id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2004-0399 | Stack-based buffer overflow in Exim 3.35, and other versions before 4, when the sender_verify option is true, allows remote attackers to cause a denial of service and possibly execute arbitrary code during sender verification. | [
"cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_cambridge:exim:3.35:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-m53c-m27f-r2r9 | Unspecified vulnerability in the Portal component in Oracle Fusion Middleware 10.1.2.3 and 10.1.4.2 allows remote attackers to affect availability via unknown vectors. | []
| null | null | null | null |
|
GHSA-g6v8-pg97-856j | A vulnerability in the MiCollab Client server component of Mitel MiCollab through 9.5.0.101 could allow an authenticated attacker to conduct a Server-Side Request Forgery (SSRF) attack due to insufficient restriction of URL parameters. A successful exploit could allow an attacker to leverage connections and permissions available to the host server. | []
| null | 8.8 | null | null |
|
CVE-2024-4067 | Regular Expression Denial of Service in micromatch | The NPM package `micromatch` prior to 4.0.8 is vulnerable to Regular Expression Denial of Service (ReDoS). The vulnerability occurs in `micromatch.braces()` in `index.js` because the pattern `.*` will greedily match anything. By passing a malicious payload, the pattern matching will keep backtracking to the input while it doesn't find the closing bracket. As the input size increases, the consumption time will also increase until it causes the application to hang or slow down. There was a merged fix but further testing shows the issue persists. This issue should be mitigated by using a safe pattern that won't start backtracking the regular expression due to greedy matching. This issue was fixed in version 4.0.8. | [
"cpe:2.3:a:micromatch:micromatch:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
CVE-2020-0169 | In RTTTL_Event of eas_rtttl.c, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-123700383 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-vxh7-4mvv-vr86 | ext/wddx/wddx.c in PHP before 5.6.25 and 7.x before 7.0.10 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) or possibly have unspecified other impact via an invalid wddxPacket XML document that is mishandled in a wddx_deserialize call, as demonstrated by a stray element inside a boolean element, leading to incorrect pop processing. | []
| null | 7.5 | null | null |
|
GHSA-mjq7-g735-3qwr | Windows Mobile Broadband Driver Information Disclosure Vulnerability | []
| null | 4.6 | null | null |
|
GHSA-3mw6-fgc8-7frc | GPAC 2.1-DEV-rev368-gfd054169b-master was discovered to contain a segmentation violation via the function gf_dump_vrml_sffield at /scene_manager/scene_dump.c. | []
| null | 5.5 | null | null |
|
CVE-2019-18275 | OSIsoft PI Vision, All versions of PI Vision prior to 2019. The affected product is vulnerable to an improper access control, which may return unauthorized tag data when viewing analysis data reference attributes. | [
"cpe:2.3:a:osisoft:pi_vision:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 |
|
GHSA-mhq7-f3rw-g8h6 | There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file. | []
| null | null | 5.5 | null |
|
GHSA-gxh2-8x29-mq5r | Microsoft Word 2002 SP3 and 2003 SP3, Office 2004 for Mac, and Word Viewer do not properly handle a malformed record during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Parsing Vulnerability." | []
| null | null | null | null |
|
ICSA-22-153-01 | Carrier LenelS2 HID Mercury access panels | An unauthenticated attacker can update the hostname with a specially crafted name, allowing shell command execution during the core collection process.CVE-2022-31479 has been assigned to this vulnerability. A CVSS v3 base score of 9.6 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H). An unauthenticated attacker could arbitrarily upload firmware files to the target device, ultimately causing a denial-of-service condition.CVE-2022-31480 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). An unauthenticated attacker can send a specially crafted update file to the device that can overflow a buffer.CVE-2022-31481 has been assigned to this vulnerability. A CVSS v3 base score of 10.0 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). An unauthenticated attacker can send a specially crafted unauthenticated HTTP request to the device that can overflow a buffer.CVE-2022-31482 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). An authenticated attacker can manipulate a filename to achieve the ability to upload the desired file anywhere on the filesystem.CVE-2022-31483 has been assigned to this vulnerability. A CVSS v3 base score of 9.1 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H). An unauthenticated attacker can send a specially crafted network packet to delete a user from the web interface.CVE-2022-31484 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). An unauthenticated attacker can send a specially crafted packet to update the notes section on the home page of the web interface.CVE-2022-31485 has been assigned to this vulnerability. A CVSS v3 base score of 5.3 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). An authenticated attacker can send a specially crafted route to a specific binary causing it to execute shell commands.CVE-2022-31486 has been assigned to this vulnerability. A CVSS v3 base score 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). | []
| null | null | 8.8 | null |
