id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-63rf-qrfc-rr7q
|
osCommerce 2.3.4.1 has an incomplete '.htaccess' for blacklist filtering in the "product" page. The .htaccess file in catalog/images/ bans the html extension, but Internet Explorer render HTML elements in a .eml file.
|
[] | null | null | 4.9 | null |
|
CVE-2013-6769
|
The CyanogenMod/ClockWorkMod/Koush Superuser package 1.0.2.1 for Android allows attackers to gain privileges via shell metacharacters in the -c option to /system/xbin/su.
|
[
"cpe:2.3:a:koushik_dutta:superuser:1.0.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2015-5283
|
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 4.7 |
|
CVE-2018-6332
|
A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 settings which can cause the server to spend disproportionate resources. This affects all supported versions of HHVM (3.24.3 and 3.21.7 and below) when using the proxygen server to handle HTTP2 requests.
|
[
"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*",
"cpe:2.3:a:facebook:hhvm:3.24.3:*:*:*:*:*:*:*"
] | null | 5.9 | 5.9 | 4.3 |
|
GHSA-5fpx-69w7-fx2q
|
The Unlimited Elements For Elementor (Free Widgets, Addons, Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘username’ parameter in all versions up to, and including, 1.5.112 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above and granted plugin setting edit permissions by an administrator, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
CVE-2024-39241
|
Cross Site Scripting (XSS) vulnerability in skycaiji 2.8 allows attackers to run arbitrary code via /admin/tool/preview.
|
[
"cpe:2.3:a:skycaiji:skycaiji:2.8:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-7r9c-232f-pq69
|
Cross-domain vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 allows user-assisted remote attackers to bypass the Same Origin Policy and conduct cross-site scripting (XSS) attacks via a crafted HTML document in a situation where the client user drags one browser window across another browser window, aka "HTML Element Cross-Domain Vulnerability."
|
[] | null | null | null | null |
|
GHSA-cf7p-r9h9-x3gj
|
The Premium Addons PRO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's widgets in all versions up to, and including, 4.10.23 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-rqjc-3v8q-4cw6
|
There is a NULL pointer dereference vulnerability in PSOutputDev::setupResources() located in PSOutputDev.cc in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdftops binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
|
[] | null | null | 7.8 | null |
|
CVE-2024-2965
|
Denial-of-Service in LangChain SitemapLoader in langchain-ai/langchain
|
A Denial-of-Service (DoS) vulnerability exists in the `SitemapLoader` class of the `langchain-ai/langchain` repository, affecting all versions. The `parse_sitemap` method, responsible for parsing sitemaps and extracting URLs, lacks a mechanism to prevent infinite recursion when a sitemap URL refers to the current sitemap itself. This oversight allows for the possibility of an infinite loop, leading to a crash by exceeding the maximum recursion depth in Python. This vulnerability can be exploited to occupy server socket/port resources and crash the Python process, impacting the availability of services relying on this functionality.
|
[
"cpe:2.3:a:langchain:langchain:*:*:*:*:*:*:*:*"
] | null | null | 4.2 | null |
RHSA-2024:1131
|
Red Hat Security Advisory: golang security update
|
golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests golang: cmd/go: Protocol Fallback when fetching modules
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2022-22169
|
Junos OS and Junos OS Evolved: OSPFv3 session might go into INIT state upon receipt of multiple crafted packets from a trusted neighbor device.
|
An Improper Initialization vulnerability in the routing protocol daemon (rpd) of Juniper Networks Junos OS and Junos OS Evolved allows an attacker who sends specific packets in certain orders and at specific timings to force OSPFv3 to unexpectedly enter graceful-restart (GR helper mode) even though there is not any Grace-LSA received in OSPFv3 causing a Denial of Service (DoS). Unexpectedly entering GR helper mode might cause the OSPFv3 neighbor adjacency formed on this interface to be stuck in the "INIT" state which can be observed by issuing the following command: user@device> show ospf3 neighbor ID Interface State xx.xx.xx.xx ae100.0 Init <<<<<<<<<< An indicator of compromise can be seen in log files when traceoptions for OSPFv3 are enabled before the issue occurs. These logfile messages are as follows: OSPF restart signaling: Received hello with LR bit set from nbr ip=xx::xx id=xx.xx.xx.xx. Set oob-resync capabilty 1. OSPF Restart Signaling: Start helper mode for nbr ip xx::xx id xx.xx.xx.xx OSPF restart signaling: abort helper mode for nbr ip=xx::xx id=xx.xx.xx.xx OSPF neighbor xx::xx (realm ipv6-unicast <interface.unit> area xx.xx.xx.xx) state changed from Full to Init due to 1WayRcvd (event reason: neighbor is in one-way mode) (nbr helped: 0) This issue affects: Juniper Networks Junos OS. 15.1 versions prior to 15.1R7-S11; 18.3 versions prior to 18.3R3-S6; 18.4 versions prior to 18.4R2-S9, 18.4R3-S10; 19.1 versions prior to 19.1R2-S3, 19.1R3-S7; 19.2 versions prior to 19.2R1-S7, 19.2R3-S4; 19.3 versions prior to 19.3R2-S7, 19.3R3-S4; 19.4 versions prior to 19.4R3-S6; 20.1 versions prior to 20.1R3-S1; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R2-S2, 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R1-S1, 21.2R2. This issue does not affect any version of Juniper Networks Junos OS 12.3. This issue affects Juniper Networks Junos OS Evolved all versions prior to 21.2R2-EVO.
