id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9mx7-jqj9-hqq6
Cross-site scripting (XSS) vulnerability in getad.php in Diesel Paid Mail allows remote attackers to inject arbitrary web script or HTML via the ps parameter.
[]
null
null
null
null
GHSA-pw5c-w5j9-42pf
An issue was discovered in Mattermost Server before 5.9.0, 5.8.1, 5.7.3, and 4.10.8. It allows attackers to obtain sensitive information about whether someone has 2FA enabled.
[]
null
null
null
null
GHSA-q4cg-m7j8-ggr6
In the Linux kernel, the following vulnerability has been resolved:s390/cpum_sf: Handle CPU hotplug remove during samplingCPU hotplug remove handling triggers the following function call sequence:CPUHP_AP_PERF_S390_SF_ONLINE --> s390_pmu_sf_offline_cpu() ... CPUHP_AP_PERF_ONLINE --> perf_event_exit_cpu()The s390 CPUMF sampling CPU hotplug handler invokes:s390_pmu_sf_offline_cpu() +--> cpusf_pmu_setup() +--> setup_pmc_cpu() +--> deallocate_buffers()This function de-allocates all sampling data buffers (SDBs) allocated for that CPU at event initialization. It also clears the PMU_F_RESERVED bit. The CPU is gone and can not be sampled.With the event still being active on the removed CPU, the CPU event hotplug support in kernel performance subsystem triggers the following function calls on the removed CPU:perf_event_exit_cpu() +--> perf_event_exit_cpu_context() +--> __perf_event_exit_context() +--> __perf_remove_from_context() +--> event_sched_out() +--> cpumsf_pmu_del() +--> cpumsf_pmu_stop() +--> hw_perf_event_update()to stop and remove the event. During removal of the event, the sampling device driver tries to read out the remaining samples from the sample data buffers (SDBs). But they have already been freed (and may have been re-assigned). This may lead to a use after free situation in which case the samples are most likely invalid. In the best case the memory has not been reassigned and still contains valid data.Remedy this situation and check if the CPU is still in reserved state (bit PMU_F_RESERVED set). In this case the SDBs have not been released an contain valid data. This is always the case when the event is removed (and no CPU hotplug off occured). If the PMU_F_RESERVED bit is not set, the SDB buffers are gone.
[]
null
null
null
null
CVE-2004-1854
Buffer overflow in the logging function in Picophone 1.63 and earlier allows remote attackers to execute arbitrary code via a large packet.
[ "cpe:2.3:a:picophone:internet_telephone:1.63:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-444f-v7px-88pm
A vulnerability, which was classified as problematic, has been found in X-WRT luci up to 22.10_b202303061504. This issue affects the function run_action of the file modules/luci-base/ucode/dispatcher.uc of the component 404 Error Template Handler. The manipulation of the argument request_path leads to cross site scripting. The attack may be initiated remotely. Upgrading to version 22.10_b202303121313 is able to address this issue. The name of the patch is 24d7da2416b9ab246825c33c213fe939a89b369c. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-230663.
[]
null
null
3.5
null
RHSA-2004:245
Red Hat Security Advisory: apache, mod_ssl security update
mod_ssl ssl_util_uuencode_binary CA issue httpd mod_proxy buffer overflow
[ "cpe:/o:redhat:enterprise_linux:2.1::as", "cpe:/o:redhat:enterprise_linux:2.1::aw", "cpe:/o:redhat:enterprise_linux:2.1::es", "cpe:/o:redhat:enterprise_linux:2.1::ws" ]
null
null
null
null
CVE-2021-46654
This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.15.0.75. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15540.
[ "cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*", "cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*" ]
null
null
3.3
null
GHSA-5j5x-jr29-33x7
An issue was discovered in rConfig 3.9.2. An attacker can directly execute system commands by sending a GET request to search.crud.php because the catCommand parameter is passed to the exec function without filtering, which can lead to command execution.
[]
null
8.8
null
null
GHSA-cp27-4mp6-x55r
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pierre Lebedel Kodex Posts likes allows Stored XSS.This issue affects Kodex Posts likes: from n/a through 2.5.0.
[]
null
5.9
null
null
GHSA-85c5-q3p2-9qp4
Stack-based buffer overflow in IBM Domino 8.5 before 8.5.3 FP6 IF7 and 9.0 before 9.0.1 FP3 IF3 allows remote attackers to execute arbitrary code via a crafted BMP image, aka SPR KLYH9TSMLA.
[]
null
null
null
null
GHSA-fvcp-p6mr-qpxm
The GNAM 2013 (aka com.beepeers.gndam) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2023-6134
Keycloak: reflected xss via wildcard in oidc redirect_uri
A flaw was found in Keycloak that prevents certain schemes in redirects, but permits them if a wildcard is appended to the token. This issue could allow an attacker to submit a specially crafted request leading to cross-site scripting (XSS) or further attacks. This flaw is the result of an incomplete fix for CVE-2020-10748.
