id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
PYSEC-2021-549
| null |
TensorFlow is an end-to-end open source platform for machine learning. In affected versions the implementation of `tf.raw_ops.SparseDenseCwiseDiv` is vulnerable to a division by 0 error. The [implementation](https://github.com/tensorflow/tensorflow/blob/a1bc56203f21a5a4995311825ffaba7a670d7747/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc#L56) uses a common class for all binary operations but fails to treat the division by 0 case separately. We have patched the issue in GitHub commit d9204be9f49520cdaaeb2541d1dc5187b23f31d9. The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.
|
[] | null | null | null | null |
GHSA-j7qj-hw73-j3f2
|
SQL injection vulnerability in index.asp in Katy Whitton BlogIt! allows remote attackers to execute arbitrary SQL commands via the (1) month and (2) year parameters. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null |
|
GHSA-j269-5p85-wxpq
|
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network.We have already fixed the vulnerability in the following versions:
QTS 5.1.5.2645 build 20240116 and later
QuTS hero h5.1.5.2647 build 20240118 and later
QuTScloud c5.1.5.2651 and later
|
[] | null | 5.8 | null | null |
|
CVE-2018-10307
|
error.php in ILIAS 5.2.x through 5.3.x before 5.3.4 allows XSS via the text of a PDO exception.
|
[
"cpe:2.3:a:ilias:ilias:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-c3p6-cwjh-4h46
|
config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
|
[] | null | null | null | null |
|
GHSA-rhm8-6pc7-6j49
|
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .epub file, related to "Data from Faulting Address controls Branch Selection starting at STDUEPubFile!DllUnregisterServer+0x0000000000039335."
|
[] | null | null | 7.8 | null |
|
GHSA-m39f-3w96-jj8p
|
The Custom Field Suite plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a meta import in all versions up to, and including, 2.6.4 due to insufficient input sanitization and output escaping on the meta values. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
|
[] | null | 4.4 | null | null |
|
GHSA-qchq-46j8-vq4j
|
A vulnerability was found in TOTOLINK AC1200 T8 4.1.5cu.862_B20230228. It has been declared as critical. This vulnerability affects the function setTracerouteCfg. The manipulation leads to buffer overflow. The attack can be initiated remotely. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 8.7 | 8.8 | null | null |
|
GHSA-6f8g-qc5x-gxr3
|
Diamond through 3.0.1.2 (a chain-based proof-of-stake cryptocurrency) allows a remote denial of service, exploitable by an attacker who acquires even a small amount of stake/coins in the system. The attacker sends invalid headers/blocks, which are stored on the victim's disk.
|
[] | null | 7.5 | null | null |
|
GHSA-8gxg-5254-fr47
|
Integer overflow in ImageIO for Apple Mac OS X 10.4.7 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Radiance image.
|
[] | null | null | null | null |
|
GHSA-52x4-mg6c-cvc8
|
Akuvox E11 cloud login is performed through an unencrypted HTTP connection. An attacker could gain access to the Akuvox cloud and device if the MAC address of a device if known.
|
[] | null | 7.5 | null | null |
|
CVE-2024-55653
|
pwndoc's UnhandledPromiseRejection on audits causes Denial of Service (DoS)
|
PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available.
|
[] | null | 6.5 | null | null |
GHSA-3g9f-8686-jjj9
|
Console: CORS headers set to allow all in Red Hat AMQ.
|
[] | null | 7.5 | null | null |
|
CVE-2014-1278
|
The ptmx_get_ioctl function in the ARM kernel in Apple iOS before 7.1 and Apple TV before 6.1 allows local users to gain privileges or cause a denial of service (out-of-bounds memory access and device crash) via a crafted call.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-4598-cfq4-7mqj
|
Symbol Access Portable Data Terminal (PDT) 8100 does not hide the default WEP keys if they are not changed, which could allow attackers to retrieve the keys and gain access to the wireless network.
