id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
listlengths
0
4.89k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-vxv9-h8fr-8f88
A heap-based buffer overflow was discovered in the Linux kernel, all versions 3.x.x and 4.x.x before 4.18.0, in Marvell WiFi chip driver. The flaw could occur when the station attempts a connection negotiation during the handling of the remote devices country settings. This could allow the remote device to cause a denial of service (system crash) or possibly execute arbitrary code.
[]
null
9.8
null
null
CVE-2024-0030
In btif_to_bta_response of btif_gatt_util.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2018:1696
Red Hat Security Advisory: redhat-virtualization-host security update
hw: cpu: speculative store bypass
[ "cpe:/o:redhat:enterprise_linux:7::hypervisor" ]
null
null
5.6
null
GHSA-8f8m-6wxw-pcr3
TOTOLINK A3300R V17.0.0cu.557_B20221024 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function.
[]
null
9.8
null
null
GHSA-vm3x-xpcr-m2cg
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
[]
null
3.7
null
null
CVE-2024-1418
The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled.
[]
null
5.3
null
null
GHSA-mc25-v89w-9644
An issue was discovered in MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 through 2.6.2. The software uses a secure password for database access, but this password is shared across instances.
[]
null
null
null
null
GHSA-fxgw-f44q-85m6
An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker.
[]
null
null
6.1
null
CVE-2024-9532
D-Link DIR-605L formAdvanceSetup buffer overflow
A vulnerability has been found in D-Link DIR-605L 2.13B01 BETA and classified as critical. This vulnerability affects the function formAdvanceSetup of the file /goform/formAdvanceSetup. The manipulation of the argument webpage leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*" ]
8.7
8.8
8.8
9
CVE-2024-50152
smb: client: fix possible double free in smb2_set_ea()
In the Linux kernel, the following vulnerability has been resolved: smb: client: fix possible double free in smb2_set_ea() Clang static checker(scan-build) warning: fs/smb/client/smb2ops.c:1304:2: Attempt to free released memory. 1304 | kfree(ea); | ^~~~~~~~~ There is a double free in such case: 'ea is initialized to NULL' -> 'first successful memory allocation for ea' -> 'something failed, goto sea_exit' -> 'first memory release for ea' -> 'goto replay_again' -> 'second goto sea_exit before allocate memory for ea' -> 'second memory release for ea resulted in double free'. Re-initialie 'ea' to NULL near to the replay_again label, it can fix this double free problem.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-m7f5-359q-mv7c
Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Enterprise Config Management). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L).
[]
null
6
null
null
CVE-2017-15323
Huawei DP300 V500R002C00, NIP6600 V500R001C00, V500R001C20, V500R001C30, Secospace USG6500 V500R001C00, V500R001C20, V500R001C30, TE60 V100R001C01, V100R001C10, V100R003C00, V500R002C00, V600R006C00, TP3106 V100R001C06, V100R002C00, VP9660 V200R001C02, V200R001C30, V500R002C00, V500R002C10, ViewPoint 8660 V100R008C03, ViewPoint 9030 V100R011C02, V100R011C03, eCNS210_TD V100R004C10, eSpace U1981 V200R003C30 have a DoS vulnerability caused by memory exhaustion in some Huawei products. For lacking of adequate input validation, attackers can craft and send some malformed messages to the target device to exhaust the memory of the device and cause a Denial of Service (DoS).
[ "cpe:2.3:o:huawei:dp300_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:dp300:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:nip6600_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:nip6600:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c20:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:secospace_usg6500_firmware:v500r001c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:secospace_usg6500:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c01:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r001c10:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v100r003c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:te60_firmware:v600r006c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:te60:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:tp3106_firmware:v100r001c06:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:tp3106_firmware:v100r002c00:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:tp3106:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v200r001c30:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c00:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:vp9660_firmware:v500r002c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:vp9660:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_8660_firmware:v100r008c03:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_8660:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c02:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:viewpoint_9030_firmware:v100r011c03:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:viewpoint_9030:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:ecns210_td_firmware:v100r004c10:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:ecns210_td:-:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:espace_u1981_firmware:v200r003c30:*:*:*:*:*:*:*", "cpe:2.3:h:huawei:espace_u1981:-:*:*:*:*:*:*:*" ]
null
null
5.5
4.9
GHSA-32f7-cmr3-vpjv
Moderate severity vulnerability that affects aioxmpp
**Withdrawn:** Duplicate of GHSA-6m9g-jr8c-cqw3
[]
null
null
null
null
CVE-2019-20010
An issue was discovered in GNU LibreDWG 0.92. There is a use-after-free in resolve_objectref_vector in decode.c.