GHSA-4qf2-r366-mwj6 | admin/upload_files.php in Zomplog 3.8.1 and earlier does not check for administrative credentials, which allows remote attackers to perform administrative actions via a direct request. NOTE: this can be leveraged for code execution by exploiting CVE-2007-5231. | []
| null | null | null | null |
|
CVE-2019-8645 | An issue existed in the handling of encrypted Mail. This issue was addressed with improved isolation of MIME in Mail. This issue is fixed in macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra. An attacker in a privileged network position may be able to intercept the contents of S/MIME-encrypted e-mail. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 |
|
GHSA-p93q-jr7q-q29w | Code-projects Hotel Managment System 1.0, allows SQL Injection via the 'sid' parameter in Hotel/admin/show.php?sid=2. | []
| null | 9.8 | null | null |
|
GHSA-9g96-9w6q-2hpv | An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-24739315. References: B-RB#73392. | []
| null | null | 7 | null |
|
CVE-2010-3613 | named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3, and 9.7.x before 9.7.2-P3 does not properly handle the combination of signed negative responses and corresponding RRSIG records in the cache, which allows remote attackers to cause a denial of service (daemon crash) via a query for cached data. | [
"cpe:2.3:a:isc:bind:9.6:*:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r1:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6:r2:*:*:esv:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.6.2:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:a2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:a3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:b2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:b3:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:b1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:p2:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:p1:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:9.7.2:p2:*:*:*:*:*:*"
]
| null | null | null | 4 |
|
GHSA-23x5-qv54-6pcg | An arbitrary file upload vulnerability in /dede/file_manage_control.php of DedeCMS v5.7.109 allows attackers to execute arbitrary code via uploading a crafted PHP file. | []
| null | 9.8 | null | null |
|
GHSA-j2w3-9x2h-3h37 | The keystore file in Unicore Client before 5.6 build 5, when running on Unix systems, has insecure default permissions, which allows local users to obtain sensitive information. | []
| null | null | null | null |
|
CVE-2002-0211 | Race condition in the installation script for Tarantella Enterprise 3 3.01 through 3.20 creates a world-writeable temporary "gunzip" program before executing it, which could allow local users to execute arbitrary commands by modifying the program before it is executed. | [
"cpe:2.3:a:tarantella:tarantella_enterprise:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:tarantella:tarantella_enterprise:3.3.20:*:*:*:*:*:*:*"
]
| null | null | null | 6.2 |
|
CVE-2018-11489 | The DGifDecompressLine function in dgif_lib.c in GIFLIB (possibly version 3.0.x), as later shipped in cgif.c in sam2p 0.49.4, has a heap-based buffer overflow because a certain CrntCode array index is not checked. This will lead to a denial of service or possibly unspecified other impact. | [
"cpe:2.3:a:giflib_project:giflib:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sam2p_project:sam2p:0.49.4:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.8 |
|
GHSA-2v4f-h7wf-hprx | Missing Authorization vulnerability in WPEngine Inc. Advanced Custom Fields PRO allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Custom Fields PRO: from n/a through 6.3.1. | []
| null | 5.4 | null | null |
|
CVE-2020-23653 | An insecure unserialize vulnerability was discovered in ThinkAdmin versions 4.x through 6.x in app/admin/controller/api/Update.php and app/wechat/controller/api/Push.php, which may lead to arbitrary remote code execution. | [
"cpe:2.3:a:thinkadmin:thinkadmin:*:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-v3wv-42wv-gh55 | A use-after-free flaw was found in xen_9pfs_front_removet in net/9p/trans_xen.c in Xen transport for 9pfs in the Linux Kernel. This flaw could allow a local attacker to crash the system due to a race problem, possibly leading to a kernel information leak. | []
| null | 4.7 | null | null |
|
CVE-2017-1790 | IBM DOORS Next Generation (DNG/RRC) 5.0, 5.0.1, 5.0.2, and 6.0 through 6.0.5 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 137035. | [
"cpe:2.3:a:ibm:rational_requirements_composer:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_requirements_composer:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_doors_next_generation:6.0.5:*:*:*:*:*:*:*"
]
| null | null | 5.4 | 3.5 |
|
GHSA-jh37-vq2p-5j5h | A null pointer dereference issue was found in the sctp network protocol in net/sctp/stream_sched.c in Linux Kernel. If stream_in allocation is failed, stream_out is freed which would further be accessed. A local user could use this flaw to crash the system or potentially cause a denial of service. | []
| null | 5.5 | null | null |
|
GHSA-hvmf-6hr8-vcpv | Buffer overflow in OpenSAML before 1.1.3 as used in Internet2 Shibboleth Service Provider software 1.3.x before 1.3.4, and XMLTooling before 1.2.2 as used in Internet2 Shibboleth Service Provider software 2.x before 2.2.1, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malformed encoded URL. | []
| null | null | null | null |
|