|
[] | null | null | null | null |
|
CVE-2024-2011
|
A heap-based buffer overflow vulnerability exists in the FOXMAN-UN/UNEM that
if exploited will generally lead to a denial of service but can be used
to execute arbitrary code, which is usually outside the scope of a
program's implicit security policy
|
[
"cpe:2.3:a:hitachi_energy:foxman-un:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachi_energy:unem:*:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r15a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r15b:pc4:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r16a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:foxman-un:r16b:pc2:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r15a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r15b:pc4:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r16a:*:*:*:*:*:*:*",
"cpe:2.3:a:hitachienergy:unem:r16b:pc2:*:*:*:*:*:*"
] | null | 8.6 | null | null |
|
RHSA-2006:0140
|
Red Hat Security Advisory: kernel security update
|
security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null |
CVE-2008-1500
|
Cross-site scripting (XSS) vulnerability in index.php in TinyPortal 0.8.6 and 1.0.3 allows remote attackers to inject arbitrary web script or HTML via the PHPSESSID parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:tinyportal:tinyportal:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:tinyportal:tinyportal:1.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gwxw-3qw5-mfrx
|
Directory traversal vulnerability in RockMongo 1.1.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the ROCK_LANG cookie, as demonstrated in a login.index action to index.php.
|
[] | null | null | null | null |
|
GHSA-vvch-684v-5f39
|
Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable disclosure of information via local access.
|
[] | null | null | 5.5 | null |
|
CVE-2018-15664
|
In Docker through 18.06.1-ce-rc2, the API endpoints behind the 'docker cp' command are vulnerable to a symlink-exchange attack with Directory Traversal, giving attackers arbitrary read-write access to the host filesystem with root privileges, because daemon/archive.go does not do archive operations on a frozen filesystem (or from within a chroot).
|
[
"cpe:2.3:a:docker:docker:17.06.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.0-ce:rc4:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.0-ce:rc5:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.1-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.1-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.1-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.1-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.1-ce:rc4:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.2-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.06.2-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.07.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.07.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.07.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.07.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.07.0-ce:rc4:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.09.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.09.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.09.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.09.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.09.1-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.09.1-ce-:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.10.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.10.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.10.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.11.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.11.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.11.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.11.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.11.0-ce:rc4:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.0-ce:rc4:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.1-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.1-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:17.12.1-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.01.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.01.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.02.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.02.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.02.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.0-ce:rc4:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.1-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.1-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.03.1-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.04.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.04.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.04.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.05.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.05.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.06.0-ce:*:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.06.0-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.06.0-ce:rc2:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.06.0-ce:rc3:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.06.1-ce:rc1:*:*:community:*:*:*",
"cpe:2.3:a:docker:docker:18.06.1-ce:rc2:*:*:community:*:*:*"
] | null | null | 7.5 | 6.2 |
|
GHSA-5jxr-6rhg-7frf
|
Media CP Media Control Panel latest version. Reflected XSS possible through unspecified endpoint.
|
[] | null | 6.1 | null | null |
|
CVE-2023-41671
|
WordPress Abandoned Cart Lite for WooCommerce plugin <= 5.16.1 - Cross Site Request Forgery (CSRF) vulnerability
|
Missing Authorization vulnerability in Tyche Softwares Abandoned Cart Lite for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Abandoned Cart Lite for WooCommerce: from n/a through 5.16.1.
|
[] | null | 5.4 | null | null |
GHSA-2f87-f3xg-gj6p
|
Improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in Network WOL functionality in Synology Router Manager (SRM) before 1.3.1-9346-10 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | 5.9 | null | null |
|
GHSA-8276-hmm2-6q4h
|
A buffer overflow vulnerability exists in PDF Shaper versions 3.5 and 3.6 when converting a crafted PDF file to an image using the 'Convert PDF to Image' functionality. An attacker can exploit this vulnerability by tricking a user into opening a maliciously crafted PDF file, leading to arbitrary code execution under the context of the user. This vulnerability has been verified on Windows XP, 7, 8, and 10 platforms using the PDFTools.exe component.
|
[] | 8.4 | null | null | null |
|
RHSA-2024:4633
|
Red Hat Security Advisory: 389-ds-base security update
|
389-ds-base: a heap overflow leading to denail-of-servce while writing a value larger than 256 chars (in log_entry_attr) 389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request 389-ds-base: Malformed userPassword hash may cause Denial of Service
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 5.7 | null | null |
CVE-2015-7384
|
Node.js 4.0.0, 4.1.0, and 4.1.1 allows remote attackers to cause a denial of service.