[ "cpe:2.3:a:gnu:libredwg:0.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ]
null
8.8
null
6.8
GHSA-295v-hjgh-6c75
GNU gdb (GDB) 13.0.50.20220805-git was discovered to contain a heap use after free via the function add_pe_exported_sym() at /gdb/coff-pe-read.c.
[]
null
5.5
null
null
GHSA-7x38-336c-qcwr
A vulnerability was found in Kentico CMS up to 13.0.178. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /CMSInstall/install.aspx of the component Additional Database Installation Wizard. The manipulation of the argument new database leads to cross site scripting. The attack can be launched remotely. Upgrading to version 13.0.179 is able to address this issue. It is recommended to upgrade the affected component.
[]
4.8
2.4
null
null
CVE-2005-3326
SQL injection vulnerability in usercp.php in MyBulletinBoard (MyBB) allows remote attackers to execute arbitrary SQL commands via the awayday parameter.
[ "cpe:2.3:a:mybulletinboard:mybulletinboard:1.0_pr2:*:*:*:*:*:*:*", "cpe:2.3:a:mybulletinboard:mybulletinboard:rc4:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7x3g-q3pp-h6vc
Cross-Site Request Forgery (CSRF) vulnerability in Eli EZ SQL Reports Shortcode Widget and DB Backup allows SQL Injection. This issue affects EZ SQL Reports Shortcode Widget and DB Backup: from n/a through 5.25.08.
[]
null
8.2
null
null
GHSA-j546-3m5x-fx7p
In Eclipse Mosquitto version 1.6 to 2.0.10, if an authenticated client that had connected with MQTT v5 sent a crafted CONNECT message to the broker a memory leak would occur, which could be used to provide a DoS attack against the broker.
[]
null
null
null
null
CVE-2018-6179
Insufficient enforcement of file access permission in the activeTab case in Extensions in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*" ]
null
null
6.5
4.3
CVE-2023-27320
Sudo before 1.9.13p2 has a double free in the per-command chroot feature.
[ "cpe:2.3:a:sudo_project:sudo:*:*:*:*:*:*:*:*", "cpe:2.3:a:sudo_project:sudo:1.9.13:-:*:*:*:*:*:*", "cpe:2.3:a:sudo_project:sudo:1.9.13:p1:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*" ]
null
7.2
null
null
RHSA-2011:1019
Red Hat Security Advisory: libvirt security, bug fix, and enhancement update
libvirt: integer overflow in VirDomainGetVcpus
[ "cpe:/a:redhat:rhel_virtualization:5::client", "cpe:/a:redhat:rhel_virtualization:5::server" ]
null
null
null
null
CVE-2021-26352
Insufficient bound checks in System Management Unit (SMU) PCIe Hot Plug table may result in access/updates from/to invalid address space that could result in denial of service.
[ "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_2700_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*" ]
null
5.5
null
4.9
RHSA-2021:4725
Red Hat Security Advisory: OpenShift Virtualization 2.6.8 Images security and bug fix update
golang: net: incorrect parsing of extraneous zero characters at the beginning of an IP address octet golang: crypto/tls: certificate of wrong type is causing TLS client to panic
[ "cpe:/a:redhat:container_native_virtualization:2.6::el8" ]
null
6.5
null
null
GHSA-gr4x-96qv-rrhg
In Crea8social 2018.2, there is Stored Cross-Site Scripting via a post.
[]
null
null
5.4
null
CVE-2022-29637
An arbitrary file upload vulnerability in Mindoc v2.1-beta.5 allows attackers to execute arbitrary commands via a crafted Zip file.
[ "cpe:2.3:a:iminho:mindoc:2.1:beta5:*:*:*:*:*:*" ]
null
7.8
null
6.8
CVE-2022-41497
ClipperCMS 1.3.3 was discovered to contain a Server-Side Request Forgery (SSRF) via the pkg_url parameter at /manager/index.php.
[ "cpe:2.3:a:clippercms:clippercms:1.3.3:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-m5r8-hrmj-57qg
Multiple directory traversal vulnerabilities in connector.php in FCKeditor 2.0 FC, as used in products such as RunCMS, allow remote attackers to list and create arbitrary directories via a .. (dot dot) in the CurrentFolder parameter to (1) GetFoldersAndFiles and (2) CreateFolder.