CVE-2006-6489 | The SISCO OSI stack, as used in SISCO MMS-EASE, ICCP Toolkit for MMS-EASE, AX-S4 MMS and AX-S4 ICCP, and possibly other control system applications, allows remote attackers to cause a denial of service (application termination and restart) via malformed packets. | [
"cpe:2.3:a:sisco:ax-s4_iccp:3.0103:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:ax-s4_iccp:3.0155:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:ax-s4_mms:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:ax-s4_mms:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:iccp_toolkit:4.10_for_mms-ease:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:iccp_toolkit:5.03_for_mms-ease:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:iso_stack:3:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:mms-ease:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sisco:mms-ease:8.03:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-p44j-49f8-cp36 | In the Linux kernel, the following vulnerability has been resolved:media: rga: fix possible memory leak in rga_proberga->m2m_dev needs to be freed when rga_probe fails. | []
| null | 5.5 | null | null |
|
GHSA-9g82-g79v-qfx9 | .NET Framework Remote Code Execution Vulnerability. | []
| null | 7.8 | null | null |
|
CVE-2021-20554 | IBM Sterling Order Management 9.4, 9.5, and 10.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 199179. | [
"cpe:2.3:a:ibm:sterling_order_management:9.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_order_management:9.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_order_management:10:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
|
GHSA-rxw4-5vgr-mq26 | The buffer overflow vulnerability in the DX3300-T1 firmware version V5.50(ABVY.4)C0 could allow an authenticated local attacker to cause denial of service (DoS) conditions by executing the CLI command with crafted strings on an affected device. | []
| null | 5.5 | null | null |
|
CVE-2020-15539 | SQL injection can occur in We-com Municipality portal CMS 2.1.x via the cerca/ keywords field. | [
"cpe:2.3:a:we-com:municipality_portal_cms:2.1.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
PYSEC-2024-126 | null | Label Studio is an a popular open source data labeling tool. Versions prior to 1.9.2 have a cross-site scripting (XSS) vulnerability that could be exploited when an authenticated user uploads a crafted image file for their avatar that gets rendered as a HTML file on the website. Executing arbitrary JavaScript could result in an attacker performing malicious actions on Label Studio users if they visit the crafted avatar image. For an example, an attacker can craft a JavaScript payload that adds a new Django Super Administrator user if a Django administrator visits the image.
The file `users/functions.py` lines 18-49 show that the only verification check is that the file is an image by extracting the dimensions from the file. Label Studio serves avatar images using Django's built-in `serve` view, which is not secure for production use according to Django's documentation. The issue with the Django `serve` view is that it determines the `Content-Type` of the response by the file extension in the URL path. Therefore, an attacker can upload an image that contains malicious HTML code and name the file with a `.html` extension to be rendered as a HTML page. The only file extension validation is performed on the client-side, which can be easily bypassed.
Version 1.9.2 fixes this issue. Other remediation strategies include validating the file extension on the server side, not in client-side code; removing the use of Django's `serve` view and implement a secure controller for viewing uploaded avatar images; saving file content in the database rather than on the filesystem to mitigate against other file related vulnerabilities; and avoiding trusting user controlled inputs. | []
| null | 5.4 | null | null |
GHSA-hx65-7cc8-9862 | An Out-of-Bounds Read vulnerability exists when reading a DXF file using Open Design Alliance Drawings SDK before 2022.11. The specific issue exists within the parsing of DXF files. Crafted data in a DXF file (an invalid dash counter in line types) can trigger a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. | []
| null | 7.8 | null | null |
|
GHSA-q5gp-c57f-33x3 | Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | []
| null | 5.3 | null | null |
|
GHSA-gvjh-72rg-gcjv | A component of the HarmonyOS has a Integer Overflow or Wraparound vulnerability. Local attackers may exploit this vulnerability to cause memory overwriting. | []
| null | null | null | null |
|
CVE-2022-4458 | Amr Shortcode Any Widget <= 4.0 - Contributor+ Stored XSS | The amr shortcode any widget WordPress plugin through 4.0 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [
"cpe:2.3:a:amr_shortcode_any_widget_project:amr_shortcode_any_widget:*:*:*:*:*:wordpress:*:*"
]
| null | 5.4 | null | null |
GHSA-f327-jh4g-35fg | in OpenHarmony v4.1.0 and prior versions allow a local attacker cause crash through integer overflow. | []
| null | 3.3 | null | null |
|
GHSA-mpm2-q4w3-64vg | Buffer overflow in the web server on Cisco DPC2203 and EPC2203 devices with firmware r1_customer_image allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCuv05935. | []
| null | null | 9.8 | null |
|
GHSA-3hpx-5vcc-5jw2 | A vulnerability, which was classified as critical, has been found in Campcodes Complete Online DJ Booking System 1.0. This issue affects some unknown processing of the file /admin/user-search.php. The manipulation of the argument searchdata leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-257465 was assigned to this vulnerability. | []