|
[
"cpe:2.3:a:nodejs:node.js:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:nodejs:node.js:4.1.1:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-vp9x-6f47-r7r2
|
Multiple unspecified vulnerabilities in Firefox before 1.5.0.7, Thunderbird before 1.5.0.7, and SeaMonkey before 1.0.5 allow remote attackers to cause a denial of service (crash), corrupt memory, and possibly execute arbitrary code via unspecified vectors, some of which involve JavaScript, and possibly large images or plugin data.
|
[] | null | null | null | null |
|
GHSA-7f9x-cwvq-3x4j
|
A vulnerability was found in SourceCodester Electronic Medical Records System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file administrator.php of the component Cookie Handler. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-222163.
|
[] | null | 9.8 | null | null |
|
RHSA-2021:0248
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.3.5 security update
|
apache-httpclient: incorrect handling of malformed authority component in request URIs resteasy-client: potential sensitive information leakage in JAX-RS RESTEasy Client's WebApplicationException handling wildfly: resource adapter logs plaintext JMS password at warning level on connection error wildfly-core: memory leak in WildFly host-controller in domain mode while not able to reconnect to domain-controller undertow: special character in query results in server errors wildfly: Potential Memory leak in Wildfly when using OpenTracing
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:7.3::el8"
] | null | 5.9 | null | null |
CVE-2021-31376
|
Junos OS: ACX Series: Packet Forwarding Engine manager (FXPC) process crashes when processing DHCPv6 packets
|
An Improper Input Validation vulnerability in Packet Forwarding Engine manager (FXPC) process of Juniper Networks Junos OS allows an attacker to cause a Denial of Service (DoS) by sending specific DHCPv6 packets to the device and crashing the FXPC service. Continued receipt and processing of this specific packet will create a sustained Denial of Service (DoS) condition. This issue affects only the following platforms in ACX Series: ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096 devices. Other ACX platforms are not affected from this issue. This issue affects Juniper Networks Junos OS on ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096: 18.4 version 18.4R3-S7 and later versions prior to 18.4R3-S8. This issue does not affect: Juniper Networks Junos OS 18.4 versions prior to 18.4R3-S7 on ACX500, ACX1000, ACX1100, ACX2100, ACX2200, ACX4000, ACX5048, ACX5096.
|
[
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx1000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx1100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx2200:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx4000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx500:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx5048:-:*:*:*:*:*:*:*",
"cpe:2.3:h:juniper:acx5096:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-j2vc-96xv-2jh3
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153.
|
[] | null | 8.8 | null | null |
|
CVE-2021-46485
|
Jsish v3.5.0 was discovered to contain a SEGV vulnerability via Jsi_ValueIsNumber at src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
|
[
"cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-9wh7-3gp5-48qg
|
A vulnerability was found in Tenda AC7 15.03.06.44. It has been declared as critical. Affected by this vulnerability is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument reboot_time leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | null | null |
|
GHSA-qr95-q293-28w5
|
PCManFM 1.2.5 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (application unavailability).
|
[] | null | null | 5.5 | null |
|
CVE-2021-33478
|
The TrustZone implementation in certain Broadcom MediaxChange firmware could allow an unauthenticated, physically proximate attacker to achieve arbitrary code execution in the TrustZone Trusted Execution Environment (TEE) of an affected device. This, for example, affects certain Cisco IP Phone and Wireless IP Phone products before 2021-07-07. Exploitation is possible only when the attacker can disassemble the device in order to control the voltage/current for chip pins.
|
[
"cpe:2.3:o:cisco:ip_phone_8800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8800_series_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8811_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8841_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8845_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8851_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8861_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8865_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ip_phone_8865_with_multiplatform_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_ip_phone_8821_firmware:*:*:*:*:*:*:*:*"
] | null | 6.8 | null | 4.6 |
|
CVE-2016-2775
|
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
|
[
"cpe:2.3:o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:s1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.9.9:s1rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:beta1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:beta2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:beta3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.10.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.11.0:beta1:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | 4.3 |
|
GHSA-2hhf-gxff-r59q
|
A reflected cross-site scripting (XSS) vulnerability in msaad1999's PHP-Login-System 2.0.1 allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the 'selector' parameter in '/reset-password'.