|
[
"cpe:2.3:o:juniper:junos:15.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:a1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f5-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s12:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f6-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:f7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r4-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r5-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r6-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:15.1:r7-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*"
] | null | 5.9 | null | null |
CVE-2022-27862
|
WordPress VikBooking Hotel Booking Engine & PMS plugin <= 1.5.3 - Arbitrary File Upload leading to RCE
|
Arbitrary File Upload leading to RCE in E4J s.r.l. VikBooking Hotel Booking Engine & PMS plugin <= 1.5.3 on WordPress allows attackers to upload and execute dangerous file types (e.g. PHP shell) via the signature upload on the booking form.
|
[
"cpe:2.3:a:vikwp:vikbooking_hotel_booking_engine_\\&_property_management_system_plugin:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
GHSA-rgc8-28v5-r3w9
|
marshall in dhcp_packet.c in simple-dhcp-server through ec976d2 allows remote attackers to cause a denial of service by sending a malicious DHCP packet. The crash is caused by a type confusion bug that results in a large memory allocation; when this memory allocation fails the DHCP server will crash.
|
[] | null | 6.5 | null | null |
|
GHSA-m5wf-22jj-7772
|
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.
|
[] | null | 5.5 | null | null |
|
CVE-2022-21900
|
Windows Hyper-V Security Feature Bypass Vulnerability
|
Windows Hyper-V Security Feature Bypass Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server:2022:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 4.6 | null | null |
CVE-2021-41951
|
ResourceSpace before 9.6 rev 18290 is affected by a reflected Cross-Site Scripting vulnerability in plugins/wordpress_sso/pages/index.php via the wordpress_user parameter. If an attacker is able to persuade a victim to visit a crafted URL, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:montala:resourcespace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:montala:resourcespace:9.6:-:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
ICSA-12-102-01
|
Certec atvise webMI2ADS Vulnerabilities
|
The web server in Certec atvise webMI2ADS (aka webMI) before 2.0.2 allows remote attackers to cause a denial of service (application exit) via an unspecified command in an HTTP request.
|
[] | null | null | null | null |
CVE-2009-3429
|
Stack-based buffer overflow in Pirate Radio Destiny Media Player 1.61 allows remote attackers to execute arbitrary code via a long string in a .pls playlist file.
|
[
"cpe:2.3:a:pirateradio:destiny_media_player:1.61:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
cisco-sa-asafdt-webvpn-dos-KSqJAKPA
|
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Web Services Denial of Service Vulnerabilities
|
Multiple vulnerabilities in the web services interface of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition.
These vulnerabilities are due to improper input validation when parsing HTTPS requests. An attacker could exploit these vulnerabilities by sending a malicious HTTPS request to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see Cisco Event Response: October 2021 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773"].
|
[] | null | 8.6 | null | null |
GHSA-6wrh-mf6h-4775
|
Authenticated (contributor of higher user role) Stored Cross-Site Scripting (XSS) vulnerability discovered in WordPress Price Table plugin (versions <= 0.2.2).
|
[] | null | 5.4 | null | null |
|
CVE-2022-38107
|
Sensitive Data Disclosure Vulnerability
|
Sensitive information could be displayed when a detailed technical error message is posted. This information could disclose environmental details.
|
[
"cpe:2.3:a:solarwinds:sql_sentry:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
CVE-2016-5426
|
PowerDNS (aka pdns) Authoritative Server before 3.4.10 allows remote attackers to cause a denial of service (backend CPU consumption) via a long qname.
|
[
"cpe:2.3:a:powerdns:authoritative:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2009-0329
|
SQL injection vulnerability in the PcCookBook (com_pccookbook) component for Joomla! allows remote attackers to execute arbitrary SQL commands via the recipe_id parameter in a viewrecipe action to index.php, a different vector than CVE-2008-0844.
|
[
"cpe:2.3:a:joomla:com_pccookbook:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-3hqh-8h99-q2cf
|
A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition.
|
[] | null | 3.9 | null | null |
|
CVE-2018-12503
|
tinyexr 0.9.5 has a heap-based buffer over-read in LoadEXRImageFromMemory in tinyexr.h.