| null | 6.3 | null | null |
|
CVE-2023-52289 | An issue was discovered in the flaskcode package through 0.0.8 for Python. An unauthenticated directory traversal, exploitable with a POST request to a /update-resource-data/<file_path> URI (from views.py), allows attackers to write to arbitrary files. | [
"cpe:2.3:a:sujeetkv:flaskcode:*:*:*:*:*:python:*:*"
]
| null | 7.5 | null | null |
|
CVE-2005-2223 | Unknown vulnerability in the SMTP service in MailEnable Standard before 1.9 and Professional before 1.6 allows remote attackers to cause a denial of service (crash) during authentication. | [
"cpe:2.3:a:mailenable:mailenable_professional:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.2a:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.51:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.52:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.53:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_professional:1.54:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.71:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.72:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.701:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.702:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.703:*:*:*:*:*:*:*",
"cpe:2.3:a:mailenable:mailenable_standard:1.704:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-52520 | platform/x86: think-lmi: Fix reference leak | In the Linux kernel, the following vulnerability has been resolved:
platform/x86: think-lmi: Fix reference leak
If a duplicate attribute is found using kset_find_obj(), a reference
to that attribute is returned which needs to be disposed accordingly
using kobject_put(). Move the setting name validation into a separate
function to allow for this change without having to duplicate the
cleanup code for this setting.
As a side note, a very similar bug was fixed in
commit 7295a996fdab ("platform/x86: dell-sysman: Fix reference leak"),
so it seems that the bug was copied from that driver.
Compile-tested only. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.6:rc4:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
CVE-2006-1538 | The Enova X-Wall ASIC encrypts with a key obtained via Microwire from a serial EEPROM that stores the key in cleartext, which allows local users with physical access to obtain the key by reading and duplicating an EEPROM that is located on a hardware token, or by sniffing the Microwire bus. | [
"cpe:2.3:a:enova:x-wall_asic:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.9 |
|
GHSA-vxjp-xh3v-669f | Rejected reason: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that there was not reasonable evidence to determine the existence of a vulnerability. | []
| null | null | null | null |
|
GHSA-jw2j-654v-qh53 | The weaver module has a vulnerability in parameter type verification,Successful exploitation of this vulnerability may affect data confidentiality. | []
| null | null | null | null |
|
GHSA-8c9m-qmrp-p848 | A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected. | []
| null | 6.5 | null | null |
|
GHSA-x8c6-chxp-2fjg | The Brizy – Page Builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.5.1. This is due to missing or incorrect nonce validation on form submissions. This makes it possible for unauthenticated attackers to submit forms intended for public use as another user via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. On sites where unfiltered_html is enabled, this can lead to the admin unknowingly adding a Stored Cross-Site Scripting payload. | []
| null | 4.3 | null | null |
|
GHSA-v7rp-w5fr-2xrx | IBM Security Identity Manager (ISIM) Virtual Appliance 7.0.0.0 through 7.0.1.1 before 7.0.1-ISS-SIM-FP0003 mishandles session identifiers after logout, which makes it easier for remote attackers to spoof users by leveraging knowledge of "traffic records." | []
| null | null | 5.6 | null |
|
CVE-2014-4078 | The IP Security feature in Microsoft Internet Information Services (IIS) 8.0 and 8.5 does not properly process wildcard allow and deny rules for domains within the "IP Address and Domain Restrictions" list, which makes it easier for remote attackers to bypass an intended rule set via an HTTP request, aka "IIS Security Feature Bypass Vulnerability." | [
"cpe:2.3:a:microsoft:internet_information_services:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:8.5:*:*:*:*:*:*:*"
]
| null | null | null | 5.1 |
|
GHSA-88fg-35x5-9f8p | The BusinessConnect UI component of TIBCO Software Inc.'s TIBCO BusinessConnect contains easily exploitable Reflected Cross Site Scripting (XSS) vulnerabilities that allow a low privileged attacker with network access to execute scripts targeting the affected system or the victim's local system. Affected releases are TIBCO Software Inc.'s TIBCO BusinessConnect: versions 7.3.0 and below. | []
| null | 5.4 | null | null |
|
CVE-2023-30481 | WordPress AGP Font Awesome Collection Plugin <= 3.2.4 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Alexey Golubnichenko AGP Font Awesome Collection plugin <= 3.2.4 versions. | [
"cpe:2.3:a:profosbox:agp_font_awesome_collection:*:*:*:*:*:wordpress:*:*"
]
| null | 7.1 | null | null |
CVE-2018-0628 | Aterm WG1200HP firmware Ver1.0.31 and earlier allows attacker with administrator rights to execute arbitrary OS commands via HTTP request and response. | [
"cpe:2.3:o:nec:aterm_wg1200hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:aterm_wg1200hp:-:*:*:*:*:*:*:*"
]
| null | null | 7.2 | 9 |
|