|
[] | null | 6.1 | null | null |
|
RHSA-2024:4092
|
Red Hat Security Advisory: redhat-ds:12 security, bug fix update
|
389-ds-base: Malformed userPassword may cause crash at do_modify in slapd/modify.c 389-ds-base: potential denial of service via specially crafted kerberos AS-REQ request
|
[
"cpe:/a:redhat:directory_server:12.4::el9"
] | null | 7.5 | null | null |
GHSA-6w3p-7vr4-75hx
|
An unsafe deserialization vulnerability exists in CA Release Automation (Nolio) 6.6 with the DataManagement component that can allow a remote attacker to execute arbitrary code.
|
[] | null | null | null | null |
|
GHSA-7p99-x6w8-v88h
|
A vulnerability has been identified in RUGGEDCOM RM1224 LTE(4G) EU (All versions < V7.2.2), RUGGEDCOM RM1224 LTE(4G) NAM (All versions < V7.2.2), SCALANCE M804PB (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex A) (All versions < V7.2.2), SCALANCE M812-1 ADSL-Router (Annex B) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex A) (All versions < V7.2.2), SCALANCE M816-1 ADSL-Router (Annex B) (All versions < V7.2.2), SCALANCE M826-2 SHDSL-Router (All versions < V7.2.2), SCALANCE M874-2 (All versions < V7.2.2), SCALANCE M874-3 (All versions < V7.2.2), SCALANCE M876-3 (EVDO) (All versions < V7.2.2), SCALANCE M876-3 (ROK) (All versions < V7.2.2), SCALANCE M876-4 (All versions < V7.2.2), SCALANCE M876-4 (EU) (All versions < V7.2.2), SCALANCE M876-4 (NAM) (All versions < V7.2.2), SCALANCE MUM853-1 (EU) (All versions < V7.2.2), SCALANCE MUM856-1 (EU) (All versions < V7.2.2), SCALANCE MUM856-1 (RoW) (All versions < V7.2.2), SCALANCE S615 (All versions < V7.2.2), SCALANCE S615 EEC (All versions < V7.2.2). An Improper Neutralization of Special Elements used in an OS Command with root privileges vulnerability exists in the parsing of the IPSEC configuration. This could allow malicious local administrators to issue commands on system level after a new connection is established.
|
[] | null | 7.2 | null | null |
|
CVE-2010-1896
|
The Windows kernel-mode drivers in win32k.sys in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, and Windows Server 2008 Gold and SP2 do not properly validate user-mode input passed to kernel mode, which allows local users to gain privileges via a crafted application, aka "Win32k User Input Validation Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | 8.4 | null | 7.2 |
|
GHSA-hcpj-5jqq-8232
|
Cross-Site Request Forgery (CSRF) vulnerability in Mailrelay plugin <= 2.1.1 versions.
|
[] | null | 4.3 | null | null |
|
CVE-2012-0172
|
Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Style Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-49ph-hwvm-6g78
|
Heap-based buffer overflow in the Microsoft Terminal Services Client ActiveX control running RDP 6.1 on Windows XP SP2, Vista SP1 or SP2, or Server 2008 Gold or SP2; or 5.2 or 6.1 on Windows XP SP3; allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Remote Desktop Connection ActiveX Control Heap Overflow Vulnerability."
|
[] | null | null | null | null |
|
GHSA-6rj2-w8v9-xrxq
|
The Avada | Website Builder For WordPress & WooCommerce theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the ajax_import_options() function in all versions up to, and including, 7.11.4. This makes it possible for authenticated attackers, with contributor-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible.
|
[] | null | 8.8 | null | null |
|
GHSA-286r-9gcv-cp56
|
The WP Post Page Clone WordPress plugin before 1.2 allows users with a role as low as Contributor to clone and view other users' draft and password-protected posts which they cannot view normally.
|
[] | null | null | null | null |
|
GHSA-4p2g-rhmv-24f7
|
Vulnerability in the Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management product of Oracle Financial Services Applications (component: User Interfaces). Supported versions that are affected are 8.0.7 and 8.0.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management accessible data as well as unauthorized read access to a subset of Oracle Financial Services Deposit Insurance Calculations for Liquidity Risk Management accessible data. CVSS 3.0 Base Score 7.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N).