[]
null
null
null
null
CVE-2008-5994
Cross-site scripting (XSS) vulnerability in index.php in Check Point Connectra NGX R62 HFA_01 allows remote attackers to inject arbitrary web script or HTML via the dir parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:checkpoint:connectra_ngx:r62:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-gp76-q5qq-q7gp
Cisco IOS 12.0S, 12.2, and 12.3, with Open Shortest Path First (OSPF) enabled, allows remote attackers to cause a denial of service (device reload) via a malformed OSPF packet.
[]
null
null
null
null
CVE-2019-12899
Delta Electronics DeviceNet Builder 2.04 has a User Mode Write AV starting at ntdll!RtlQueueWorkItem+0x00000000000005e3.
[ "cpe:2.3:a:deltaww:devicenet_builder:2.04:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
GHSA-3rgp-vp68-5fmp
NVIDIA DGX servers, all BMC firmware versions prior to 3.38.30, contain a vulnerability in the AMI BMC firmware in which the Pseudo-Random Number Generator (PRNG) algorithm used in the JSOL package that implements the IPMI protocol is not cryptographically strong, which may lead to information disclosure.
[]
null
null
null
null
GHSA-xq4m-r2r3-54jq
acp/core/files.browser.php in flatCore 1.4.7 allows file deletion via directory traversal in the delete parameter to acp/acp.php. The risk might be limited to requests submitted through CSRF.
[]
null
null
7.5
null
GHSA-683m-7gmx-8xcc
An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted font file may lead to arbitrary code execution.
[]
null
null
null
null
CVE-2025-24331
Nokia Single RAN baseband OAM service extensive capabilities
The Single RAN baseband OAM service is intended to run as an unprivileged service. However, it initially starts with root privileges and assigns certain capabilities before dropping to an unprivileged level. The capabilities retained from the root period are considered extensive after the privilege drop and, in theory, could potentially allow actions beyond the intended scope of the OAM service. These actions could include gaining root privileges, accessing root-owned files, modifying them as the file owner, and then returning them to root ownership. This issue has been corrected starting from release 24R1-SR 0.2 MP and later. Beginning with release 24R1-SR 0.2 MP, the OAM service software capabilities are restricted to the minimum necessary.
[]
null
6.4
null
null
CVE-2012-6509
Unrestricted file upload vulnerability in NetArt Media Car Portal 3.0 allows remote attackers to execute arbitrary PHP code by uploading a file a double extension, as demonstrated by .php%00.jpg.
[ "cpe:2.3:a:netartmedia:car_portal:3.0:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-qj2j-r78w-5jg7
SQL injection vulnerability in index.php in the Tiny Event (tinyevent) 1.01 module for XOOPS allows remote attackers to execute arbitrary SQL commands via the id parameter in a print action, a different vector than CVE-2007-1811.
[]
null
null
null
null
GHSA-27vh-g9xh-6mc8
In versions 15.0.0-15.1.0.1, 14.1.0-14.1.2.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.1, and 11.6.1-11.6.5.2, the BIG-IP Server SSL profile ignores revoked certificates, even when a valid CRL is present. This impacts server-side connections and may result in a man-in-the-middle attack on the connections.
[]
null
7.4
null
null
GHSA-qm97-3g92-vvvg
Adobe Media Encoder version 15.4 (and earlier) are affected by a memory corruption vulnerability. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious M4A file.
[]
null
7.8
null
null
CVE-2025-1335
CmsEasy file_admin.php deleteimg_action path traversal
A vulnerability, which was classified as problematic, was found in CmsEasy 7.7.7.9. Affected is the function deleteimg_action in the library lib/admin/file_admin.php. The manipulation of the argument imgname leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
5.3
4.3
4.3
4
CVE-2013-0510
IBM Security AppScan Enterprise 5.6 and 8.x before 8.7 includes a security test that sends session cookies to a specific external server, which allows man-in-the-middle attackers to hijack the test account by capturing these cookies.
[ "cpe:2.3:a:ibm:security_appscan:5.6.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.0.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.0.2:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.1.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.1.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.0.11:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.5.0.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.6.0.0:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.6.0.1:-:enterprise:*:*:*:*:*", "cpe:2.3:a:ibm:security_appscan:8.6.0.2:-:enterprise:*:*:*:*:*" ]
null
null
null
4.3
GHSA-9fcr-9vq3-v9fx
An issue was discovered on D-Link DIR-809 A1 through 1.09, A2 through 1.11, and Guest Zone through 1.09 devices. One can bypass authentication mechanisms to download the configuration file.