GHSA-997j-98p9-4cxv | Multiple PHP remote file inclusion vulnerabilities in the ExtCalThai (com_extcalendar) 0.9.1 and earlier component for Mambo allow remote attackers to execute arbitrary PHP code via a URL in (1) the CONFIG_EXT[LANGUAGES_DIR] parameter to admin_events.php, (2) the mosConfig_absolute_path parameter to extcalendar.php, or (3) the CONFIG_EXT[LIB_DIR] parameter to lib/mail.inc.php. | []
| null | null | null | null |
|
GHSA-9898-j6rc-mv8c | GE CIMPICITY versions 2022 and prior is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code. | []
| null | 7.8 | null | null |
|
CVE-2005-0854 | betaparticle blog (bp blog), posisbly before version 4, allows remote attackers to bypass authentication and (1) upload files via a direct request to upload.asp or (2) delete files via a direct request to myFiles.asp. | [
"cpe:2.3:a:betaparticle:betaparticle_blog:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:betaparticle:betaparticle_blog:3.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2020-2504 | Absolute path traversal vulnerability in QES | If exploited, this absolute path traversal vulnerability could allow attackers to traverse files in File Station. QNAP has already fixed these issues in QES 2.1.1 Build 20201006 and later. | [
"cpe:2.3:a:qnap:qes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:-:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200211:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200303:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200319:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200424:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200515:*:*:*:*:*:*",
"cpe:2.3:a:qnap:qes:2.1.1:build_20200811:*:*:*:*:*:*"
]
| null | 5.8 | null | null |
CVE-2017-10380 | Vulnerability in the Java Advanced Management Console component of Oracle Java SE (subcomponent: Server). The supported version that is affected is Java Advanced Management Console: 2.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java Advanced Management Console. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java Advanced Management Console, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java Advanced Management Console accessible data as well as unauthorized read access to a subset of Java Advanced Management Console accessible data. CVSS 3.0 Base Score 4.7 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:java_advanced_management_console:2.7:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 4 |
|
GHSA-664r-cm23-qqfp | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in moreconvert MC Woocommerce Wishlist allows Reflected XSS. This issue affects MC Woocommerce Wishlist: from n/a through 1.9.1. | []
| null | 7.1 | null | null |
|
GHSA-9r85-jqv2-rmpv | Anantasoft Gazelle CMS 1.0 allows remote attackers to conduct a password reset for other users via a modified user parameter to renew.php. | []
| null | null | null | null |
|
GHSA-hp3w-grg4-233f | mintplex-labs/anything-llm is vulnerable to path traversal attacks due to insufficient validation of user-supplied input in the logo filename functionality. Attackers can exploit this vulnerability by manipulating the logo filename to reference files outside of the restricted directory. This can lead to unauthorized reading or deletion of files by utilizing the `/api/system/upload-logo` and `/api/system/logo` endpoints. The issue stems from the lack of filtering or validation on the logo filename, allowing attackers to target sensitive files such as the application's database. | []
| null | null | 9.9 | null |
|
CVE-2021-21790 | An information disclosure vulnerability exists in the the way IOBit Advanced SystemCare Ultimate 14.2.0.220 driver handles Privileged I/O read requests. A specially crafted I/O request packet (IRP) can lead to privileged reads in the context of a driver which can result in sensitive information disclosure from the kernel. The IN instruction can read two bytes from the given I/O device, potentially leaking sensitive device data to unprivileged users. | [
"cpe:2.3:a:iobit:advanced_systemcare_ultimate:14.2.0.220:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
RHSA-2017:0324 | Red Hat Security Advisory: kernel security update | kernel: use after free in dccp protocol | [
"cpe:/o:redhat:rhel_aus:6.6::server",
"cpe:/o:redhat:rhel_tus:6.6::server"
]
| null | null | 7.8 | null |
CVE-2013-1914 | Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.17 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of domain conversion results. | [
"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2005-1366 | Pico Server (pServ) 3.2 and earlier allows remote attackers to obtain the source code for CGI scripts via "dirname/../cgi-bin" in a URL. | [
"cpe:2.3:a:pico_server:pico_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:pico_server:pico_server:3.0_beta_3:*:*:*:*:*:*:*",
"cpe:2.3:a:pico_server:pico_server:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:pico_server:pico_server:3.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-85x2-vg3f-pxwm | The Dario Health Internet-based server infrastructure is vulnerable due to exposure of development environment details, which could lead to unsafe functionality. | []
| 6.9 | 5.3 | null | null |
|
GHSA-wq7q-7vfh-2x3h | install-nw downloads Resources over HTTP | Affected versions of `install-nw` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `install-nw`.RecommendationUpdate to version 1.1.5 or later. | []
| null | null | 8.1 | null |
GHSA-92rj-7fw7-8v5r | Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the calculation of a length could lead to a heap overflow. | []