|
[] | null | null | null | null |
|
CVE-2017-1396
|
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 127342.
|
[
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.3.2:*:*:*:*:*:*:*"
] | null | null | 4.2 | null |
|
RHSA-2024:5521
|
Red Hat Security Advisory: kpatch-patch-5_14_0-284_48_1 and kpatch-patch-5_14_0-284_52_1 security update
|
kernel: net: kernel: UAF in network route management
|
[
"cpe:/o:redhat:rhel_eus:9.2::baseos"
] | null | 7.8 | null | null |
CVE-2017-17649
|
Readymade Video Sharing Script 3.2 has HTML Injection via the single-video-detail.php comment parameter.
|
[
"cpe:2.3:a:readymade_video_sharing_script_project:readymade_video_sharing_script:3.2:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-2jw2-w8hc-jqch
|
An external config control vulnerability exists in the openvpn.cgi openvpn_client_setup() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[] | null | 9.1 | null | null |
|
GHSA-774c-xvc2-rpvr
|
The Ingress Intel Helper (aka com.bb.ingressintel) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null |
|
CVE-2020-13574
|
A denial-of-service vulnerability exists in the WS-Security plugin functionality of Genivia gSOAP 2.8.107. A specially crafted SOAP request can lead to denial of service. An attacker can send an HTTP request to trigger this vulnerability.
|
[
"cpe:2.3:a:genivia:gsoap:2.8.107:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
CVE-2017-13864
|
An issue was discovered in certain Apple products. iCloud before 7.2 on Windows is affected. iTunes before 12.7.2 on Windows is affected. The issue involves the "APNs Server" component. It allows man-in-the-middle attackers to track users by leveraging mishandling of client certificates.
|
[
"cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
GHSA-w63c-wgfv-5q2m
|
In Ice Qube Thermal Management Center versions prior to version 4.13, the web application does not properly authenticate users which may allow an attacker to gain access to sensitive information.
|
[] | null | null | 7.5 | null |
|
GHSA-hm6h-6v88-fgh7
|
SQL injection vulnerability in forum/include/error/autherror.cfm in FuseTalk allows remote attackers to execute arbitrary SQL commands via the errorcode parameter. NOTE: a patch may have been released privately between April and June 2007. NOTE: this issue may overlap CVE-2007-3273.
|
[] | null | null | null | null |
|
CVE-2022-22684
|
Improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability in task management component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to execute arbitrary commands via unspecified vectors.
|
[
"cpe:2.3:a:synology:diskstation_manager:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-636v-mhgr-m48x
|
Multiple cross-site scripting (XSS) vulnerabilities in Tyger Bug Tracking System (TygerBT) 1.1.3 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) Login.php and (2) Register.php.
|
[] | null | null | null | null |
|
CVE-2017-9431
|
Google gRPC before 2017-04-05 has an out-of-bounds write caused by a heap-based buffer overflow related to core/lib/iomgr/error.c.
|
[
"cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
ICSA-11-017-01
|
WellinTech Kingview 6.53 Remote Heap Overflow
|
Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777.
|
[] | null | null | 9.8 | null |
CVE-2025-22633
|
WordPress Give – Divi Donation Modules plugin <= 2.0.0 - Sensitive Data Exposure vulnerability
|
Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Matt Cromwell Give – Divi Donation Modules allows Retrieve Embedded Sensitive Data. This issue affects Give – Divi Donation Modules: from n/a through 2.0.0.
|
[] | null | 5.8 | null | null |
GHSA-pqw3-mpcx-425g
|
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
|
[] | null | null | null | null |
|
GHSA-249x-3qx4-8h7p
|
The DroneDeleteOldMeasurements implementation in Ipswitch WhatsUp Gold before 16.4 does not properly validate serialized XML objects, which allows remote attackers to conduct SQL injection attacks via a crafted SOAP request.
|
[] | null | null | 9.8 | null |
|
CVE-2023-28574
|
Improper Input Validation in Core
|
Memory corruption in core services when Diag handler receives a command to configure event listeners.
