulnerability | [
"cpe:2.3:o:microsoft:azure_devops_server:2019.0.1:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2019.1.2:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2020.1.2:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:azure_devops_server:2022.0.1:-:*:*:*:*:*:*"
]
| null | 6.3 | null | null |
GHSA-x7p7-8c27-hjgq | PHP remote file inclusion vulnerability in admin.wmtportfolio.php in the webmaster-tips.net wmtportfolio 1.0 (com_wmtportfolio) component for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter. | []
| null | null | null | null |
|
GHSA-8699-m855-cwqf | Cross-site scripting in Elasticsearch | Cross-site scripting (XSS) vulnerability in the CORS functionality in Elasticsearch before 1.4.0.Beta1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
GHSA-vvvq-q595-47g3 | The Streamit theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.2. This is due to the plugin not properly validating a user's identity prior to updating their details like email in the 'st_Authentication_Controller::edit_profile' function. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account. | []
| null | 8.8 | null | null |
|
GHSA-7x7r-fcfg-xc97 | Vulnerability in wordpress plugin image-gallery-with-slideshow v1.5.2, There is a stored XSS vulnerability via the $value->gallery_name and $value->gallery_description where anyone with privileges to modify or add galleries/images and inject javascript into the database. | []
| null | null | 5.4 | null |
|
GHSA-q493-fq52-3qhm | A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could exploit this vulnerability by sending a crafted OOXML file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process to crash, resulting in a denial of service condition. | []
| null | 7.5 | null | null |
|
GHSA-r3fq-9r25-fh69 | BAB TECHNOLOGIE GmbH eibPort V3 prior version 3.9.1 contains basic SSRF vulnerability. It allow unauthenticated attackers to request to any internal and external server. | []
| null | null | null | null |
|
RHSA-2023:6154 | Red Hat Security Advisory: Secondary Scheduler Operator for Red Hat OpenShift 1.2.0 | golang: html/template: improper handling of HTML-like comments within script contexts golang: html/template: improper handling of special tags within script contexts golang: crypto/tls: panic when processing post-handshake message on QUIC connections golang: crypto/tls: lack of a limit on buffered post-handshake golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack) | [
"cpe:/a:redhat:openshift_secondary_scheduler:1.2::el8"
]
| null | 7.5 | null | null |
CVE-2021-22203 | An issue has been discovered in GitLab CE/EE affecting all versions starting from 13.7.9 before 13.8.7, all versions starting from 13.9 before 13.9.5, and all versions starting from 13.10 before 13.10.1. A specially crafted Wiki page allowed attackers to read arbitrary files on the server. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.10.0:*:*:*:enterprise:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2018-19111 | The Google Cardboard application 1.8 for Android and 1.2 for iOS sends potentially private cleartext information to the Unity 3D Stats web site, as demonstrated by device make, model, and OS. | [
"cpe:2.3:a:google:cardboard:1.2:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:google:cardboard:1.8:*:*:*:*:android:*:*"
]
| null | null | 5.3 | 5 |
|
GHSA-463r-m79g-7hv3 | PHP remote file inclusion vulnerability in hu/modules/reg-new/modstart.php in Sofi WebGui 0.6.3 PRE and earlier allows remote attackers to execute arbitrary PHP code via a URL in the mod_dir parameter. | []
| null | null | null | null |
|
GHSA-fr57-5xm9-fpgw | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FlickDevs Elementor Button Plus allows Stored XSS.This issue affects Elementor Button Plus: from n/a through 1.3.3. | []
| null | 6.5 | null | null |
|
GHSA-qgq2-9mq2-x25j | Versions of VISAM VBASE Automation Base prior to 11.7.5 may disclose information if a valid user opens a specially crafted file. | []
| null | 5.5 | null | null |
|
GHSA-mgjr-3gvp-wpc2 | liblber/io.c in OpenLDAP 2.2.4 to 2.4.10 allows remote attackers to cause a denial of service (program termination) via crafted ASN.1 BER datagrams that trigger an assertion error. | []
| null | null | null | null |
|