[ "cpe:2.3:a:redhat:single_sign-on:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.11:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.9:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_ibm_z_systems:4.10:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:single_sign-on:-:*:*:*:text-only:*:*:*", "cpe:/a:redhat:build_keycloak:22::el9", "cpe:/a:redhat:build_keycloak:22", "cpe:/a:redhat:red_hat_single_sign_on:7.6", "cpe:/a:redhat:red_hat_single_sign_on:7.6::el7", "cpe:/a:redhat:red_hat_single_sign_on:7.6::el8", "cpe:/a:redhat:red_hat_single_sign_on:7.6::el9", "cpe:/a:redhat:rhosemc:1.0::el8", "cpe:/a:redhat:red_hat_single_sign_on:7.6.6" ]
null
4.6
null
null
CVE-2024-36678
In the module "Theme settings" (pk_themesettings) <= 1.8.8 from Promokit.eu for PrestaShop, a guest can perform SQL injection. The script ajax.php have a sensitive SQL call that can be executed with a trivial http call and exploited to forge a SQL injection.
[ "cpe:2.3:a:promokit:promokit:*:*:*:*:*:*:*:*", "cpe:2.3:a:promokit:pk_themesettings:*:*:*:*:*:prestashop:*:*" ]
null
9.8
null
null
GHSA-vv4q-2w98-4v8g
Jenkins Aqua MicroScanner Plugin showed plain text credential in configuration form
Jenkins Aqua MicroScanner Plugin 1.0.7 and earlier transmitted configured credentials in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
[]
null
5.3
null
null
GHSA-6mxf-w9wr-qm52
The Sandbox subsystem in Apple iOS before 7 determines the sandboxing requirement for a #! application on the basis of the script interpreter instead of the script, which allows attackers to bypass intended access restrictions via a crafted application.
[]
null
null
null
null
GHSA-h755-h99p-9ffv
XML External Entity Reference in weixin-java-tools
An issue was discovered in weixin-java-tools. There is an XXE vulnerability in the getXmlDoc method of the BaseWxPayResult.java file. NOTE: this issue exists because of an incomplete fix for CVE-2018-20318.
[]
null
null
9.8
null
GHSA-8327-26x5-xq89
Cross-Site Request Forgery (CSRF) vulnerability in Cozmoslabs Profile Builder plugin <= 3.6.0 at WordPress allows uploading the JSON file and updating the options. Requires Import and Export add-on.
[]
null
4.3
null
null
CVE-2021-20402
IBM Security Verify Information Queue 1.0.6 and 1.0.7 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 196076.
[ "cpe:2.3:a:ibm:security_verify_information_queue:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_verify_information_queue:1.0.7:*:*:*:*:*:*:*" ]
null
null
2.7
null
GHSA-m95x-wpv9-pr9r
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause a denial of service (web-service outage) by making many login attempts with a valid caseworker account name.
[]
null
null
null
null
GHSA-vh49-3q2g-93gh
The usc-e-shop (aka Collne Welcart e-Commerce) plugin before 1.9.36 for WordPress allows Object Injection because of usces_unserialize. There is not a complete POP chain.
[]
null
8.8
null
null
GHSA-67wg-rf9j-w59j
A vulnerability, which was classified as critical, has been found in uTorrent. This issue affects some unknown processing of the component Guest Account. The manipulation leads to privilege escalation. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
[]
null
8.8
null
null
CVE-2025-1750
SQL Injection in run-llama/llama_index
An SQL injection vulnerability exists in the delete function of DuckDBVectorStore in run-llama/llama_index version v0.12.19. This vulnerability allows an attacker to manipulate the ref_doc_id parameter, enabling them to read and write arbitrary files on the server, potentially leading to remote code execution (RCE).
[]
null
null
9.8
null
CVE-2012-1641
The finder_import function in the Finder module 6.x-1.x before 6.x-1.26, 7.x-1.x, and 7.x-2.x before 7.x-2.0-alpha8 for Drupal allows remote authenticated users with the administer finder permission to execute arbitrary PHP code via admin/build/finder/import.
[ "cpe:2.3:a:danielb:finder:6.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha10:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha11:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha12:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha13:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha14:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha15:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha16:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha17:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha18:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha19:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha20:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha21:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha22:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha23:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha24:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha25:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha26:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha27:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha28:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha7:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha8:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:alpha9:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:beta1:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:beta2:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:beta3:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable0:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable1:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable2:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable3:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable4:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable5:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable6:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.0:unstable7:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.7:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.8:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.9:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.10:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.11:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.12:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.13:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.14:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.15:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.16:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.17:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.18:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.19:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.20:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.21:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.23:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.24:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:6.x-1.x-dev:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.0:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.1:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.2:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.3:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.4:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.5:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.6:*:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-1.x:dev:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.0:alpha1:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.0:alpha2:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.0:alpha3:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.0:alpha4:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.0:alpha5:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.0:alpha6:*:*:*:*:*:*", "cpe:2.3:a:danielb:finder:7.x-2.x:dev:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*" ]
null
null
null
6
GHSA-f78f-957j-7jxh
In Recipes, versions 0.17.0 through 1.2.5 are vulnerable to Stored Cross-Site Scripting (XSS), in the ‘Name’ field of Keyword, Food and Unit components. When a victim accesses the Keyword/Food/Unit endpoints, the XSS payload will trigger. A low privileged attacker will have the victim's API key and can lead to admin's account takeover.
[]
null
5.4
null
null
CVE-2016-9012
CloudVision Portal (CVP) before 2016.1.2.1 allows remote authenticated users to gain access to the internal configuration mechanisms via the management plane, related to a request to /web/system/console/bundle.
