id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-v687-g54p-gvwj | An exploitable denial-of-service vulnerability exists in the resource allocation handling of Videolabs libmicrodns 0.1.0. When encountering errors while parsing mDNS messages, some allocated data is not freed, possibly leading to a denial-of-service condition via resource exhaustion. An attacker can send one mDNS message repeatedly to trigger this vulnerability through the function rr_read_RR [5] reads the current resource record, except for the RDATA section. This is read by the loop at in rr_read. For each RR type, a different function is called. When the RR type is 0x10, the function rr_read_TXT is called at [6]. | [] |
|
CVE-2023-39909 | Ericsson Network Manager before 23.2 mishandles Access Control and thus unauthenticated low-privilege users can access the NCM application. | [
"cpe:2.3:a:ericsson:network_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-x286-c2gq-hhf2 | Moxa Service in Moxa NPort 5150A firmware version 1.5 and earlier allows attackers to obtain sensitive configuration values via a crafted packet to UDP port 4800. NOTE: Moxa Service is an unauthenticated service that runs upon a first-time installation but can be disabled without ill effect. | [] |
|
CVE-2019-19908 | phpMyChat-Plus 1.98 is vulnerable to reflected XSS via JavaScript injection into the password reset URL. In the URL, the pmc_username parameter to pass_reset.php is vulnerable. | [
"cpe:2.3:a:ciprianmp:phpmychat-plus:1.98:*:*:*:*:*:*:*"
] |
|
GHSA-fqw7-839j-hvxj | PHP Censor uses a weak hashing algorithm for the remember me key | php-censor v2.1.4 and fixed in v.2.1.5 was discovered to utilize a weak hashing algorithm for its remember_key value. This allows attackers to bruteforce to bruteforce the remember_key value to gain access to accounts that have checked "remember me" when logging in. | [] |
GHSA-67h4-vqr7-hv87 | SafeNet Authentication Service TokenValidator Proxy Agent uses a weak ACL for unspecified installation directories and executable modules, which allows local users to gain privileges by modifying an executable module. | [] |
|
CVE-2020-6417 | Inappropriate implementation in installer in Google Chrome prior to 80.0.3987.87 allowed a local attacker to execute arbitrary code via a crafted registry entry. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-47029 | In TrustySharedMemoryManager::GetSharedMemory of ondevice/trusty/trusty_shared_memory_manager.cc, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:h:google:pixel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2021-21137 | Inappropriate implementation in DevTools in Google Chrome prior to 88.0.4324.96 allowed a remote attacker to obtain potentially sensitive information from disk via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:*:*:*:*:*:*:*:*"
] |
|
GHSA-rmrm-75hp-phr2 | Improper Input Validation in Hibernate Validator | A flaw was found in Hibernate Validator version 6.1.2.Final. A bug in the message interpolation processor enables invalid EL expressions to be evaluated as if they were valid. This flaw allows attackers to bypass input sanitation (escaping, stripping) controls that developers may have put in place when handling user-controlled data in error messages. | [] |
CVE-2004-0288 | Buffer overflow in the UdmDocToTextBuf function in mnoGoSearch 3.2.13 through 3.2.15 could allow remote attackers to execute arbitrary code by indexing a large document. | [
"cpe:2.3:a:mnogosearch:mnogosearch:3.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mnogosearch:mnogosearch:3.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mnogosearch:mnogosearch:3.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mnogosearch:mnogosearch:3.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mnogosearch:mnogosearch:3.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mnogosearch:mnogosearch:3.2.15:*:*:*:*:*:*:*"
] |
|
GHSA-j6q9-mxc7-3j47 | A memory corruption issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, macOS Catalina 10.15.5, tvOS 13.4.5, watchOS 6.2.5. A remote attacker may be able to cause arbitrary code execution. | [] |
|
CVE-2019-19390 | The Search parameter of the Software Catalogue section of Matrix42 Workspace Management 9.1.2.2765 and below accepts unfiltered parameters that lead to multiple reflected XSS issues. | [
"cpe:2.3:a:matrix42:workspace_management:*:*:*:*:*:*:*:*"
] |
|
GHSA-x384-w54q-v324 | rkt through version 1.30.0 does not isolate processes in containers that are run with `rkt enter`. Processes run with `rkt enter` do not have seccomp filtering during stage 2 (the actual environment in which the applications run). Compromised containers could exploit this flaw to access host resources. | [] |