[]
null
null
7.5
null
GHSA-5p25-jv7x-3c98
Microsoft SharePoint Server Information Disclosure Vulnerability
[]
null
5.3
null
null
RHSA-2016:2972
Red Hat Security Advisory: vim security update
vim: Lack of validation of values for few options results in code exection
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
7.5
null
CVE-2023-26067
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
[ "cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs943:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtct_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtpm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtmm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mstgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:csnzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxnzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtpp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx820:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx825:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx827:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx86:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc6153:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc8163:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c6160:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs820:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs827:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstat_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs720:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs727:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs728:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtat_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx727:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4140:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4143:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4153:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstmh_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs921:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs923:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs927:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c923:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx920:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx921:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx922:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx923:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx924:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9225:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9235:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9245:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9255:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9265:-:*:*:*:*:*:*:*" ]
null
8.1
null
null
CVE-2020-17469
An issue was discovered in FNET through 4.6.4. The code for IPv6 fragment reassembly tries to access a previous fragment starting from a network incoming fragment that still doesn't have a reference to the previous one (which supposedly resides in the reassembly list). When faced with an incoming fragment that belongs to a non-empty fragment list, IPv6 reassembly must check that there are no empty holes between the fragments: this leads to an uninitialized pointer dereference in _fnet_ip6_reassembly in fnet_ip6.c, and causes Denial-of-Service.
[ "cpe:2.3:a:butok:fnet:*:*:*:*:*:*:*:*" ]
null
7.5
null
5
CVE-2015-8450
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via a crafted filters property value in a TextField object, a different vulnerability than CVE-2015-8048, CVE-2015-8049, CVE-2015-8050, CVE-2015-8055, CVE-2015-8056, CVE-2015-8057, CVE-2015-8058, CVE-2015-8059, CVE-2015-8061, CVE-2015-8062, CVE-2015-8063, CVE-2015-8064, CVE-2015-8065, CVE-2015-8066, CVE-2015-8067, CVE-2015-8068, CVE-2015-8069, CVE-2015-8070, CVE-2015-8071, CVE-2015-8401, CVE-2015-8402, CVE-2015-8403, CVE-2015-8404, CVE-2015-8405, CVE-2015-8406, CVE-2015-8410, CVE-2015-8411, CVE-2015-8412, CVE-2015-8413, CVE-2015-8414, CVE-2015-8420, CVE-2015-8421, CVE-2015-8422, CVE-2015-8423, CVE-2015-8424, CVE-2015-8425, CVE-2015-8426, CVE-2015-8427, CVE-2015-8428, CVE-2015-8429, CVE-2015-8430, CVE-2015-8431, CVE-2015-8432, CVE-2015-8433, CVE-2015-8434, CVE-2015-8435, CVE-2015-8436, CVE-2015-8437, CVE-2015-8441, CVE-2015-8442, CVE-2015-8447, CVE-2015-8448, CVE-2015-8449, CVE-2015-8452, and CVE-2015-8454.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2025-4440
H3C GR-1800AX aspForm EnableIpv6 buffer overflow
A vulnerability was found in H3C GR-1800AX up to 100R008 and classified as critical. Affected by this issue is the function EnableIpv6 of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used.
[]
8.6
8
8
7.7
GHSA-3j6r-rxq5-32pr
Heap-based buffer overflow in Adobe PageMaker 7.0.1 and 7.0.2 allows user-assisted remote attackers to execute arbitrary code via a .PMD file with a crafted font structure.
[]
null
null
null
null
GHSA-f4c5-5qx8-v3vp
Cross-site scripting (XSS) vulnerability in AccessCodeStart.asp in Cisco Building Broadband Service Manager (BBSM) Captive Portal 5.3 allows remote attackers to inject arbitrary web script or HTML via the msg parameter.
[]
null
null
null
null
ICSA-18-296-01
Advantech WebAccess
Several stack-based buffer overflow vulnerabilities have been identified, which may allow an attacker to execute arbitrary code.CVE-2018-14816 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A .dll component is susceptible to external control of file name or path vulnerability, which may allow an arbitrary file deletion when processing.CVE-2018-14820 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H). An improper privilege management vulnerability has been identified, which may allow an attacker to access those files and perform actions at a system administrator level.CVE-2018-14828 has been assigned to this vulnerability. A CVSS v3 base score of 7.8 has been assigned; the CVSS vector string is (AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A path traversal vulnerability may allow an attacker to execute arbitrary code.CVE-2018-14806 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
9.8
null
GHSA-mc94-7gpp-mqfv
Data ONTAP operating in 7-Mode versions prior to 8.2.5P3 are susceptible to a vulnerability which discloses information to an unauthenticated attacker. A successful attack requires that multiple non-default options be enabled.