[ "cpe:2.3:a:arista:cloudvision_portal:*:*:*:*:*:*:*:*" ]
null
null
8.8
6.5
CVE-2024-36152
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
[ "cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*" ]
null
5.4
null
null
CVE-2018-17453
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. Attackers may have been able to obtain sensitive access-token data from Sentry logs via the GRPC::Unknown exception.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:11.3.0:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:11.3.0:*:*:*:enterprise:*:*:*" ]
null
5.3
null
null
CVE-2024-21516
This affects versions of the package opencart/opencart from 4.0.0.0 and before 4.1.0.0. A reflected XSS issue was identified in the directory parameter of admin common/filemanager.list route. An attacker could obtain a user's token by tricking the user to click on a maliciously crafted URL. The user is then prompted to login and redirected again upon authentication with the payload automatically executing. If the attacked user has admin privileges, this vulnerability could be used as the start of a chain of exploits like Zip Slip or arbitrary file write vulnerabilities in the admin functionality. **Notes:** 1) This is only exploitable if the attacker knows the name or path of the admin directory. The name of the directory is "admin" by default but there is a pop-up in the dashboard warning users to rename it. 2) The fix for this vulnerability is incomplete. The redirect is removed so that it is not possible for an attacker to control the redirect post admin login anymore, but it is still possible to exploit this issue in admin if the user is authenticated as an admin already.
[ "cpe:2.3:a:opencart:opencart:4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*" ]
2.1
4.2
null
null
GHSA-w9vv-pj6w-p8xq
IBM Sterling B2B Integrator 6.0.0.0 through 6.0.3.9, 6.1.0.0 through 6.1.2.3, and 6.2.0.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 280894.
[]
null
5.4
null
null
CVE-2005-4037
SQL injection vulnerability in functions.php in Web4Future Affiliate Manager PRO 4.1 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter.
[ "cpe:2.3:a:web4future:affiliate_manager_professional:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-2f4v-4h68-m25j
Cross-process screen stack vulnerability in the UIExtension module Impact: Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
5.5
null
null
GHSA-wxj4-928h-58fg
inetd in Compaq Tru64 UNIX 5.1 allows attackers to cause a denial of service (network connection loss) by causing one of the services handled by inetd to core dump during startup, which causes inetd to stop accepting connections to all of its services.
[]
null
null
null
null
GHSA-m4jr-5394-x5vm
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Fast Tube allows Reflected XSS. This issue affects Fast Tube: from n/a through 2.3.1.
[]
null
7.1
null
null
CVE-2014-9597
The picture_pool_Delete function in misc/picture_pool.c in VideoLAN VLC media player 2.1.5 allows remote attackers to execute arbitrary code or cause a denial of service (DEP violation and application crash) via a crafted FLV file.
[ "cpe:2.3:a:videolan:vlc_media_player:2.1.5:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-wvh4-52xx-9r94
The WP Logs Book WordPress plugin through 1.0.1 does not sanitise and escape some of its log data before outputting them back in an admin dashboard, leading to an Unauthenticated Stored Cross-Site Scripting
[]
null
5.4
null
null
GHSA-r575-x8f3-c9jc
Acrobat Reader DC versions 22.001.20085 (and earlier), 20.005.3031x (and earlier) and 17.012.30205 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
RHSA-2023:5998
Red Hat Security Advisory: python39:3.9 and python39-devel:3.9 security update
python: TLS handshake bypass
[ "cpe:/a:redhat:enterprise_linux:8::appstream", "cpe:/a:redhat:enterprise_linux:8::crb" ]
null
8.6
null
null
GHSA-4v59-chwx-688h
Integer signedness error in WebKit in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving a JavaScript array index.