|
[
"cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2018-5371
|
diag_ping.cmd on D-Link DSL-2640U devices with firmware IM_1.00 and ME_1.00, and DSL-2540U devices with firmware ME_1.00, allows authenticated remote attackers to execute arbitrary OS commands via shell metacharacters in the ipaddr field of an HTTP GET request.
|
[
"cpe:2.3:o:d-link:dsl-2540u_firmware:me_1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-2540u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dsl-2640u_firmware:im_1.00:*:*:*:*:*:*:*",
"cpe:2.3:o:d-link:dsl-2640u_firmware:me_1.00:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dsl-2640u:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 |
|
CVE-2001-0344
|
An SQL query method in Microsoft SQL Server 2000 Gold and 7.0 using Mixed Mode allows local database users to gain privileges by reusing a cached connection of the sa administrator account.
|
[
"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sql_server:2000:gold:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-8hcc-343g-84qq
|
STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .epub file, related to "Data from Faulting Address controls Branch Selection starting at STDUEPubFile!DllUnregisterServer+0x0000000000010332."
|
[] | null | null | 7.8 | null |
|
PYSEC-2016-20
| null |
The identity service in OpenStack Identity (Keystone) before 2015.1.3 (Kilo) and 8.0.x before 8.0.2 (Liberty) and keystonemiddleware (formerly python-keystoneclient) before 1.5.4 (Kilo) and Liberty before 2.3.3 does not properly invalidate authorization tokens when using the PKI or PKIZ token providers, which allows remote authenticated users to bypass intended access restrictions and gain access to cloud resources by manipulating byte fields within a revoked token.
|
[] | null | null | null | null |
CVE-2024-12594
|
ALL In One Custom Login Page <= 7.1.1 - Missing Authorization to Authenticated (Subscriber+)Privilege Escalation
|
The Custom Login Page Styler – Login Protected Private Site , Change wp-admin login url , WordPress login logo , Temporary admin login access , Rename login , Login customizer, Hide wp-login – Limit Login Attempts – Locked Site plugin for WordPress is vulnerable to privilege escalation due to a missing capability check on the 'lps_generate_temp_access_url' AJAX action in all versions up to, and including, 7.1.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to login as other users such as subscribers.
|
[] | null | 8.8 | null | null |
CVE-2019-1565
|
The PAN-OS external dynamics lists in PAN-OS 7.1.21 and earlier, PAN-OS 8.0.14 and earlier, and PAN-OS 8.1.5 and earlier, may allow an attacker that is authenticated in Next Generation Firewall with write privileges to External Dynamic List configuration to inject arbitrary JavaScript or HTML.
|
[
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
RHSA-2024:5433
|
Red Hat Security Advisory: OpenShift Container Platform 4.14.35 security update
|
opentelemetry: DoS vulnerability in otelhttp golang: net/http: golang: mime/multipart: golang: net/textproto: memory exhaustion in Request.ParseMultipartForm opentelemetry-go-contrib: DoS vulnerability in otelgrpc due to unbound cardinality metrics ssh: Prefix truncation attack on Binary Packet Protocol (BPP) go-retryablehttp: url might write sensitive information to log file golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses kernel: net: kernel: UAF in network route management
|
[
"cpe:/a:redhat:openshift:4.14::el8",
"cpe:/a:redhat:openshift:4.14::el9"
] | null | 7.8 | null | null |
GHSA-x7w7-f2hw-89jv
|
Buffer overflow in Crystal FTP Client 2.8 allows remote malicious servers to execute arbitrary code via a response to a LIST command that contains a file name with a long extension.
|
[] | null | null | null | null |
|
GHSA-wvv3-wwf7-9f6m
|
Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060824, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL on a website that uses HTTP 1.1 compression.
|
[] | null | null | null | null |
|
CVE-2010-4912
|
SQL injection vulnerability in shop.php in UCenter Home 2.0 allows remote attackers to execute arbitrary SQL commands via the shopid parameter in a view action.
|
[
"cpe:2.3:a:discuz:ucenter_home:2.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2022-36861
|
Custom permission misuse vulnerability in SystemUI prior to SMR Sep-2022 Release 1 allows attacker to use some protected functions with SystemUI privilege.
|
[
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
] | null | 5.9 | null | null |
|
CVE-2010-1003
|
Directory traversal vulnerability in www/editor/tiny_mce/langs/language.php in eFront 3.5.x through 3.5.5 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the langname parameter.
|
[
"cpe:2.3:a:efrontlearning:efront:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:efrontlearning:efront:3.5.5:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-fgmp-qcpg-37v3
|
Adobe Reader (Adobe Acrobat Reader) 7.0 through 7.0.8 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a long argument string to the (1) src, (2) setPageMode, (3) setLayoutMode, and (4) setNamedDest methods in an AcroPDF ActiveX control, a different set of vectors than CVE-2006-6027.