[]
null
null
null
null
CVE-2018-14348
libcgroup up to and including 0.41 creates /var/log/cgred with mode 0666 regardless of the configured umask, leading to disclosure of information.
[ "cpe:2.3:a:libcgroup_project:libcgroup:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*" ]
null
null
8.1
5.5
GHSA-gqg6-q62h-373r
In mmsdk, there is a possible escalation of privilege due to a parcel format mismatch. This could lead to local code execution with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07203022; Issue ID: ALPS07203022.
[]
null
7.8
null
null
GHSA-wmmp-mchh-75gf
In the Linux kernel, the following vulnerability has been resolved:firewire: nosy: ensure user_length is taken into account when fetching packet contentsEnsure that packet_buffer_get respects the user_length provided. If the length of the head packet exceeds the user_length, packet_buffer_get will now return 0 to signify to the user that no data were read and a larger buffer size is required. Helps prevent user space overflows.
[]
null
null
null
null
RHSA-2014:1692
Red Hat Security Advisory: openssl security update
openssl: SRTP memory leak causes crash when using specially-crafted handshake message openssl: Invalid TLS/SSL session tickets could cause memory leak leading to server crash
[ "cpe:/a:redhat:storage:2.1:server:el6" ]
null
null
null
null
CVE-2025-23678
WordPress LocalGrid plugin <= 1.0.1 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound LocalGrid allows Reflected XSS. This issue affects LocalGrid: from n/a through 1.0.1.
[]
null
7.1
null
null
CVE-2022-21968
Microsoft SharePoint Server Security Feature Bypass Vulnerability
Microsoft SharePoint Server Security Feature Bypass Vulnerability
[ "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:-:*:*:*:subscription:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*" ]
null
4.3
null
null
PYSEC-2018-125
null
Exiv2::Image::byteSwap2 in image.cpp in Exiv2 0.26 has a heap-based buffer over-read.
[]
null
null
6.5
null
GHSA-w222-m46c-mgh6
OpenFGA Authorization Bypass
Overview OpenFGA v1.8.10 or previous (Helm chart <= openfga-0.2.28, docker <= v.1.8.10) are vulnerable to authorization bypass when certain Check and ListObject calls are executed.Am I Affected? If you are using OpenFGA v1.8.10 or previous, specifically under the following conditions, you are affected by this authorization bypass vulnerability:Calling Check API or ListObjects with an [authorization model](https://openfga.dev/docs/concepts#what-is-an-authorization-model) that has tuple cycle.[Check query cache](https://github.com/openfga/openfga/blob/9b5974458b777707ed2a30ba6303699499e655ee/.config-schema.json#L528) is enabled, andThere are multiple check / list objects requests involving the tuple cycle within the check query TTLFix Upgrade to v1.8.11. This upgrade is backwards compatible.
[]
5.8
null
null
null
CVE-2024-32292
Tenda W30E v1.0 V1.0.1.25(633) firmware contains a command injection vulnerablility in the formexeCommand function via the cmdinput parameter.
[ "cpe:2.3:o:tenda:w30e_firmware:1.0.1.25\\(633\\):*:*:*:*:*:*:*" ]
null
8.8
null
null
GHSA-x4qw-9jhm-224p
Google Chrome before 25.0.1364.152 does not properly manage the interaction between the browser process and renderer processes during authorization of the loading of a plug-in, which makes it easier for remote attackers to bypass intended access restrictions via vectors involving a blocked plug-in.
[]
null
null
null
null
CVE-2020-7616
express-mock-middleware through 0.0.6 is vulnerable to Prototype Pollution. Exported functions by the package can be tricked into adding or modifying properties of the `Object.prototype`. Exploitation of this vulnerability requires creation of a new directory where an attack code can be placed which will then be exported by `express-mock-middleware`. As such, this is considered to be a low risk.
[ "cpe:2.3:a:express-mock-middleware_project:express-mock-middleware:*:*:*:*:*:*:*:*" ]
null
5.3
null
5
GHSA-9r6g-wcvh-p5j6
The id GET parameter of one of the Video Embed WordPress plugin through 1.0's page (available via forced browsing) is not sanitised, validated or escaped before being used in a SQL statement, allowing low privilege users, such as subscribers, to perform SQL injection.