CVE-2024-52812 | LF Edge eKuiper has Stored XSS in Rules Functionality | LF Edge eKuiper is an internet-of-things data analytics and stream processing engine. Prior to version 2.0.8, auser with rights to modify the service (e.g. kuiperUser role) can inject a cross-site scripting payload into the rule `id` parameter. Then, after any user with access to this service (e.g. admin) tries make any modifications with the rule (update, run, stop, delete), a payload acts in the victim's browser. Version 2.0.8 fixes the issue. | []
| null | 5.4 | null | null |
GHSA-4w2r-p3vj-jj74 | SQL injection vulnerability in Open-Xchange (OX) AppSuite before 7.4.2-rev36 and 7.6.x before 7.6.0-rev23 allows remote authenticated users to execute arbitrary SQL commands via a crafted jslob API call. | []
| null | null | null | null |
|
GHSA-42f2-f9vc-6365 | Private key leak in Apache CXF | Apache CXF ships with a OpenId Connect JWK Keys service, which allows a client to obtain the public keys in JWK format, which can then be used to verify the signature of tokens issued by the service. Typically, the service obtains the public key from a local keystore (JKS/PKCS12) by specifing the path of the keystore and the alias of the keystore entry. This case is not vulnerable. However it is also possible to obtain the keys from a JWK keystore file, by setting the configuration parameter `rs.security.keystore.type` to `jwk`. For this case all keys are returned in this file "as is", including all private key and secret key credentials. This is an obvious security risk if the user has configured the signature keystore file with private or secret key credentials. From CXF 3.3.5 and 3.2.12, it is mandatory to specify an alias corresponding to the id of the key in the JWK file, and only this key is returned. In addition, any private key information is omitted by default. `oct` keys, which contain secret keys, are not returned at all. | []
| null | 7.5 | null | null |
CVE-2019-7104 | Adobe Shockwave Player versions 12.3.4.204 and earlier have a memory corruption vulnerability. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
CVE-2016-0580 | Unspecified vulnerability in the Oracle Report Manager component in Oracle E-Business Suite 11.5.10.2 allows remote attackers to affect availability via unknown vectors. | [
"cpe:2.3:a:oracle:report_manager:11.5.10.2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
RHSA-2022:5069 | Red Hat Security Advisory: OpenShift Container Platform 4.11.0 bug fix and security update | nanoid: Information disclosure via valueOf() function sanitize-url: XSS due to improper sanitization in sanitizeUrl function opencontainers: OCI manifest and index parsing confusion golang.org/x/crypto: empty plaintext packet causes panic minimist: prototype pollution node-fetch: exposure of sensitive information to an unauthorized actor prometheus/client_golang: Denial of service using InstrumentHandlerCounter go-getter: command injection vulnerability golang: crash in a golang.org/x/crypto/ssh server go-getter: writes SSH credentials into logfile, exposing sensitive credentials to local uses go-getter: unsafe download (issue 1 of 3) go-getter: unsafe download (issue 2 of 3) go-getter: unsafe download (issue 3 of 3) | [
"cpe:/a:redhat:openshift:4.11::el8"
]
| null | 8.6 | null | null |
CVE-2024-7342 | Baidu UEditor unrestricted upload | A vulnerability was found in Baidu UEditor 1.4.3.3. It has been classified as problematic. This affects an unknown part of the file /ueditor/php/controller.php?action=uploadfile&encode=utf-8. The manipulation of the argument upfile leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-273273 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:baidu:ueditor:1.4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:baidu:ueditor:*:*:*:*:*:*:*:*"
]
| 5.3 | 3.5 | 3.5 | 4 |
CVE-2024-56599 | wifi: ath10k: avoid NULL pointer error during sdio remove | In the Linux kernel, the following vulnerability has been resolved:
wifi: ath10k: avoid NULL pointer error during sdio remove
When running 'rmmod ath10k', ath10k_sdio_remove() will free sdio
workqueue by destroy_workqueue(). But if CONFIG_INIT_ON_FREE_DEFAULT_ON
is set to yes, kernel panic will happen:
Call trace:
destroy_workqueue+0x1c/0x258
ath10k_sdio_remove+0x84/0x94
sdio_bus_remove+0x50/0x16c
device_release_driver_internal+0x188/0x25c
device_driver_detach+0x20/0x2c
This is because during 'rmmod ath10k', ath10k_sdio_remove() will call
ath10k_core_destroy() before destroy_workqueue(). wiphy_dev_release()
will finally be called in ath10k_core_destroy(). This function will free
struct cfg80211_registered_device *rdev and all its members, including
wiphy, dev and the pointer of sdio workqueue. Then the pointer of sdio
workqueue will be set to NULL due to CONFIG_INIT_ON_FREE_DEFAULT_ON.