|
[] | null | null | null | null |
|
ICSA-16-236-01A
|
Moxa OnCell Vulnerabilities (Update A)
|
Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 do not properly restrict authentication attempts, which makes it easier for remote attackers to obtain access via a brute-force attack. Moxa OnCell G3100V2 devices before 2.8 and G3111, G3151, G3211, and G3251 devices before 1.7 use cleartext password storage, which makes it easier for local users to obtain sensitive information by reading a configuration file. Moxa G3100V2 Series, editions prior to Version 2.8, and OnCell G3111/G3151/G3211/G3251 Series, editions prior to Version 1.7 allows a reflected cross-site scripting attack which may allow an attacker to execute arbitrary script code in the user’s browser within the trust relationship between their browser and the server.
|
[] | null | null | 6.5 | null |
CVE-2014-3144
|
The (1) BPF_S_ANC_NLATTR and (2) BPF_S_ANC_NLATTR_NEST extension implementations in the sk_run_filter function in net/core/filter.c in the Linux kernel through 3.14.3 do not check whether a certain length value is sufficiently large, which allows local users to cause a denial of service (integer underflow and system crash) via crafted BPF instructions. NOTE: the affected code was moved to the __skb_get_nlattr and __skb_get_nlattr_nest functions before the vulnerability was announced.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:-:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2024-9768
|
Formidable Forms < 6.14.1 - Admin+ Stored XSS
|
The Formidable Forms WordPress plugin before 6.14.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[
"cpe:2.3:a:strategy11:formidable_forms:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:strategy11:formidable_forms:*:*:*:*:free:wordpress:*:*"
] | null | 4.8 | null | null |
GHSA-c28j-5qxx-jmfp
|
In cPanel before 82.0.18, Cpanel::Rand::Get can produce a predictable series of numbers (SEC-525).
|
[] | null | null | null | null |
|
GHSA-3h9q-2vfr-m8cp
|
BluePage CMS thru 3.9 processes an insufficiently sanitized HTTP Header Cookie value allowing MySQL Injection in the 'users-cookie-settings' token using a Time-based blind SLEEP payload.
|
[] | null | 9.8 | null | null |
|
CVE-2024-9225
|
SEOPress – On-site SEO <= 8.1.1 - Reflected Cross-Site Scripting
|
The SEOPress – On-site SEO plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg & remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 8.1.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:seopress:seopress:-:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null |
CVE-2007-3769
|
Cross-site scripting (XSS) vulnerability in the mirrored server management interface in SurgeFTP 2.3a1 allows user-assisted, remote FTP servers to inject arbitrary web script or HTML via a malformed response without a status code, which is reflected to the user in the resulting error message. NOTE: this can be leveraged for root access via a sequence of steps involving web script that creates a new FTP user account.
|
[
"cpe:2.3:a:netwin:surgeftp:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
GHSA-9hr9-wg7q-ffxj
|
Mailman 2.1.4 through 2.1.6 allows remote attackers to cause a denial of service via a message that causes the server to "fail with an Overflow on bad date data in a processed message," a different vulnerability than CVE-2005-3573.
|
[] | null | null | null | null |
|
CVE-2017-15695
|
When an Apache Geode server versions 1.0.0 to 1.4.0 is configured with a security manager, a user with DATA:WRITE privileges is allowed to deploy code by invoking an internal Geode function. This allows remote code execution. Code deployment should be restricted to users with DATA:MANAGE privilege.
|
[
"cpe:2.3:a:apache:geode:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.5 |
|
CVE-2021-35581
|
Vulnerability in the Oracle Applications Manager product of Oracle E-Business Suite (component: View Reports). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Manager. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Applications Manager, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Applications Manager accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
|
[
"cpe:2.3:a:oracle:applications_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:applications_manager:12.1.3:*:*:*:*:*:*:*"
] | null | 4.7 | null | null |
|
CVE-2024-26805
|
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
|
In the Linux kernel, the following vulnerability has been resolved:
netlink: Fix kernel-infoleak-after-free in __skb_datagram_iter
syzbot reported the following uninit-value access issue [1]:
netlink_to_full_skb() creates a new `skb` and puts the `skb->data`
passed as a 1st arg of netlink_to_full_skb() onto new `skb`. The data
size is specified as `len` and passed to skb_put_data(). This `len`
is based on `skb->end` that is not data offset but buffer offset. The
`skb->end` contains data and tailroom. Since the tailroom is not
initialized when the new `skb` created, KMSAN detects uninitialized
memory area when copying the data.
This patch resolved this issue by correct the len from `skb->end` to
`skb->len`, which is the actual data offset.