[]
null
null
null
null
CVE-2024-49950
Bluetooth: L2CAP: Fix uaf in l2cap_connect
In the Linux kernel, the following vulnerability has been resolved: Bluetooth: L2CAP: Fix uaf in l2cap_connect [Syzbot reported] BUG: KASAN: slab-use-after-free in l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 Read of size 8 at addr ffff8880241e9800 by task kworker/u9:0/54 CPU: 0 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-00268-g788220eee30d #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 Workqueue: hci2 hci_rx_work Call Trace: <TASK> __dump_stack lib/dump_stack.c:93 [inline] dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:119 print_address_description mm/kasan/report.c:377 [inline] print_report+0xc3/0x620 mm/kasan/report.c:488 kasan_report+0xd9/0x110 mm/kasan/report.c:601 l2cap_connect.constprop.0+0x10d8/0x1270 net/bluetooth/l2cap_core.c:3949 l2cap_connect_req net/bluetooth/l2cap_core.c:4080 [inline] l2cap_bredr_sig_cmd net/bluetooth/l2cap_core.c:4772 [inline] l2cap_sig_channel net/bluetooth/l2cap_core.c:5543 [inline] l2cap_recv_frame+0xf0b/0x8eb0 net/bluetooth/l2cap_core.c:6825 l2cap_recv_acldata+0x9b4/0xb70 net/bluetooth/l2cap_core.c:7514 hci_acldata_packet net/bluetooth/hci_core.c:3791 [inline] hci_rx_work+0xaab/0x1610 net/bluetooth/hci_core.c:4028 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 ... Freed by task 5245: kasan_save_stack+0x33/0x60 mm/kasan/common.c:47 kasan_save_track+0x14/0x30 mm/kasan/common.c:68 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:579 poison_slab_object+0xf7/0x160 mm/kasan/common.c:240 __kasan_slab_free+0x32/0x50 mm/kasan/common.c:256 kasan_slab_free include/linux/kasan.h:184 [inline] slab_free_hook mm/slub.c:2256 [inline] slab_free mm/slub.c:4477 [inline] kfree+0x12a/0x3b0 mm/slub.c:4598 l2cap_conn_free net/bluetooth/l2cap_core.c:1810 [inline] kref_put include/linux/kref.h:65 [inline] l2cap_conn_put net/bluetooth/l2cap_core.c:1822 [inline] l2cap_conn_del+0x59d/0x730 net/bluetooth/l2cap_core.c:1802 l2cap_connect_cfm+0x9e6/0xf80 net/bluetooth/l2cap_core.c:7241 hci_connect_cfm include/net/bluetooth/hci_core.h:1960 [inline] hci_conn_failed+0x1c3/0x370 net/bluetooth/hci_conn.c:1265 hci_abort_conn_sync+0x75a/0xb50 net/bluetooth/hci_sync.c:5583 abort_conn_sync+0x197/0x360 net/bluetooth/hci_conn.c:2917 hci_cmd_sync_work+0x1a4/0x410 net/bluetooth/hci_sync.c:328 process_one_work+0x9c5/0x1b40 kernel/workqueue.c:3231 process_scheduled_works kernel/workqueue.c:3312 [inline] worker_thread+0x6c8/0xed0 kernel/workqueue.c:3389 kthread+0x2c1/0x3a0 kernel/kthread.c:389 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2016-6373
The web-based GUI in Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote authenticated administrators to execute arbitrary OS commands as root via crafted platform commands, aka Bug ID CSCva00541.
[ "cpe:2.3:a:cisco:cloud_services_platform_2100:2.0.0_base:*:*:*:*:*:*:*" ]
null
null
7.2
9
RHSA-2010:0115
Red Hat Security Advisory: pidgin security update
pidgin MSN protocol plugin memory corruption pidgin: Finch XMPP MUC Crash pidgin: Smiley Denial of Service
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::client_workstation" ]
null
null
null
null
GHSA-6q5w-m3c5-rv95
Data races in rusqlite
An issue was discovered in the rusqlite crate before 0.23.0 for Rust. Memory safety can be violated via VTab / VTabCursor.
[]
null
9.8
null
null
CVE-2008-3115
Secure Static Versioning in Sun Java JDK and JRE 6 Update 6 and earlier, and 5.0 Update 6 through 15, does not properly prevent execution of applets on older JRE releases, which might allow remote attackers to exploit vulnerabilities in these older releases.
[ "cpe:2.3:a:sun:jdk:*:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:5.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jdk:6:update_5:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:*:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_10:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_11:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_12:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_13:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_14:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_15:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_6:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_7:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_8:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:5.0:update_9:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_1:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_2:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_3:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_4:*:*:*:*:*:*", "cpe:2.3:a:sun:jre:6:update_5:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-cp2p-wmjj-5m7m
In the Linux kernel, the following vulnerability has been resolved:usb: usbip: fix a refcount leak in stub_probe()usb_get_dev() is called in stub_device_alloc(). When stub_probe() fails after that, usb_put_dev() needs to be called to release the reference.Fix this by moving usb_put_dev() to sdev_free error path handling.Find this by code review.
[]
null
5.5
null
null
CVE-2015-8256
Multiple cross-site scripting (XSS) vulnerabilities in Axis network cameras.
[ "cpe:2.3:o:axis:network_camera_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:cannon_network_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:explosion-protected_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:fixed_box_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:fixed_bullet_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:fixed_dome_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:modular_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:onboard_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:panoramic_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:ptz_camera:-:*:*:*:*:*:*:*", "cpe:2.3:h:axis:thermal_camera:-:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-gr56-57j2-v8r2
An issue was discovered in Honeywell XL Web II controller XL1000C500 XLWebExe-2-01-00 and prior, and XLWeb 500 XLWebExe-1-02-08 and prior. An attacker can establish a new user session, without invalidating any existing session identifier, which gives the opportunity to steal authenticated sessions (SESSION FIXATION).
[]
null
null
6
null
CVE-2020-27010
A cross-site scripting (XSS) vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 SP2 could allow an attacker to tamper with the web interface of the product in a manner separate from the similar CVE-2020-8462.