| null | null | null | null |
|
CVE-2017-6262 | NVIDIA driver contains a vulnerability where it is possible a use after free malfunction can occur due to a race condition which could enable unauthorized code execution and possibly lead to elevation of privileges. This issue is rated as high. Product: Android. Version: N/A. Android ID: A-38045794. References: N-CVE-2017-6262. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | null | 7 | 6.9 |
|
RHSA-2020:4136 | Red Hat Security Advisory: security update - Red Hat Ansible Tower 3.7.3-1 - RHEL7 Container | django-rest-framework: XSS Vulnerability in API viewer | [
"cpe:/a:redhat:ansible_tower:3.7::el7"
]
| null | 5.4 | null | null |
CVE-2006-5648 | Ubuntu Linux 6.10 for the PowerPC (PPC) allows local users to cause a denial of service (resource consumption) by using the (1) sys_get_robust_list and (2) sys_set_robust_list functions to create processes that cannot be killed. | [
"cpe:2.3:o:ubuntu:ubuntu_linux:6.10:*:powerpc:*:*:*:*:*"
]
| null | 5.5 | null | 4.6 |
|
GHSA-qr25-w2r2-h5v4 | An issue was discovered in the JSmol2WP plugin 1.07 for WordPress. There is an arbitrary file read vulnerability via ../ directory traversal in query=php://filter/resource= in the jsmol.php query string. This can also be used for SSRF. | []
| null | null | 7.5 | null |
|
GHSA-mm5q-x9qg-x4vp | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8466, CVE-2018-8467. | []
| null | null | 7.5 | null |
CVE-2006-5876 | The soup_headers_parse function in soup-headers.c for libsoup HTTP library before 2.2.99 allows remote attackers to cause a denial of service (crash) via malformed HTTP headers, probably involving missing fields or values. | [
"cpe:2.3:a:libsoup:libsoup:2.2.98:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2022-48251 | The AES instructions on the ARMv8 platform do not have an algorithm that is "intrinsically resistant" to side-channel attacks. NOTE: the vendor reportedly offers the position "while power side channel attacks ... are possible, they are not directly caused by or related to the Arm architecture." | [
"cpe:2.3:o:arm:cortex-a53_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a53:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a57_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a57:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a72_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a73_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a73:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a75_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a75:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a76_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a76:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a76ae_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a76ae:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a77_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a77:-:*:*:*:*:*:*:*",
"cpe:2.3:o:arm:cortex-a78_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arm:cortex-a78:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2024-23704 | In onCreate of WifiDialogActivity.java, there is a possible way to bypass the DISALLOW_ADD_WIFI_CONFIG restriction due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
]
| null | 7 | null | null |
|
GHSA-qrpm-2f6m-pf3c | IBM QRadar SIEM 7.3, 7.4, and 7.5 stores potentially sensitive information in log files that could be read by an user with access to creating domains. IBM X-Force ID: 211037. | []
| null | 5.3 | null | null |
|
GHSA-gr6q-m3p4-m22c | CSZ CMS 1.2.9 is vulnerable to Arbitrary File Deletion. This occurs in PHP when the unlink() function is called and user input might affect portions of or the whole affected parameter, which represents the path of the file to remove, without sufficient sanitization. | []
| null | null | null | null |
|
CVE-2021-26388 | Improper validation of the BIOS directory may allow for searches to read beyond the directory table copy in RAM, exposing out of bounds memory contents, resulting in a potential denial of service. | [
"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3300x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_1950x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_1950x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_1920x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_1920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_1900x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_1900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2200u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_2300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_2600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_2800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3200u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_3250u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5300u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5500u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5700u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5125c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5400u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_3_5425u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5560u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5625u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_5_5600hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5825u_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_7_5800hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5900hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hs_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:ryzen_9_5980hx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.9 |