[]
null
null
null
null
CVE-2017-1000386
Jenkins Active Choices plugin version 1.5.3 and earlier allowed users with Job/Configure permission to provide arbitrary HTML to be shown on the 'Build With Parameters' page through the 'Active Choices Reactive Reference Parameter' type. This could include, for example, arbitrary JavaScript. Active Choices now sanitizes the HTML inserted on the 'Build With Parameters' page if and only if the script is executed in a sandbox. As unsandboxed scripts are subject to administrator approval, it is up to the administrator to allow or disallow problematic script output.
[ "cpe:2.3:a:jenkins:active_choices:*:*:*:*:*:jenkins:*:*", "cpe:2.3:a:jenkins:active_choices:1.5.3:-:*:*:*:*:*:*", "cpe:2.3:a:jenkins:active_choices:1.5.3:alpha:*:*:*:jenkins:*:*" ]
null
null
5.4
3.5
CVE-2021-0396
In Builtins::Generate_ArgumentsAdaptorTrampoline of builtins-arm.cc and related files, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-160610106
[ "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-v7xj-cjg7-4rfm
Cross-site scripting (XSS) vulnerability in the administration forms in the ShareThis module 7.x-2.x before 7.x-2.3 for Drupal allows remote authenticated users with administer sharethis permissions to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-jhf7-x7rx-7fc9
A CWE-125: Out-of-Bounds Read vulnerability exists in the Web Server on Modicon M340, Modicon Quantum and Modicon Premium Legacy offers and their Communication Modules (see notification for details) which could cause a segmentation fault or a buffer overflow when uploading a specially crafted file on the controller over FTP.
[]
null
null
null
null
CVE-2024-47962
Stack-based Buffer Overflow vulnerability in Delta Electronics CNCSoft-G2
Delta Electronics CNCSoft-G2 lacks proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can manipulate an insider to visit a malicious page or file to leverage this vulnerability to execute code in the context of the current process.
[ "cpe:2.3:a:delta_electronics:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:deltaww:cncsoft-g2:2.1.0.10:*:*:*:*:*:*:*" ]
8.4
null
null
null
CVE-2021-39356
Content Staging <= 2.0.1 Authenticated Stored Cross-Site Scripting
The Content Staging WordPress plugin is vulnerable to Stored Cross-Site Scripting due to insufficient input validation and escaping via several parameters that are echo'd out via the ~/templates/settings.php file which allowed attackers with administrative user access to inject arbitrary web scripts, in versions up to and including 2.0.1. This affects multi-site installations where unfiltered_html is disabled for administrators, and sites where unfiltered_html is disabled.
[ "cpe:2.3:a:content_staging_project:content_staging:*:*:*:*:*:wordpress:*:*" ]
null
5.5
null
null
CVE-2025-4725
itsourcecode Placement Management System view_drive.php sql injection
A vulnerability, which was classified as critical, was found in itsourcecode Placement Management System 1.0. This affects an unknown part of the file /view_drive.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[]
6.9
7.3
7.3
7.5
CVE-2017-16140
lab6.brit95 is a file server. lab6.brit95 is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
[ "cpe:2.3:a:lab6.brit95_project:lab6.brit95:*:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
GHSA-553q-7q4r-x6xr
Incorrect Privilege Assignment vulnerability in Holest Engineering Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light allows Privilege Escalation. This issue affects Spreadsheet Price Changer for WooCommerce and WP E-commerce – Light: from n/a through 2.4.37.
[]
null
9.8
null
null
GHSA-48hm-67xm-45vw
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RBK752 before 3.2.16.6, RBR750 before 3.2.16.6, RBS750 before 3.2.16.6, RBK852 before 3.2.16.6, RBR850 before 3.2.16.6, and RBS850 before 3.2.16.6.
[]
null
null
null
null
CVE-2012-5144
Google Chrome before 23.0.1271.97, and Libav 0.7.x before 0.7.7 and 0.8.x before 0.8.5, do not properly perform AAC decoding, which allows remote attackers to cause a denial of service (stack memory corruption) or possibly have unspecified other impact via vectors related to "an off-by-one overwrite when switching to LTP profile from MAIN."
[ "cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.8:beta2:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.7:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.8:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.9:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.38:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.40:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.41:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.59:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.60:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.61:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.62:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.64:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.83:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.84:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.85:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.86:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.87:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.88:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.89:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.91:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.92:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.93:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.94:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:23.0.1271.95:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7:beta1:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7:beta2:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:libav:libav:0.7.6:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2008-0777
The sendfile system call in FreeBSD 5.5 through 7.0 does not check the access flags of the file descriptor used for sending a file, which allows local users to read the contents of write-only files.