BUG: KMSAN: kernel-infoleak-after-free in instrument_copy_to_user include/linux/instrumented.h:114 [inline]
BUG: KMSAN: kernel-infoleak-after-free in copy_to_user_iter lib/iov_iter.c:24 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_ubuf include/linux/iov_iter.h:29 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
BUG: KMSAN: kernel-infoleak-after-free in iterate_and_advance include/linux/iov_iter.h:271 [inline]
BUG: KMSAN: kernel-infoleak-after-free in _copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
instrument_copy_to_user include/linux/instrumented.h:114 [inline]
copy_to_user_iter lib/iov_iter.c:24 [inline]
iterate_ubuf include/linux/iov_iter.h:29 [inline]
iterate_and_advance2 include/linux/iov_iter.h:245 [inline]
iterate_and_advance include/linux/iov_iter.h:271 [inline]
_copy_to_iter+0x364/0x2520 lib/iov_iter.c:186
copy_to_iter include/linux/uio.h:197 [inline]
simple_copy_to_iter+0x68/0xa0 net/core/datagram.c:532
__skb_datagram_iter+0x123/0xdc0 net/core/datagram.c:420
skb_copy_datagram_iter+0x5c/0x200 net/core/datagram.c:546
skb_copy_datagram_msg include/linux/skbuff.h:3960 [inline]
packet_recvmsg+0xd9c/0x2000 net/packet/af_packet.c:3482
sock_recvmsg_nosec net/socket.c:1044 [inline]
sock_recvmsg net/socket.c:1066 [inline]
sock_read_iter+0x467/0x580 net/socket.c:1136
call_read_iter include/linux/fs.h:2014 [inline]
new_sync_read fs/read_write.c:389 [inline]
vfs_read+0x8f6/0xe00 fs/read_write.c:470
ksys_read+0x20f/0x4c0 fs/read_write.c:613
__do_sys_read fs/read_write.c:623 [inline]
__se_sys_read fs/read_write.c:621 [inline]
__x64_sys_read+0x93/0xd0 fs/read_write.c:621
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was stored to memory at:
skb_put_data include/linux/skbuff.h:2622 [inline]
netlink_to_full_skb net/netlink/af_netlink.c:181 [inline]
__netlink_deliver_tap_skb net/netlink/af_netlink.c:298 [inline]
__netlink_deliver_tap+0x5be/0xc90 net/netlink/af_netlink.c:325
netlink_deliver_tap net/netlink/af_netlink.c:338 [inline]
netlink_deliver_tap_kernel net/netlink/af_netlink.c:347 [inline]
netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]
netlink_unicast+0x10f1/0x1250 net/netlink/af_netlink.c:1368
netlink_sendmsg+0x1238/0x13d0 net/netlink/af_netlink.c:1910
sock_sendmsg_nosec net/socket.c:730 [inline]
__sock_sendmsg net/socket.c:745 [inline]
____sys_sendmsg+0x9c2/0xd60 net/socket.c:2584
___sys_sendmsg+0x28d/0x3c0 net/socket.c:2638
__sys_sendmsg net/socket.c:2667 [inline]
__do_sys_sendmsg net/socket.c:2676 [inline]
__se_sys_sendmsg net/socket.c:2674 [inline]
__x64_sys_sendmsg+0x307/0x490 net/socket.c:2674
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0x44/0x110 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x63/0x6b
Uninit was created at:
free_pages_prepare mm/page_alloc.c:1087 [inline]
free_unref_page_prepare+0xb0/0xa40 mm/page_alloc.c:2347
free_unref_page_list+0xeb/0x1100 mm/page_alloc.c:2533
release_pages+0x23d3/0x2410 mm/swap.c:1042
free_pages_and_swap_cache+0xd9/0xf0 mm/swap_state.c:316
tlb_batch_pages
---truncated---
|
[] | null | 5.5 | null | null |
CVE-2018-11798
|
The Apache Thrift Node.js static web server in versions 0.9.2 through 0.11.0 have been determined to contain a security vulnerability in which a remote user has the ability to access files outside the set webservers docroot path.
|
[
"cpe:2.3:a:apache:thrift:*:*:*:*:*:node.js:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2014-6755
|
The SDN Forum (TapaTalk) (aka com.tapatalk.forumshiftdeletenet) application 3.6.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:shiftdelete:sdn_forum:3.6.5:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-c7jr-pf92-3rq5
|
In Accounts, there is a possible way to write sensitive information to the system log due to insufficient log filtering. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-205130113
|
[] | null | 5.5 | null | null |
|
CVE-2020-3360
|
Cisco IP Phones Series 7800 and Series 8800 Call Log Information Disclosure Vulnerability
|
A vulnerability in the Web Access feature of Cisco IP Phones Series 7800 and Series 8800 could allow an unauthenticated, remote attacker to view sensitive information on an affected device. The vulnerability is due to improper access controls on the web-based management interface of an affected device. An attacker could exploit this vulnerability by sending malicious requests to the device, which could allow the attacker to bypass access restrictions. A successful attack could allow the attacker to view sensitive information, including device call logs that contain names, usernames, and phone numbers of users of the device.