|
CVE-2014-8681 | SQL injection vulnerability in the GetIssues function in models/issue.go in Gogs (aka Go Git Service) 0.3.1-9 through 0.5.6.x before 0.5.6.1025 Beta allows remote attackers to execute arbitrary SQL commands via the label parameter to user/repos/issues. | [
"cpe:2.3:a:gogits:gogs:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gogits:gogs:0.3.1-9:*:*:*:*:*:*:*",
"cpe:2.3:a:gogits:gogs:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gogits:gogs:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gogits:gogs:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:gogits:gogs:0.5.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
CVE-2018-1244 | iDRAC7/iDRAC8/iDrac9 contains a command injection vulnerability in the SNMP agent. | Dell EMC iDRAC7/iDRAC8, versions prior to 2.60.60.60, and iDRAC9 versions prior to 3.21.21.21 contain a command injection vulnerability in the SNMP agent. A remote authenticated malicious iDRAC user with configuration privileges could potentially exploit this vulnerability to execute arbitrary commands on the iDRAC where SNMP alerting is enabled. | [
"cpe:2.3:o:dell:idrac7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:idrac8_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dell:idrac9_firmware:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | null |
GHSA-85wq-pqhp-hmq6 | Cross-Site Request Forgery in Jenkins | Jenkins versions 2.56 and earlier as well as 2.46.1 LTS and earlier are vulnerable to an issue in the Jenkins user database authentication realm: create an account if signup is enabled; or create an account if the victim is an administrator, possibly deleting the existing default admin user in the process and allowing a wide variety of impacts. | []
| null | null | 8.8 | null |
GHSA-mhpc-25wr-qcwq | IBM Tivoli Endpoint Manager is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 123859. | []
| null | null | 6.5 | null |
|
CVE-2014-4209 | Unspecified vulnerability in Oracle Java SE 5.0u65, 6u75, 7u60, and 8u5 allows remote attackers to affect confidentiality and integrity via vectors related to JMX. | [
"cpe:2.3:a:oracle:jdk:1.5.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update75:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update5:*:*:*:*:*:*"
]
| null | null | null | 6.4 |
|
CVE-2022-50082 | ext4: fix warning in ext4_iomap_begin as race between bmap and write | In the Linux kernel, the following vulnerability has been resolved:
ext4: fix warning in ext4_iomap_begin as race between bmap and write
We got issue as follows:
------------[ cut here ]------------
WARNING: CPU: 3 PID: 9310 at fs/ext4/inode.c:3441 ext4_iomap_begin+0x182/0x5d0
RIP: 0010:ext4_iomap_begin+0x182/0x5d0
RSP: 0018:ffff88812460fa08 EFLAGS: 00010293
RAX: ffff88811f168000 RBX: 0000000000000000 RCX: ffffffff97793c12
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003
RBP: ffff88812c669160 R08: ffff88811f168000 R09: ffffed10258cd20f
R10: ffff88812c669077 R11: ffffed10258cd20e R12: 0000000000000001
R13: 00000000000000a4 R14: 000000000000000c R15: ffff88812c6691ee
FS: 00007fd0d6ff3740(0000) GS:ffff8883af180000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fd0d6dda290 CR3: 0000000104a62000 CR4: 00000000000006e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
iomap_apply+0x119/0x570
iomap_bmap+0x124/0x150
ext4_bmap+0x14f/0x250
bmap+0x55/0x80
do_vfs_ioctl+0x952/0xbd0
__x64_sys_ioctl+0xc6/0x170
do_syscall_64+0x33/0x40
entry_SYSCALL_64_after_hwframe+0x44/0xa9
Above issue may happen as follows:
bmap write
bmap
ext4_bmap
iomap_bmap
ext4_iomap_begin
ext4_file_write_iter
ext4_buffered_write_iter
generic_perform_write
ext4_da_write_begin
ext4_da_write_inline_data_begin
ext4_prepare_inline_data
ext4_create_inline_data
ext4_set_inode_flag(inode,
EXT4_INODE_INLINE_DATA);
if (WARN_ON_ONCE(ext4_has_inline_data(inode))) ->trigger bug_on
To solved above issue hold inode lock in ext4_bamp. | []
| null | null | null | null |
GHSA-2gjc-fp8x-jx4q | A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic. This vulnerability affects unknown code of the component Rooting Detection. The manipulation leads to protection mechanism failure. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 1.8 | 3.9 | null | null |
|
CVE-2024-50563 | A weak authentication in Fortinet FortiManager Cloud, FortiAnalyzer versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiAnalyzer Cloud versions 7.4.1 through 7.4.3, FortiManager versions 7.6.0 through 7.6.1, 7.4.1 through 7.4.3, FortiManager Cloud versions 7.4.1 through 7.4.3 allows attacker to execute unauthorized code or commands via a brute-force attack. | [
"cpe:2.3:o:fortinet:fortianalyzer:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortianalyzer:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:fortinet:fortimanager:7.4.1:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
CVE-2018-3874 | An exploitable buffer overflow vulnerability exists in the credentials handler of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250-Firmware version 0.20.17. The strncpy overflows the destination buffer, which has a size of 32 bytes. An attacker can send an arbitrarily long "accessKey" value in order to exploit this vulnerability. | [
"cpe:2.3:o:samsung:sth-eth-250_firmware:0.20.17:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:sth-eth-250:-:*:*:*:*:*:*:*"