[ "cpe:2.3:a:trendmicro:interscan_web_security_virtual_appliance:6.5:sp2:*:*:*:*:*:*" ]
null
4.8
null
3.5
GHSA-wfm2-rq5g-f8v5
@account-kit/smart-contracts Allowlist Module Bypass Vulnerability
SummaryAllowlist module contains a bypass vulnerabilityDetailsThe logic for using an allowlist on a Modular Account V2 contained a bug that allowed session keys to bypass any allowlist configurationActionIf you are using @aa-sdk and/or @account-kit/smart-contracts between the versions of >=4.8.0 and <4.28.1, please upgrade to 4.28.2
[]
6.6
null
null
null
RHSA-2023:7703
Red Hat Security Advisory: Red Hat OpenShift Pipelines 1.10.6 release and security update
golang: net/http, x/net/http2: rapid stream resets can cause excessive work (CVE-2023-44487) HTTP/2: Multiple HTTP/2 enabled web servers are vulnerable to a DDoS attack (Rapid Reset Attack)
[ "cpe:/a:redhat:openshift_pipelines:1.10::el8" ]
null
7.5
null
null
CVE-2019-19552
In userman 13.0.76.43 through 15.0.20 in Sangoma FreePBX, XSS exists in the user management screen of the Administrator web site, i.e., the/admin/config.php?display=userman URI. An attacker with sufficient privileges can edit the Display Name of a user and embed malicious XSS code. When another user (such as an admin) visits the main User Management screen, the XSS payload will render and execute in the context of the victim user's account.
[ "cpe:2.3:a:sangoma:freepbx:*:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
GHSA-j98f-j6g4-3jp3
This vulnerability allows remote attackers to execute arbitrary code on the affected webOS of LG Signage TV.
[]
null
6.3
null
null
CVE-2005-0048
Microsoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability."
[ "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_2000:*:sp4:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:embedded:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:*:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:embedded:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp1:media_center:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:tablet_pc:*:*:*:*:*" ]
null
null
null
7.5
CVE-2019-12647
Cisco IOS and IOS XE Software IP Ident Denial of Service Vulnerability
A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
[ "cpe:2.3:o:cisco:ios_xe:fuji-16.7.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:fuji-16.8.1:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4221:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4321:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4351:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4431:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4451-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_4201:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_4202:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_4206:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ncs_4216:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_convergence_system_520:-:*:*:*:*:*:*:*" ]
null
null
8.6
null
GHSA-c2w4-277h-j297
Mirror Manager version 0.7.2 and older is vulnerable to remote code execution in the checkin code.
[]
null
null
9.8
null
cisco-sa-cucm-xss-RgH7MpKA
Cisco Unified Communications Products Cross-Site Scripting Vulnerability
A vulnerability in the web-based management interface of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), and Cisco Unity Connection could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive browser-based information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.1
null
null
GHSA-w7r2-9jpv-jjhv
Multiple untrusted search path vulnerabilities in SWiSH Max3 3.0 2009.11.30 allow local users to gain privileges via a Trojan horse (1) dwmapi.dll or (2) SWiSHmax3res.dll file in the current working directory, as demonstrated by a directory that contains a .swi file. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
GHSA-76cg-c4pp-x5qq
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Elicus WPMozo Addons Lite for Elementor allows Stored XSS.This issue affects WPMozo Addons Lite for Elementor: from n/a through 1.2.0.
[]
null
6.5
null
null
CVE-2017-1368
IBM Security Identity Governance Virtual Appliance 5.2 through 5.2.3.2 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 126861.
[ "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:security_identity_governance_and_intelligence:5.2.3.2:*:*:*:*:*:*:*" ]
null
null
4.3
null
RHSA-2021:2236
Red Hat Security Advisory: polkit security update
polkit: local privilege escalation using polkit_system_bus_name_get_creds_sync()
[ "cpe:/o:redhat:rhel_eus:8.1::baseos" ]
null
7.8
null
null
CVE-2020-24693
The Ignite portal in Mitel MiContact Center Business before 9.3.0.0 could allow a local attacker to view system information due to insufficient output sanitization.
[ "cpe:2.3:a:mitel:micontact_center_business:*:*:*:*:*:*:*:*" ]
null
3.3
null
2.1
GHSA-4hgm-949x-8gq4
Realestate Crowdfunding Script 2.7.2 has SQL Injection via the single-cause.php pid parameter.
[]
null
null
9.8
null
GHSA-j74f-5rh4-57cv
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
[]
null
null
null
null
CVE-2000-0464
Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.
[ "cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*" ]
null
null
null
7.6
GHSA-q57j-59f5-7q2m
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.5.25 and earlier allows remote authenticated users to affect availability via unknown vectors related to Server.
[]
null
null
null
null
CVE-2022-49664
tipc: move bc link creation back to tipc_node_create
In the Linux kernel, the following vulnerability has been resolved: tipc: move bc link creation back to tipc_node_create Shuang Li reported a NULL pointer dereference crash: [] BUG: kernel NULL pointer dereference, address: 0000000000000068 [] RIP: 0010:tipc_link_is_up+0x5/0x10 [tipc] [] Call Trace: [] <IRQ> [] tipc_bcast_rcv+0xa2/0x190 [tipc] [] tipc_node_bc_rcv+0x8b/0x200 [tipc] [] tipc_rcv+0x3af/0x5b0 [tipc] [] tipc_udp_recv+0xc7/0x1e0 [tipc] It was caused by the 'l' passed into tipc_bcast_rcv() is NULL. When it creates a node in tipc_node_check_dest(), after inserting the new node into hashtable in tipc_node_create(), it creates the bc link. However, there is a gap between this insert and bc link creation, a bc packet may come in and get the node from the hashtable then try to dereference its bc link, which is NULL. This patch is to fix it by moving the bc link creation before inserting into the hashtable. Note that for a preliminary node becoming "real", the bc link creation should also be called before it's rehashed, as we don't create it for preliminary nodes.