|
[
"cpe:2.3:o:cisco:unified_ip_phone_6901_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_6901:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_6961_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_6961:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_6945_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_6945:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_6941_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_6941:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_6921_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_6921:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_6911_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_6911:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7832_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7861_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7861:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7841_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7841:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7821_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7821:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7937g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7937g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7975g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7975g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7965g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7965g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7962g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7962g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7961g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7961g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7960g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7960g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7945g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7945g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7942g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7942g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7941g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7941g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7940g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7940g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7931g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7931g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7911g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7911g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_7906g_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7906g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8811_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8811:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8841_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8841:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8845_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8851_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8851nr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8851nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8861_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8861:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8865_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8865:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8865nr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8865nr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8961_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8961:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8945_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8945:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_8941_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_8941:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_9971_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_9971:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:unified_ip_phone_9951_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_9951:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
GHSA-g86v-62m4-2jpm
|
Opera before 9.26 allows remote attackers to "bypass sanitization filters" and conduct cross-site scripting (XSS) attacks via crafted attribute values in an XML document, which are not properly handled during DOM presentation.
|
[] | null | null | null | null |
|
CVE-2024-21547
|
Versions of the package spatie/browsershot before 5.0.2 are vulnerable to Directory Traversal due to URI normalisation in the browser where the file:// check can be bypassed with file:\\. An attacker could read any file on the server by exploiting the normalization of \ into /.
|
[] | 8.7 | 7.5 | null | null |
|
GHSA-c9p4-gcvv-wv36
|
H3C H200 H200V100R004 was discovered to contain a stack overflow via the function UpdateIpv6Params.
|
[] | null | 9.8 | null | null |
|
RHSA-2025:0080
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack firefox: thunderbird: Use-after-free when breaking lines in text firefox: Alt-Svc ALPN validation failure when redirected firefox: Compartment mismatch when parsing JavaScript JSON module firefox: Memory corruption when using JavaScript Text Segmentation firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 firefox: thunderbird: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2001-0383
|
banners.php in PHP-Nuke 4.4 and earlier allows remote attackers to modify banner ad URLs by directly calling the Change operation, which does not require authentication.
|
[
"cpe:2.3:a:francisco_burzi:php-nuke:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-1470
|
Windows Work Folders Service Elevation of Privilege Vulnerability
|
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory.
To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges.
The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
GHSA-wrwg-x39f-9cmf
|
Cross-site Scripting (XSS) vulnerability in the main dashboard of Ellipse APM versions allows an authenticated user or integrated application to inject malicious data into the application that can then be executed in a victim’s browser. This issue affects: Hitachi ABB Power Grids Ellipse APM 5.3 version 5.3.0.1 and prior versions; 5.2 version 5.2.0.3 and prior versions; 5.1 version 5.1.0.6 and prior versions.
|
[] | null | null | null | null |
|
CVE-2022-1746
|
2.2.8 INCORRECT PRIVILEGE ASSIGNMENT CWE-266
|
The authentication mechanism used by poll workers to administer voting using the tested version of Dominion Voting Systems ImageCast X can expose cryptographic secrets used to protect election information. An attacker could leverage this vulnerability to gain access to sensitive information and perform privileged actions, potentially affecting other election equipment.
|
[
"cpe:2.3:o:dominionvoting:imagecast_x:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dominionvoting:democracy_suite:5.5-a:*:*:*:*:*:*:*",
"cpe:2.3:a:dominionvoting:imagecast_x:5.5.10.30:*:*:*:*:*:*:*",
"cpe:2.3:a:dominionvoting:imagecast_x:5.5.10.32:*:*:*:*:*:*:*"
] | null | 7.6 | null | 7.2 |
CVE-2014-3590
|
Versions of Foreman as shipped with Red Hat Satellite 6 does not check for a correct CSRF token in the logout action. Therefore, an attacker can log out a user by having them view specially crafted content.
|
[
"cpe:2.3:a:redhat:satellite:6.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
GHSA-xw92-6mmh-8cmv
|
The PrePost SEO WordPress plugin through 3.0 does not properly sanitize some of its settings, which could allow high-privilege users to perform Stored Cross-Site Scripting (XSS) attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8 | null | null |
|
GHSA-h828-v5pv-33qx
|
coreDNS vulnerable to Improper Restriction of Communication Channel to Intended Endpoints
|
A flaw was found in coreDNS. This flaw allows a malicious user to redirect traffic intended for external top-level domains (TLD) to a pod they control by creating projects and namespaces that match the TLD.
|
[] | null | 6.1 | null | null |
GHSA-976q-qhh2-p88c
|
Improper Access Control in GitHub repository calcom/cal.com prior to 2.7.
|
[] | null | 8.8 | null | null |
|
GHSA-fg2m-gv83-m3q7
|
Multiple cross-site scripting (XSS) vulnerabilities in Subrion CMS before 2.2.3 allow remote attackers to inject arbitrary web script or HTML via the id parameter to (1) admin/accounts/, (2) admin/manage/, or (3) admin/manage/blocks/edit/; or (4) group parameter to admin/configuration/. NOTE: The f[accounts][fullname] and f[accounts][username] vectors are covered in CVE-2012-5452.