|
[
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn685x-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn685x-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn685x-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn685x-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn785x-1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn785x-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn785x-5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn785x-5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6310_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6310:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdu1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdu1010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdu1110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdu1210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdu1210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdx1010_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdx1010:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qdx1011_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qdx1011:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1032_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qru1032:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1052_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qru1052:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qru1062_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qru1062:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sg8275p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sg8275p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_835_mobile_pc_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_835_mobile_pc_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_platform_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1_platform:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*"
] | null | 9 | null | null |
GHSA-ppgg-hjm8-p6v2
|
IBM Maximo for Civil Infrastructure 7.6.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 196622.
|
[] | null | null | null | null |
|
CVE-2024-23960
|
Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability
|
Alpine Halo9 Improper Verification of Cryptographic Signature Vulnerability. This vulnerability allows physically present attackers to bypass signature validation mechanism on affected installations of Alpine Halo9 devices. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the firmware metadata signature validation mechanism. The issue results from the lack of proper verification of a cryptographic signature. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Was ZDI-CAN-23102
|
[
"cpe:2.3:a:alpine:halo9:6.0.000:*:*:*:*:*:*:*",
"cpe:2.3:o:alpsalpine:ilx-f509_firmware:6.0.000:*:*:*:*:*:*:*",
"cpe:2.3:h:alpsalpine:ilx-f509:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
GHSA-fx8p-5v6x-xjjv
|
Integer overflow in inc/server.hpp in libnet6 (aka net6) before 1.3.14 might allow remote attackers to hijack connections and gain privileges as other users by making a large number of connections until the overflow occurs and an ID of another user is provided.
|
[] | null | null | null | null |
|
GHSA-6hv8-2ghp-22qp
|
An Information Disclosure vulnerability exists in the my config file in NEtGEAR WGR614 v7 and v9, which could let a malicious user recover all previously used passwords on the device, for both the control panel and WEP/WPA/WPA2, in plaintext. This is a different issue than CVE-2012-6340.
|
[] | null | null | null | null |
|
GHSA-hjqr-g8j9-j3vw
|
A directory traversal vulnerability in remote access to backup & restore in earlier versions than ProSyst mBS SDK 8.2.6 and Bosch IoT Gateway Software 9.2.0 allows remote attackers to write or delete files at any location.
|
[] | null | 7.5 | null | null |
|
GHSA-q83v-hq3j-4pq3
|
Duplicate Advisory: Improper access control in Directus
|
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-3fff-gqw3-vj86. This link is maintained to preserve external references.Original DescriptionDirectus v10.13.0 allows an authenticated external attacker to modify presets created by the same user to assign them to another user. This is possible because the application only validates the user parameter in the 'POST /presets' request but not in the PATCH request. When chained with CVE-2024-6533, it could result in account takeover.
|
[] | 5.3 | 4.1 | null | null |
GHSA-jc3m-fp5q-7qx9
|
D-Link DIR882 DIR882A1_FW110B02 was discovered to contain a stack overflow in the sub_48AC20 function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload.
|
[] | null | 9.8 | null | null |
|
CVE-2025-4945
|
Libsoup: integer overflow in cookie expiration date handling in libsoup
|
A flaw was found in the cookie parsing logic of the libsoup HTTP library, used in GNOME applications and other software. The vulnerability arises when processing the expiration date of cookies, where a specially crafted value can trigger an integer overflow. This may result in undefined behavior, allowing an attacker to bypass cookie expiration logic, causing persistent or unintended cookie behavior. The issue stems from improper validation of large integer inputs during date arithmetic operations within the cookie parsing routines.
|
[
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] | null | 3.7 | null | null |
CVE-2015-4485
|
Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:38.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-6fh7-4hhp-gvmm
|
A vulnerability was found in Project Worlds Online Time Table Generator 1.0 and classified as critical. This issue affects some unknown processing of the file /staff/index.php. The manipulation of the argument e leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | null | null |
|
GHSA-qjr5-jph4-fc8v
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear IPQ4019, MDM9206, MDM9607, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 600, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, and SD 835, detection of Error Condition Without Action in Core.