[]
null
5.5
null
null
CVE-2012-0294
Directory traversal vulnerability in the Manager service in the management console in Symantec Endpoint Protection (SEP) 12.1 before 12.1 RU1-MP1 allows remote attackers to delete files via unspecified vectors.
[ "cpe:2.3:a:symantec:endpoint_protection:12.1:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1.671:*:*:*:*:*:*:*", "cpe:2.3:a:symantec:endpoint_protection:12.1.1000:*:*:*:*:*:*:*" ]
null
null
null
5.8
CVE-2023-21240
In Policy of Policy.java, there is a possible boot loop due to resource exhaustion. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2021:0809
Red Hat Security Advisory: wpa_supplicant security update
wpa_supplicant: Use-after-free in P2P provision discovery processing
[ "cpe:/o:redhat:enterprise_linux:8::baseos" ]
null
7.5
null
null
RHSA-2010:0780
Red Hat Security Advisory: thunderbird security update
Mozilla miscellaneous memory safety hazards Mozilla use-after-free error in nsBarProp Mozilla unsafe library loading flaw
[ "cpe:/a:redhat:rhel_productivity:5", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client" ]
null
null
null
null
GHSA-699c-4r4c-vcqv
The verizon (aka com.wverizonwirelessbill) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
CVE-2021-4363
The WP Quick FrontEnd Editor plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 5.5 due to insufficient input sanitization and output escaping on the 'save_content_front' function that uses print_r on the user-supplied $_REQUEST values . This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:webdevocean:wp_quick_frontend_editor:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
null
CVE-2020-15598
Trustwave ModSecurity 3.x through 3.0.4 allows denial of service via a special request. NOTE: The discoverer reports "Trustwave has signaled they are disputing our claims." The CVE suggests that there is a security issue with how ModSecurity handles regular expressions that can result in a Denial of Service condition. The vendor does not consider this as a security issue because1) there is no default configuration issue here. An attacker would need to know that a rule using a potentially problematic regular expression was in place, 2) the attacker would need to know the basic nature of the regular expression itself to exploit any resource issues. It's well known that regular expression usage can be taxing on system resources regardless of the use case. It is up to the administrator to decide on when it is appropriate to trade resources for potential security benefit
[ "cpe:2.3:a:trustwave:modsecurity:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-mmch-m456-f59q
Cross-Site Request Forgery (CSRF) vulnerability in KlbTheme Clotya theme, KlbTheme Cosmetsy theme, KlbTheme Furnob theme, KlbTheme Bacola theme, KlbTheme Partdo theme, KlbTheme Medibazar theme, KlbTheme Machic theme.This issue affects Clotya theme: from n/a through 1.1.6; Cosmetsy theme: from n/a through 1.7.7; Furnob theme: from n/a through 1.2.2; Bacola theme: from n/a through 1.3.3; Partdo theme: from n/a through 1.1.1; Medibazar theme: from n/a through 1.8.6; Machic theme: from n/a through 1.2.8.
[]
null
4.3
null
null
CVE-2023-52568
x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race
In the Linux kernel, the following vulnerability has been resolved: x86/sgx: Resolves SECS reclaim vs. page fault for EAUG race The SGX EPC reclaimer (ksgxd) may reclaim the SECS EPC page for an enclave and set secs.epc_page to NULL. The SECS page is used for EAUG and ELDU in the SGX page fault handler. However, the NULL check for secs.epc_page is only done for ELDU, not EAUG before being used. Fix this by doing the same NULL check and reloading of the SECS page as needed for both EAUG and ELDU. The SECS page holds global enclave metadata. It can only be reclaimed when there are no other enclave pages remaining. At that point, virtually nothing can be done with the enclave until the SECS page is paged back in. An enclave can not run nor generate page faults without a resident SECS page. But it is still possible for a #PF for a non-SECS page to race with paging out the SECS page: when the last resident non-SECS page A triggers a #PF in a non-resident page B, and then page A and the SECS both are paged out before the #PF on B is handled. Hitting this bug requires that race triggered with a #PF for EAUG. Following is a trace when it happens. BUG: kernel NULL pointer dereference, address: 0000000000000000 RIP: 0010:sgx_encl_eaug_page+0xc7/0x210 Call Trace: ? __kmem_cache_alloc_node+0x16a/0x440 ? xa_load+0x6e/0xa0 sgx_vma_fault+0x119/0x230 __do_fault+0x36/0x140 do_fault+0x12f/0x400 __handle_mm_fault+0x728/0x1110 handle_mm_fault+0x105/0x310 do_user_addr_fault+0x1ee/0x750 ? __this_cpu_preempt_check+0x13/0x20 exc_page_fault+0x76/0x180 asm_exc_page_fault+0x27/0x30
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*" ]
null
4.7
null
null
GHSA-9pm5-4php-6g34
Arista EOS before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause traffic loss or incorrect forwarding of traffic via a malformed link-state PDU to the IS-IS router.
[]
null
null
null
null
CVE-2017-9032
Multiple cross-site scripting (XSS) vulnerabilities in Trend Micro ServerProtect for Linux 3.0 before CP 1531 allow remote attackers to inject arbitrary web script or HTML via the (1) T1 or (2) tmLastConfigFileModifiedDate parameter to log_management.cgi.