After device release, destroy_workqueue() will use NULL pointer then the
kernel panic happen.
Call trace:
ath10k_sdio_remove
->ath10k_core_unregister
……
->ath10k_core_stop
->ath10k_hif_stop
->ath10k_sdio_irq_disable
->ath10k_hif_power_down
->del_timer_sync(&ar_sdio->sleep_timer)
->ath10k_core_destroy
->ath10k_mac_destroy
->ieee80211_free_hw
->wiphy_free
……
->wiphy_dev_release
->destroy_workqueue
Need to call destroy_workqueue() before ath10k_core_destroy(), free
the work queue buffer first and then free pointer of work queue by
ath10k_core_destroy(). This order matches the error path order in
ath10k_sdio_probe().
No work will be queued on sdio workqueue between it is destroyed and
ath10k_core_destroy() is called. Based on the call_stack above, the
reason is:
Only ath10k_sdio_sleep_timer_handler(), ath10k_sdio_hif_tx_sg() and
ath10k_sdio_irq_disable() will queue work on sdio workqueue.
Sleep timer will be deleted before ath10k_core_destroy() in
ath10k_hif_power_down().
ath10k_sdio_irq_disable() only be called in ath10k_hif_stop().
ath10k_core_unregister() will call ath10k_hif_power_down() to stop hif
bus, so ath10k_sdio_hif_tx_sg() won't be called anymore.
Tested-on: QCA6174 hw3.2 SDIO WLAN.RMH.4.4.1-00189 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2022-28166 | In Brocade SANnav version before SANN2.2.0.2 and Brocade SANNav before 2.1.1.8, the implementation of TLS/SSL Server Supports the Use of Static Key Ciphers (ssl-static-key-ciphers) on ports 443 & 18082. | [
"cpe:2.3:a:broadcom:sannav:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
RHSA-2015:2655 | Red Hat Security Advisory: bind security update | bind: responses with a malformed class attribute can trigger an assertion failure in db.c | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation",
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | null | null |
CVE-2017-0925 | Gitlab Enterprise Edition version 10.1.0 is vulnerable to an insufficiently protected credential issue in the project service integration API endpoint resulting in an information disclosure of plaintext password. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 7.2 | 4 |
|
CVE-2025-26345 | A CWE-306 "Missing Authentication for Critical Function" in maxprofile/menu/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to edit user group permissions via crafted HTTP requests. | []
| null | 9.8 | null | null |
|
CVE-2014-3719 | Multiple SQL injection vulnerabilities in cgi-bin/review_m.cgi in Ex Libris ALEPH 500 (Integrated library management system) 18.1 and 20 allow remote attackers to execute arbitrary SQL commands via the (1) find, (2) lib, or (3) sid parameter. | [
"cpe:2.3:a:exlibrisgroup:aleph_500:18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:exlibrisgroup:aleph_500:20.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-3v3j-hr3p-qv6j | Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding. | []
| null | null | 8.8 | null |
|
GHSA-m983-q76g-cwpq | Gravity Forms plugin leak hashed passwords | common.php in the Gravity Forms plugin before 2.4.9 for WordPress can leak hashed passwords because user_pass is not considered a special case for a `$current_user->get($property)` call. | []
| null | 7.5 | null | null |
GHSA-v4wx-vjh5-hw9r | In ion driver, there is a possible information disclosure due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862991; Issue ID: ALPS05862991. | []
| null | 5.5 | null | null |
|
GHSA-px9f-597f-wmcf | Uncontrolled Resource Consumption in Apache OpenMeetings server | If was found that the NetTest web service can be used to overload the bandwidth of a Apache OpenMeetings server. This issue was addressed in Apache OpenMeetings 6.0.0 | []
| null | 7.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.