|
[] | null | null | null | null |
|
GHSA-vvqm-mmw4-qwg5
|
Mbed TLS before 2.28.10 and 3.x before 3.6.3, in some cases of failed memory allocation or hardware errors, uses uninitialized stack memory to compose the TLS Finished message, potentially leading to authentication bypasses such as replays.
|
[] | null | 5.4 | null | null |
|
GHSA-7cg3-666j-3r3x
|
Certain NETGEAR devices are affected by denial of service. This affects GS110EMX before 1.0.0.9, GS810EMX before 1.0.0.5, XS512EM before 1.0.0.6, and XS724EM before 1.0.0.6.
|
[] | null | null | null | null |
|
GHSA-fg8c-jv8r-wrhx
|
Tieba-Cloud-Sign v4.9 was discovered to contain a cross-site scripting (XSS) vulnerability via the function strip_tags.
|
[] | null | 4.8 | null | null |
|
GHSA-47jj-hvhp-vqqx
|
Unspecified vulnerability in the SQLJ component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4298, CVE-2014-4300, CVE-2014-6452, CVE-2014-6454, and CVE-2014-6542.
|
[] | null | null | null | null |
|
GHSA-gw46-hc5v-7grj
|
Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.
|
[] | null | null | null | null |
|
CVE-2013-6320
|
Cross-site scripting (XSS) vulnerability in IBM Algo One, as used in MetaData Management Tools in UDS 4.7.0 through 5.0.0, ACSWeb in Algo Security Access Control Management 4.7.0 through 4.9.0, and ACSWeb in AlgoWebApps 5.0.0, allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2013-6299, CVE-2013-6300, CVE-2013-6301, and CVE-2013-6333.
|
[
"cpe:2.3:a:ibm:algo_one:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:algo_one:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:algo_one:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:algo_one:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:algo_one:4.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:algo_one:5.0.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-fcjv-8xx2-87f8
|
Multiple D-Link devices including the DIR-850L firmware versions 1.14B07 and 2.07.B05 contain a stack-based buffer overflow vulnerability in the web administration interface HNAP service.
|
[] | null | null | 8.8 | null |
|
CVE-2024-1396
|
The Shortcodes and extra features for Phlox theme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘title_tag’ parameter in all versions up to, and including, 2.15.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4 | null | null |
|
GHSA-qv7j-w8h6-h293
|
REDCap before 4.14.0 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the logic of a custom rule.
|
[] | null | null | null | null |
|
CVE-2024-41630
|
Stack-based buffer overflow vulnerability in Tenda AC18 V15.03.3.10_EN allows a remote attacker to execute arbitrary code via the ssid parameter at ip/goform/fast_setting_wifi_set.
|
[
"cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*"
] | null | 7.6 | null | null |
|
CVE-2019-2967
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.17 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4 |
|
GHSA-j5m4-vxw8-hqhc
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in programphases Insert HTML Here allows Reflected XSS. This issue affects Insert HTML Here: from n/a through 1.0.
|
[] | null | 7.1 | null | null |
|
GHSA-v832-7hv6-458x
|
Microsoft OLE DB Driver for SQL Server Remote Code Execution Vulnerability
|
[] | null | 7.5 | null | null |
|
GHSA-632j-4r76-qfq7
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37969.
|
[] | null | 7.8 | null | null |
|
GHSA-p8h7-r4qf-mgv5
|
HP ProCurve Switch 4000M C.07.23 allows remote attackers to cause a denial of service (crash) via an SNMP write request containing 85 characters, possibly triggering a buffer overflow.
|
[] | null | null | null | null |
|
CVE-2015-0074
|
Adobe Font Driver in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly allocate memory, which allows remote attackers to cause a denial of service via a crafted (1) web site or (2) file, aka "Adobe Font Driver Denial of Service Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2020:0085
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 8.8 | 8.8 | null |
GHSA-jc3x-vm97-3mq2
|
In coders/bmp.c in ImageMagick before 7.0.8-16, an input file can result in an infinite loop and hang, with high CPU and memory consumption. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted file.
|
[] | null | 6.5 | null | null |
|
CVE-2021-20613
|
Improper initialization vulnerability in MELSEC-F series FX3U-ENET Firmware version 1.16 and prior, FX3U-ENET-L Firmware version 1.16 and prior and FX3U-ENET-P502 Firmware version 1.16 and prior allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition in communication function of the product by sending specially crafted packets. Control by MELSEC-F series PLC is not affected by this vulnerability, but system reset is required for recovery.