[ "cpe:2.3:o:freebsd:freebsd:5.5:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.2:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*" ]
null
null
null
4.9
RHSA-2025:9063
Red Hat Security Advisory: git-lfs security update
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
[ "cpe:/o:redhat:enterprise_linux:10.0" ]
null
5.4
null
null
GHSA-whqq-5qx6-vwwf
The Product Vendors is vulnerable to Reflected Cross-Site Scripting via the 'vendor_description' parameter in versions up to, and including, 2.0.35 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
4.7
null
null
CVE-2022-2228
Information exposure in GitLab EE affecting all versions from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access restrictions even if the GitLab Runner is calling from outside the allowed IP range
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*", "cpe:2.3:a:gitlab:gitlab:15.1.0:*:*:*:enterprise:*:*:*" ]
null
5.3
null
null
RHSA-2008:0522
Red Hat Security Advisory: perl security update
perl: heap corruption by regular expressions with utf8 characters
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws", "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
GHSA-5r44-g6v6-6h2w
A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected application contains an out of bounds write past the end of an allocated buffer while parsing a specially crafted WRL file. This could allow an attacker to execute code in the context of the current process.
[]
null
7.8
null
null
GHSA-mw96-qp3x-6qgr
The RAND_bytes function in libssh before 0.6.3, when forking is enabled, does not properly reset the state of the OpenSSL pseudo-random number generator (PRNG), which causes the state to be shared between children processes and allows local users to obtain sensitive information by leveraging a pid collision.
[]
null
null
null
null
CVE-2024-0468
code-projects Fighting Cock Information System new-father.php unrestricted upload
A vulnerability has been found in code-projects Fighting Cock Information System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/action/new-father.php. The manipulation of the argument image leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-250573 was assigned to this vulnerability.
[ "cpe:2.3:a:code-projects:fighting_cock_information_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-qqj2-pmc2-p5vr
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: btnxpuart: Shutdown timer and prevent rearming when driver unloadingWhen unload the btnxpuart driver, its associated timer will be deleted. If the timer happens to be modified at this moment, it leads to the kernel call this timer even after the driver unloaded, resulting in kernel panic. Use timer_shutdown_sync() instead of del_timer_sync() to prevent rearming.panic log: Internal error: Oops: 0000000086000007 [#1] PREEMPT SMP Modules linked in: algif_hash algif_skcipher af_alg moal(O) mlan(O) crct10dif_ce polyval_ce polyval_generic snd_soc_imx_card snd_soc_fsl_asoc_card snd_soc_imx_audmux mxc_jpeg_encdec v4l2_jpeg snd_soc_wm8962 snd_soc_fsl_micfil snd_soc_fsl_sai flexcan snd_soc_fsl_utils ap130x rpmsg_ctrl imx_pcm_dma can_dev rpmsg_char pwm_fan fuse [last unloaded: btnxpuart] CPU: 5 PID: 723 Comm: memtester Tainted: G O 6.6.23-lts-next-06207-g4aef2658ac28 #1 Hardware name: NXP i.MX95 19X19 board (DT) pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : 0xffff80007a2cf464 lr : call_timer_fn.isra.0+0x24/0x80 ... Call trace: 0xffff80007a2cf464 __run_timers+0x234/0x280 run_timer_softirq+0x20/0x40 __do_softirq+0x100/0x26c ____do_softirq+0x10/0x1c call_on_irq_stack+0x24/0x4c do_softirq_own_stack+0x1c/0x2c irq_exit_rcu+0xc0/0xdc el0_interrupt+0x54/0xd8 __el0_irq_handler_common+0x18/0x24 el0t_64_irq_handler+0x10/0x1c el0t_64_irq+0x190/0x194 Code: ???????? ???????? ???????? ???????? (????????) ---[ end trace 0000000000000000 ]--- Kernel panic - not syncing: Oops: Fatal exception in interrupt SMP: stopping secondary CPUs Kernel Offset: disabled CPU features: 0x0,c0000000,40028143,1000721b Memory Limit: none ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---
[]
null
5.5
null
null
CVE-2008-6078
SQL injection vulnerability in open.php in the Private Messaging (com_privmsg) component for Limbo CMS allows remote attackers to execute arbitrary SQL commands via the id parameter in a pms action to index.php.