]
| null | null | 9.9 | null |
|
GHSA-xpp5-m7fr-wp25 | A Prototype pollution vulnerability in Kibana leads to arbitrary code execution via crafted HTTP requests to machine learning and reporting endpoints. | []
| null | 9.1 | null | null |
|
CVE-2024-47904 | A vulnerability has been identified in InterMesh 7177 Hybrid 2.0 Subscriber (All versions < V8.2.12), InterMesh 7707 Fire Subscriber (All versions < V7.2.12 only if the IP interface is enabled (which is not the default configuration)). The affected devices contain a SUID binary that could allow an authenticated local attacker to execute arbitrary commands with root privileges. | [
"cpe:2.3:a:siemens:intermesh_7177_hybrid2.0_subscriber:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:intermesh_7707_fire_subscriber:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:intermesh_7177_hybrid_2.0_subscriber:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:intermesh_7177_hybrid_2.0_subscriber:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:intermesh_7707_fire_subscriber_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:intermesh_7707_fire_subscriber:-:*:*:*:*:*:*:*"
]
| 8.5 | 7.8 | null | null |
|
CVE-2022-21572 | Vulnerability in the Oracle Communications Billing and Revenue Management product of Oracle Communications Applications (component: Billing Care). Supported versions that are affected are 12.0.0.4.0-12.0.0.6.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Billing and Revenue Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Billing and Revenue Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Billing and Revenue Management accessible data as well as unauthorized read access to a subset of Oracle Communications Billing and Revenue Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
RHBA-2023:2977 | Red Hat Bug Fix Advisory: linux-firmware bug fix and enhancement update | amd: Return Address Predictor vulnerability leading to information disclosure | [
"cpe:/o:redhat:enterprise_linux:8::baseos"
]
| null | 5.6 | null | null |
GHSA-w44w-3r72-gmr4 | The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.15 via the rjg_get_youtube_info_justified_gallery_callback function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to retrieve limited information from internal services. | []
| null | 4.3 | null | null |
|
cisco-sa-ftd-tls-bb-rCgtmY2 | Cisco Firepower Threat Defense Software SSL Decryption Policy Bleichenbacher Attack Vulnerability | A vulnerability in the TLS handler of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to gain access to sensitive information.
This vulnerability is due to improper implementation of countermeasures against a Bleichenbacher attack on a device that uses SSL decryption policies. An attacker could exploit this vulnerability by sending crafted TLS messages to an affected device, which would act as an oracle and allow the attacker to carry out a chosen-ciphertext attack. A successful exploit could allow the attacker to perform cryptanalytic operations that may allow decryption of previously captured TLS sessions to the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the November 2022 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: November 2022 Semiannual Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74838"]. | []
| null | 5.3 | null | null |
GHSA-qc52-6cw2-7g23 | Certain NETGEAR devices are affected by a buffer overflow by an unauthenticated attacker. This affects RAX40 before 1.0.2.60, RAX35 before 1.0.2.60, R6400v2 before 1.0.4.122, R6700v3 before 1.0.4.122, R6900P before 1.3.3.152, R7000P before 1.3.3.152, R7000 before 1.0.11.136, R7960P before 1.4.4.94, and R8000P before 1.4.4.94. | []
| null | 9.8 | null | null |
|
GHSA-x3q9-c5xr-rhh8 | Unrestricted Upload of File with Dangerous Type vulnerability in Web Ready Now WR Price List Manager For Woocommerce allows Upload a Web Shell to a Web Server.This issue affects WR Price List Manager For Woocommerce: from n/a through 1.0.8. | []
| null | 9.9 | null | null |
|
CVE-2018-16095 | System Management Module Vulnerabilities | In System Management Module (SMM) versions prior to 1.06, the SMM records hashed passwords to a debug log when user authentication fails. | [
"cpe:2.3:o:lenovo:system_management_module_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_enclosure_7x81:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_enclosure_7y87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_hx_enclosure_7z02:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_enclosure_7y11:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkagile_vx_enclosure_7y91:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_d2_enclosure_7x20:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinksystem_modular_enclosure_7x22:-:*:*:*:*:*:*:*"
]
| null | null | 5.9 | 4.3 |
GHSA-2rfj-52vv-cpj6 | ** UNSUPPORTED WHEN ASSIGNED ** Belkin LINKSYS WRT160NL 1.0.04.002_US_20130619 devices have a stack-based buffer overflow vulnerability because of sprintf in create_dir in mini_httpd. Successful exploitation leads to arbitrary code execution. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | []
| null | 8.8 | null | null |
|
GHSA-395v-ww5m-qq2x | Exim 4 before 4.94.2 allows Integer Overflow to Buffer Overflow because get_stdinput allows unbounded reads that are accompanied by unbounded increases in a certain size variable. NOTE: exploitation may be impractical because of the execution time needed to overflow (multiple days). | []
| null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.