|
[
"cpe:2.3:o:mitsubishielectric:fx3u-enet_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-enet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-enet-l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-enet-l:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitsubishielectric:fx3u-enet-p502_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:mitsubishielectric:fx3u-enet-p502:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 |
|
CVE-2024-6875
|
Infinispan: infinispan: rest compare api has buffer leak
|
A vulnerability was found in the Infinispan component in Red Hat Data Grid. The REST compare API may have a buffer leak and an out of memory error can occur when sending continual requests with large POST data to the REST API.
|
[
"cpe:/a:redhat:jboss_data_grid:8",
"cpe:/a:redhat:jboss_data_grid:7"
] | null | 6.5 | null | null |
CVE-2023-42981
|
Processing a file may lead to a denial-of-service or potentially disclose memory contents. This issue is fixed in macOS 14. The issue was addressed with improved checks.
|
[] | null | 5.4 | null | null |
|
GHSA-95mj-c6wx-v37q
|
Cross-Site Request Forgery (CSRF) vulnerability in The Events Calendar Event Tickets allows Cross Site Request Forgery.This issue affects Event Tickets: from n/a through 5.11.0.4.
|
[] | null | 4.3 | null | null |
|
CVE-2014-1469
|
BlackBerry Enterprise Server 5.x before 5.0.4 MR7 and Enterprise Service 10.x before 10.2.2 log cleartext credentials during exception handling, which allows local users to obtain sensitive information by reading the exception log file.
|
[
"cpe:2.3:a:blackberry:blackberry_enterprise_service:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:blackberry:blackberry_enterprise_service:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:blackberry:blackberry_enterprise_service:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:blackberry:blackberry_enterprise_service:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:blackberry:blackberry_enterprise_service:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:blackberry:enterprise_server:*:mr6:*:*:*:exchange_server:*:*",
"cpe:2.3:a:blackberry:enterprise_server:*:mr6:*:*:*:groupwise:*:*",
"cpe:2.3:a:blackberry:enterprise_server:*:mr6:*:*:*:lotus_domino:*:*",
"cpe:2.3:a:blackberry:enterprise_server_express:5.0.4:*:*:*:*:exchange_server:*:*",
"cpe:2.3:a:blackberry:enterprise_server_express:5.0.4:*:*:*:*:lotus_domino:*:*"
] | null | null | null | 4.9 |
|
GHSA-hq96-75hc-q3ww
|
In Live Networks, Inc., liblivemedia version 20200625, there is a potential buffer overflow bug in the server handling of a RTSP "PLAY" command, when the command specifies seeking by absolute time.
|
[] | null | null | null | null |
|
GHSA-v525-j46w-8q9c
|
A vulnerability classified as critical was found in fhs-opensource iparking 1.5.22.RELEASE. This vulnerability affects the function getData of the file src/main/java/com/xhb/pay/action/PayTempOrderAction.java. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249868.
|
[] | null | 6.3 | null | null |
|
CVE-2017-6274
|
An elevation of Privilege vulnerability exists in the Thermal Driver, where a missing bounds checks in the thermal throttle driver can cause an out-of-bounds write in the kernel. This issue is rated as moderate. Product: Pixel. Version: N/A. Android ID: A-34705801. References: N-CVE-2017-6274.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 7.5 |
|
CVE-2024-9496
|
Uncontrolled search path can lead to DLL hijacking in USBXpress Dev Kit installer
|
DLL hijacking vulnerabilities, caused by an uncontrolled search path in the USBXpress Dev Kit
installer can lead to privilege escalation and arbitrary code execution when running the impacted installer.
|
[] | null | 8.6 | null | null |
CVE-2023-42705
|
In imsservice, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2017-9959
|
A vulnerability exists in Schneider Electric's U.motion Builder software versions 1.2.1 and prior in which the system accepts reboot in session from unauthenticated users, supporting a denial of service condition.
|
[
"cpe:2.3:a:schneider-electric:u.motion_builder:*:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.9 |
|
GHSA-3p27-5462-4944
|
The safe-editor plugin before 1.2 for WordPress has no se_save authentication, with resultant XSS.
|
[] | null | 6.1 | null | null |
|
GHSA-9722-wh8j-2f5p
|
Dell PowerProtect DD versions prior to 8.3.0.0, 7.10.1.50, and 7.13.1.20 contain an improper access control vulnerability. A local malicious user with low privileges could potentially exploit this vulnerability leading to escalation of privilege.
|
[] | null | 7.8 | null | null |
|
CVE-2006-0085
|
SQL injection vulnerability in Nkads 1.0 alfa 3 allows remote attackers to execute arbitrary SQL commands via the (1) usuario_nkads_admin or (2) password_nkads_admin parameters.
|
[
"cpe:2.3:a:nkads:nkads:1.0alfa2:*:*:*:*:*:*:*",
"cpe:2.3:a:nkads:nkads:1.0alfa3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-30200
|
WordPress BEAR plugin <= 1.1.4.2 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in realmag777 BEAR allows Reflected XSS.This issue affects BEAR: from n/a through 1.1.4.2.
|
[] | null | 7.1 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.