[ "cpe:2.3:a:limbo_cms:com_privmsg:*:*:*:*:*:*:*:*", "cpe:2.3:a:limbo_cms:limbo_cms:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-20925
In setUclampMinLocked of PowerSessionManager.cpp, there is a possible way to corrupt memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-236674672References: N/A
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
7.8
null
null
ICSA-23-285-03
Siemens SICAM A8000 Devices
The web server of affected devices fails to properly sanitize user input for the /sicweb-ajax/tmproot/ endpoint. This could allow an authenticated remote attacker to traverse directories on the system and download arbitrary files. By exploring active session IDs, the vulnerability could potentially be leveraged to escalate privileges to the administrator role.
[]
null
7.5
null
null
GHSA-ggg9-6q5p-37j3
An Uncontrolled Resource Consumption vulnerability in the H.323 ALG (Application Layer Gateway) of  Juniper Networks Junos OS on SRX Series and MX Series with SPC3 and MS-MPC/MIC, allows an unauthenticated network-based attacker to send specific packets causing traffic loss leading to Denial of Service (DoS).Continued receipt and processing of these specific packets will sustain the Denial of Service condition.The memory usage can be monitored using the below command.??user@host> show usp memory segment sha data objcache jsf  This issue affects SRX Series and MX Series with SPC3 and MS-MPC/MIC:?20.4 before 20.4R3-S10,?21.2 before 21.2R3-S6,?21.3 before 21.3R3-S5,?21.4 before 21.4R3-S6,?22.1 before 22.1R3-S4,?22.2 before 22.2R3-S2,?22.3 before 22.3R3-S1,?22.4 before 22.4R3,?23.2 before 23.2R2.
[]
8.7
7.5
null
null
RHSA-2005:137
Red Hat Security Advisory: mailman security update
security flaw
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws" ]
null
null
null
null
CVE-2024-1465
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘carousel_skin’ attribute of the Posts Carousel widget in all versions up to, and including, 8.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
GHSA-wv28-7fpw-fj49
Lektor does not sanitize database path traversal
Lektor before 3.3.11 does not sanitize DB path traversal. Thus, shell commands might be executed via a file that is added to the templates directory, if the victim's web browser accesses an untrusted website that uses JavaScript to send requests to localhost port 5000, and the web browser is running on the same machine as the "lektor server" command.
[]
9.3
9.1
null
null
CVE-2022-44640
Heimdal before 7.7.1 allows remote attackers to execute arbitrary code because of an invalid free in the ASN.1 codec used by the Key Distribution Center (KDC).
[ "cpe:2.3:a:heimdal_project:heimdal:*:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
9.8
null
null
RHSA-2013:0689
Red Hat Security Advisory: bind security and bug fix update
bind: libdns regular expressions excessive resource consumption DoS
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-w74x-2gvf-2g96
Multiple cross-site scripting (XSS) vulnerabilities in Cisco WebEx Meetings Server 2.5.1.5 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCuy01843.
[]
null
null
6.1
null
GHSA-qvp7-vxrx-fx9x
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpsiteeditor Site Editor Google Map allows Reflected XSS. This issue affects Site Editor Google Map: from n/a through 1.0.1.
[]
null
7.1
null
null
CVE-2024-38183
GroupMe Elevation of Privilege Vulnerability
An improper access control vulnerability in GroupMe allows an a unauthenticated attacker to elevate privileges over a network.
[ "cpe:2.3:a:microsoft:groupme:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-v6f4-jwv9-682w
class.upload.php allows cross-site scripting attacks via uploaded files
As a simple library, class.upload.php does not perform an in-depth check on uploaded files, allowing a stored XSS vulnerability when the default configuration is used.Developers must be aware of that fact and use extension whitelisting accompanied by forcing the server to always provide content-type based on the file extension.The README has been updated to include these guidelines.
[]
null
6.5
null
null
GHSA-7wv7-r7c6-6vxj
Cross-Site Request Forgery (CSRF) vulnerability in Brice CAPOBIANCO Simple Revisions Delete.This issue affects Simple Revisions Delete: from n/a through 1.5.3.
[]
null
4.3
null
null
RHSA-2021:3298
Red Hat Security Advisory: libsndfile security update
libsndfile: Heap buffer overflow via crafted WAV file allows arbitrary code execution
[ "cpe:/a:redhat:rhel_eus:8.2::appstream", "cpe:/a:redhat:rhel_eus:8.2::crb" ]
null
8.8
null
null
GHSA-4pf5-5rrg-5jj5
The Administration GUI in the web framework in VOSS in Cisco Unified Communications Domain Manager (CDM) 9.0(.1) and earlier does not properly implement access control, which allows remote attackers to enumerate account names via a crafted URL, aka Bug IDs CSCun39631 and CSCun39643.
[]
null
null
null
null