|
[] | null | null | 9.8 | null |
|
CVE-2020-3522
|
Cisco Data Center Network Manager Authorization Bypass Vulnerability
|
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) Software could allow an authenticated, remote attacker to bypass authorization on an affected device and access sensitive information that is related to the device. The vulnerability exists because the affected software allows users to access resources that are intended for administrators only. An attacker could exploit this vulnerability by submitting a crafted URL to an affected device. A successful exploit could allow the attacker to add, delete, and edit certain network configurations in the same manner as a user with administrative privileges.
|
[
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] | null | 6.3 | null | null |
GHSA-9v88-wfr2-2gxh
|
Mozilla Firefox before 3.0.10 processes a 3xx HTTP CONNECT response before a successful SSL handshake, which allows man-in-the-middle attackers to execute arbitrary web script, in an https site's context, by modifying this CONNECT response to specify a 302 redirect to an arbitrary https web site.
|
[] | null | null | null | null |
|
GHSA-7v94-64hj-m82h
|
FPE in `ParallelConcat`
|
ImpactThe [implementation of `ParallelConcat`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/inplace_ops.cc#L72-L97) misses some input validation and can produce a division by 0:PatchesWe have patched the issue in GitHub commit [f2c3931113eaafe9ef558faaddd48e00a6606235](https://github.com/tensorflow/tensorflow/commit/f2c3931113eaafe9ef558faaddd48e00a6606235).The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
[] | 6.8 | 5.5 | null | null |
CVE-2010-4623
|
WebSEAL in IBM Tivoli Access Manager for e-business 6.1.1 before 6.1.1-TIV-AWS-FP0001 allows remote authenticated users to cause a denial of service (worker thread consumption) via shift-reload actions.
|
[
"cpe:2.3:a:ibm:tivoli_access_manager_for_e-business:6.1.1:*:*:*:*:*:*:*"
] | null | null | null | 4 |
|
GHSA-7j3m-8g3c-9qqq
|
TensorFlow vulnerable to null-dereference in `mlir::tfg::TFOp::nameAttr`
|
ImpactWhen [`mlir::tfg::TFOp::nameAttr`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/graphdef_import.cc) receives null type list attributes, it crashes.PatchesWe have patched the issue in GitHub commits [3a754740d5414e362512ee981eefba41561a63a6](https://github.com/tensorflow/tensorflow/commit/3a754740d5414e362512ee981eefba41561a63a6) and [a0f0b9a21c9270930457095092f558fbad4c03e5](https://github.com/tensorflow/tensorflow/commit/a0f0b9a21c9270930457095092f558fbad4c03e5).The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.
|
[] | null | 5.9 | null | null |
GHSA-68c9-v49q-x7mc
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
|
[] | null | null | null | null |
|
CVE-2025-23817
|
WordPress MHR-Custom-Anti-Copy plugin <= 2.0 - CSRF to Stored Cross Site Request Forgery (CSRF) vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Mahadir Ahmad MHR-Custom-Anti-Copy allows Stored XSS.This issue affects MHR-Custom-Anti-Copy: from n/a through 2.0.
|
[] | null | 7.1 | null | null |
CVE-2007-4447
|
Multiple buffer overflows in the client in Toribash 2.71 and earlier allow remote attackers to (1) execute arbitrary code via a long game command in a replay (.rpl) file and (2) cause a denial of service (application crash) via a long SAY command that omits a required LF character; and allow remote Toribash servers to execute arbitrary code via (3) a long game command and (4) a long SAY command that omits a required LF character.
|
[
"cpe:2.3:a:toribash:toribash:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2021-20302
|
A flaw was found in OpenEXR's TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.
|
[
"cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 7.1 |
|
CVE-2024-2953
|
LuckyWP Table of Contents <= 2.1.4 - Authenticated (Contributor+) Stored Cross-Site Scripting
|
The LuckyWP Table of Contents plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with Contributor permissions and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 5.5 | null | null |
CVE-2007-2621
|
SQL injection vulnerability in event_view.php in Thyme Calendar 1.3 allows remote attackers to execute arbitrary SQL commands via the eid parameter.
|
[
"cpe:2.3:a:extrovert_software:thyme_calndar:1.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-42102
|
Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
|
In the Linux kernel, the following vulnerability has been resolved:
Revert "mm/writeback: fix possible divide-by-zero in wb_dirty_limits(), again"
Patch series "mm: Avoid possible overflows in dirty throttling".