[ "cpe:2.3:a:trendmicro:serverprotect:3.0:*:*:*:*:linux:*:*" ]
null
6.1
null
4.3
GHSA-vr7m-g7mw-78wm
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in broadly Broadly for WordPress allows Stored XSS. This issue affects Broadly for WordPress: from n/a through 3.0.2.
[]
null
5.9
null
null
GHSA-j2cw-x4g9-632w
NVIDIA DGX-1 SBIOS contains a vulnerability in the Uncore PEI module, where authentication of the code executed by SSA is missing, which may lead to arbitrary code execution, denial of service, escalation of privileges assisted by a firmware implant, information disclosure assisted by a firmware implant, data tampering, and SecureBoot bypass.
[]
null
8.2
null
null
CVE-2020-0613
An elevation of privilege vulnerability exists in the way that the Windows Search Indexer handles objects in memory, aka 'Windows Search Indexer Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-0614, CVE-2020-0623, CVE-2020-0625, CVE-2020-0626, CVE-2020-0627, CVE-2020-0628, CVE-2020-0629, CVE-2020-0630, CVE-2020-0631, CVE-2020-0632, CVE-2020-0633.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
7.8
null
4.6
CVE-2023-28741
Buffer overflow in some Intel(R) QAT drivers for Windows - HW Version 1.0 before version 1.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:quickassist_technology_library:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:h:intel:quickassist_technology:*:*:*:*:*:windows:*:*", "cpe:2.3:o:intel:quickassist_technology_firmware:-:*:*:*:*:*:*:*" ]
null
7.9
null
null
CVE-2023-45133
Babel vulnerable to arbitrary code execution when compiling specifically crafted malicious code
Babel is a compiler for writingJavaScript. In `@babel/traverse` prior to versions 7.23.2 and 8.0.0-alpha.4 and all versions of `babel-traverse`, using Babel to compile code that was specifically crafted by an attacker can lead to arbitrary code execution during compilation, when using plugins that rely on the `path.evaluate()`or `path.evaluateTruthy()` internal Babel methods. Known affected plugins are `@babel/plugin-transform-runtime`; `@babel/preset-env` when using its `useBuiltIns` option; and any "polyfill provider" plugin that depends on `@babel/helper-define-polyfill-provider`, such as `babel-plugin-polyfill-corejs3`, `babel-plugin-polyfill-corejs2`, `babel-plugin-polyfill-es-shims`, `babel-plugin-polyfill-regenerator`. No other plugins under the `@babel/` namespace are impacted, but third-party plugins might be. Users that only compile trusted code are not impacted. The vulnerability has been fixed in `@babel/[email protected]` and `@babel/[email protected]`. Those who cannot upgrade `@babel/traverse` and are using one of the affected packages mentioned above should upgrade them to their latest version to avoid triggering the vulnerable code path in affected `@babel/traverse` versions: `@babel/plugin-transform-runtime` v7.23.2, `@babel/preset-env` v7.23.2, `@babel/helper-define-polyfill-provider` v0.4.3, `babel-plugin-polyfill-corejs2` v0.4.6, `babel-plugin-polyfill-corejs3` v0.8.5, `babel-plugin-polyfill-es-shims` v0.10.0, `babel-plugin-polyfill-regenerator` v0.5.3.
[ "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:babeljs:babel:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel:8.0.0:alpha.0:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel:8.0.0:alpha.1:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel:8.0.0:alpha.2:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel:8.0.0:alpha.3:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-helper-define-polyfill-provider:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-plugin-polyfill-corejs2:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-plugin-polyfill-corejs3:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-plugin-polyfill-es-shims:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-plugin-polyfill-regenerator:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-plugin-transform-runtime:*:*:*:*:*:nodejs:*:*", "cpe:2.3:a:babeljs:babel-preset-env:*:*:*:*:*:nodejs:*:*" ]
null
9.4
null
null
GHSA-p9ch-7c57-q9hh
Cisco IOS XR 5.2.2 allows remote attackers to cause a denial of service (process restart) via a crafted OSPF Link State Advertisement (LSA) update, aka Bug ID CSCvb05643.
[]
null
null
5.3
null
GHSA-f5r3-g3cg-82j6
An issue was discovered in Fort before 1.6.3. A malicious RPKI repository that descends from a (trusted) Trust Anchor can serve (via rsync or RRDP) an ROA or a Manifest containing a null eContent field. Fort dereferences the pointer without sanitizing it first. Because Fort is an RPKI Relying Party, a crash can lead to Route Origin Validation unavailability, which can lead to compromised routing.
[]
null
7.5
null
null
GHSA-rjwc-235r-8986
A race condition could lead to a cross-origin container obtaining permissions of the top-level origin. This vulnerability affects Firefox < 128 and Firefox ESR < 115.13.
[]
null
4.7
null
null
GHSA-p8x9-vqx9-g5pw
An issue was discovered in MBed OS 6.16.0. When parsing hci reports, the hci parsing software dynamically determines the length of a list of reports by reading a byte from an input stream. It then fetches the length of the first report, uses it to calculate the beginning of the second report, etc. In doing this, it tracks the largest report so it can later allocate a buffer that fits every individual report (but only one at a time). It does not, however, validate that these addresses are all contained within the buffer passed to hciEvtProcessLeExtAdvReport. It is then possible, though unlikely, that the buffer designated to hold the reports is allocated in such a way that one of these out-of-bounds length fields is contained within the new buffer. When the (n-1)th report is copied, it overwrites the length field of the nth report. This now corrupted length field is then used for a memcpy into the new buffer, which may lead to a buffer overflow.
[]
null
9.8
null
null
CVE-2025-51860
Stored Cross-Site Scripting (XSS) in TelegAI (telegai.com) 2025-05-26 in its chat component and character container component. An attacker can achieve arbitrary client-side script execution by crafting an AI Character with SVG XSS payloads in either description, greeting, example dialog, or system prompt(instructing the LLM to embed XSS payload in its chat response). When a user interacts with such a malicious AI Character or just browse its profile, the script executes in the user's browser. Successful exploitation can lead to the theft of sensitive information, such as session tokens, potentially resulting in account hijacking.
[]
null
6.1
null
null
PYSEC-2022-43130
null
The d8s-timer for python, as distributed on PyPI, included a potential code-execution backdoor inserted by a third party. A potential code execution backdoor inserted by third parties is the democritus-uuids package. The affected version of d8s-htm is 0.1.0.
[]
null
9.8
null
null
CVE-2004-0537
Opera 7.50 and earlier allows remote web sites to provide a "Shortcut Icon" (favicon) that is wider than expected, which could allow the web sites to spoof a trusted domain and facilitate phishing attacks using a wide icon and extra spaces.
[ "cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2020-7067
OOB Read in urldecode()
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
[ "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2020-23341
A reflected cross site scripting (XSS) vulnerability in the /header.tmpl.php component of ATutor 2.2.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload.
[ "cpe:2.3:a:atutor:atutor:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-j4j9-572f-pc42
Stack-based buffer overflow in dsmtca in the client in IBM Tivoli Storage Manager (TSM) 5.4 through 5.4.3.6, 5.5 through 5.5.4.3, 6.1 through 6.1.5.6, 6.2 before 6.2.5.4, and 6.3 before 6.3.2.3 on UNIX, Linux, and OS X allows local users to gain privileges via unspecified vectors.
[]
null
null
null
null
CVE-2007-5173
PHP remote file inclusion vulnerability in includes/openid/Auth/OpenID/BBStore.php in phpBB Openid 0.2.0 allows remote attackers to execute arbitrary PHP code via a URL in the openid_root_path parameter.
[ "cpe:2.3:a:openid:openid:0.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpbb:phpbb:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
GHSA-jg89-g7f6-c75m
The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension's configuration. The attacker must trigger a POST request to Special:PrivateDomains.
[]
null
4.3
null
null
CVE-2017-7948
Integer overflow in the mark_curve function in Artifex Ghostscript 9.21 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via a crafted PostScript document.
[ "cpe:2.3:a:artifex:ghostscript:9.21:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-567f-r62w-x6ch
Path traversal vulnerability in the administrative panel in KonaKart eCommerce Platform version 8.7 and earlier could allow an attacker to download system files, as well as upload specially crafted JSP files and in turn gain access to the server.
[]
null
null
9.8
null
CVE-2017-14706
DenyAll WAF before 6.4.1 allows unauthenticated remote attackers to obtain authentication information by making a typeOf=debug request to /webservices/download/index.php, and then reading the iToken field in the reply. This affects DenyAll i-Suite LTS 5.5.0 through 5.5.12, i-Suite 5.6, Web Application Firewall 5.7, and Web Application Firewall 6.x before 6.4.1, with On Premises or AWS/Azure cloud deployments.
[ "cpe:2.3:a:denyall:i-suite:5.5.0:*:*:*:lts:*:*:*", "cpe:2.3:a:denyall:i-suite:5.5.9:*:*:*:lts:*:*:*", "cpe:2.3:a:denyall:i-suite:5.5.10:*:*:*:lts:*:*:*", "cpe:2.3:a:denyall:i-suite:5.5.11:*:*:*:lts:*:*:*", "cpe:2.3:a:denyall:i-suite:5.5.12:*:*:*:lts:*:*:*", "cpe:2.3:a:denyall:i-suite:5.6.0:*:*:*:lts:*:*:*", "cpe:2.3:a:denyall:web_application_firewall:5.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:denyall:web_application_firewall:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:denyall:web_application_firewall:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:denyall:web_application_firewall:6.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:denyall:web_application_firewall:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:denyall:web_application_firewall:6.4.0:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-cfp9-cx5p-7jfp
Vulnerability in the Java SE product of Oracle Java SE (component: JavaFX). The supported version that is affected is Java SE: 8u251. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
[]
null
8.3
null
null
GHSA-ch53-6vvw-hvmw
mykdownload.php in MyKtools 2.4 does not require administrative authentication, which allows remote attackers to read a database backup by making a direct request, and then sending an unspecified request to the download page for the backup.
[]
null
null
null
null
GHSA-4hfj-x2gr-q83x
Unspecified vulnerability in clsetup in the configuration utility in Sun Solaris Cluster 3.2 allows local users to gain privileges via unknown vectors.
[]
null
null
null
null
GHSA-9qc4-372j-5862
Firmware in the Intel Puma 5, 6, and 7 Series might experience resource depletion or timeout, which allows a network attacker to create a denial of service via crafted network traffic.
[]
null
null
7.5
null