Dirty throttling logic assumes dirty limits in page units fit into
32-bits. This patch series makes sure this is true (see patch 2/2 for
more details).
This patch (of 2):
This reverts commit 9319b647902cbd5cc884ac08a8a6d54ce111fc78.
The commit is broken in several ways. Firstly, the removed (u64) cast
from the multiplication will introduce a multiplication overflow on 32-bit
archs if wb_thresh * bg_thresh >= 1<<32 (which is actually common - the
default settings with 4GB of RAM will trigger this). Secondly, the
div64_u64() is unnecessarily expensive on 32-bit archs. We have
div64_ul() in case we want to be safe & cheap. Thirdly, if dirty
thresholds are larger than 1<<32 pages, then dirty balancing is going to
blow up in many other spectacular ways anyway so trying to fix one
possible overflow is just moot.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
RHSA-2008:0038
|
Red Hat Security Advisory: postgresql security update
|
dblink allows proxying of database connections via 127.0.0.1 postgresql integer overflow in regex code postgresql DoS via infinite loop in regex NFA optimization code postgresql: tempory DoS caused by slow regex NFA cleanup PostgreSQL privilege escalation PostgreSQL privilege escalation via dblink
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2003-1417
|
nCipher Support Software 6.00, when using generatekey KeySafe to import keys, does not delete the temporary copies of the key, which may allow local users to gain access to the key by reading the (1) key.pem or (2) key.der files.
|
[
"cpe:2.3:a:ncipher:support_software:6.00:*:*:*:*:*:*:*"
] | null | null | null | 4.4 |
|
CVE-2015-9249
|
An issue was discovered in Skybox Platform before 7.5.201. SQL Injection exists in /skyboxview/webservice/services/VersionWebService via a soapenv:Body element.
|
[
"cpe:2.3:a:skyboxsecurity:skybox_platform:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
GHSA-3f26-j6r7-9q8v
|
In X.Org X server 20.11 through 21.1.16, when a client application uses easystroke for mouse gestures, the main thread modifies various data structures used by the input thread without acquiring a lock, aka a race condition. In particular, AttachDevice in dix/devices.c does not acquire an input lock.
|
[] | null | 7.7 | null | null |
|
cisco-sa-confacl-HbPtfSuO
|
Cisco IOS XE Software RESTCONF and NETCONF-YANG Access Control List Denial of Service Vulnerability
|
A vulnerability in the RESTCONF and NETCONF-YANG access control list (ACL) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload.
The vulnerability is due to incorrect processing of the ACL that is tied to the RESTCONF or NETCONF-YANG feature. An attacker could exploit this vulnerability by accessing the device using RESTCONF or NETCONF-YANG. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74268"].
|
[] | null | null | 8.6 | null |
GHSA-5v68-mvvf-48w9
|
A vulnerability was found in GZ Scripts Property Listing Script 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /preview.php. The manipulation of the argument page/layout/sort_by leads to cross site scripting. The attack may be initiated remotely. The associated identifier of this vulnerability is VDB-233351. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 3.5 | null |
|
CVE-2025-31330
|
Code Injection Vulnerability in SAP Landscape Transformation (Analysis Platform)
|
SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system.
|
[] | null | 9.9 | null | null |
GHSA-7cpf-9rpm-3gq2
|
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. The vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device.
|
[] | null | null | null | null |
|
PYSEC-2021-352
| null |
furlongm openvpn-monitor through 1.1.3 allows CSRF to disconnect an arbitrary client.
|
[] | null | null | null | null |
GHSA-mhm2-wvr8-3737
|
Trusted Extensions in Sun Solaris 10 allows local users to gain privileges via vectors related to omission of unspecified libraries from software updates.
|
[] | null | null | null | null |
|
CVE-2020-21246
|
Cross Site Scripting vulnerability in YiiCMS v.1.0 allows a remote attacker to execute arbitrary code via the news function.
|
[
"cpe:2.3:a:yiicms_project:yiicms:1.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-fwqg-xxwv-675c
|
An insecure connection between Systems Manager and CQI Reporter application could expose infusion data to an attacker.
|
[] | null | 3.5 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.