|
GHSA-hjc3-4rh8-3fpv | TRACE method is enabled in SAP Business One Service Layer . Attacker can use XST (Cross Site Tracing) attack if frontend applications that are using Service Layer has a XSS vulnerability. This has been fixed in SAP Business One Service Layer (B1_ON_HANA, versions 9.2, 9.3). | [] |
|
CVE-2020-26950 | In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-36256 | A SQL injection vulnerability in Stocks.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as "productcode". | [
"cpe:2.3:a:inventorymanagementsystem_project:inventorymanagementsystem:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2008-1165 | Multiple cross-site scripting (XSS) vulnerabilities in Flyspray 0.9.9 through 0.9.9.4 allow remote attackers to inject arbitrary web script or HTML via (1) a forced SQL error message or (2) old_value and new_value database fields in task summaries, related to the item_summary parameter in a details action in index.php. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:flyspray:flyspray:0.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:flyspray:flyspray:0.9.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:flyspray:flyspray:0.9.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:flyspray:flyspray:0.9.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:flyspray:flyspray:0.9.9.4:*:*:*:*:*:*:*"
] |
|
GHSA-6wwx-mc3p-m6jg | An arbitrary file deletion vulnerability in the Damage Cleanup Engine component of Trend Micro Apex One and Trend Micro Apex One as a Service could allow a local attacker to escalate privileges and delete files on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [] |
|
CVE-2017-8235 | In all Android releases from CAF using the Linux kernel, a memory structure in a camera driver is not properly protected. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] |
|
GHSA-wq9x-6xw4-w5w7 | Cross-Site Request Forgery (CSRF) vulnerability in Cincopa Post Video Players.This issue affects Post Video Players: from n/a through 1.159. | [] |
|
CVE-2006-4901 | Computer Associates (CA) eTrust Security Command Center 1.0 and r8 up to SP1 CR2, and eTrust Audit 1.5 and r8, allows remote attackers to spoof alerts and conduct replay attacks by invoking eTSAPISend.exe with the desired arguments. | [
"cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_client:1.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_client:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_datatools:1.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_datatools:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp2:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_policy_manager:1.5:sp3:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_audit_policy_manager:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_security_command_center:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_security_command_center:8:*:*:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr1:*:*:*:*:*",
"cpe:2.3:a:broadcom:etrust_security_command_center:8:sp1:cr2:*:*:*:*:*"
] |
|
CVE-2025-32148 | WordPress Daisycon prijsvergelijkers plugin <= 4.8.4 - SQL Injection vulnerability | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Daisycon Daisycon prijsvergelijkers allows SQL Injection. This issue affects Daisycon prijsvergelijkers: from n/a through 4.8.4. | [] |
CVE-2011-0258 | Apple QuickTime before 7.7 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted image description associated with an mp4v tag in a movie file. | [
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.3.1.70:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.6.8:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*"
] |
|
GHSA-p6w9-r443-r752 | Shopware vulnerable to blind SQL-injection in DAL aggregations | ImpactThe Shopware application API contains a search functionality which enables users to search through information stored within their Shopware instance. The searches performed by this function can be aggregated using the parameters in the “aggregations”
object. The ‘name’ field in this “aggregations” object is vulnerable SQL-injection and can be exploited using SQL parameters.PatchesUpdate to Shopware 6.6.5.1 or 6.5.8.13WorkaroundsFor older versions of 6.1, 6.2, 6.3 and 6.4 corresponding security measures are also available via a plugin. For the full range of functions, we recommend updating to the latest Shopware version.Credit[LogicalTrust](https://logicaltrust.net) | [] |
CVE-2018-0806 | Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0807. | [
"cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
] |
|
CVE-2016-11017 | The application login page in AKIPS Network Monitor 15.37 through 16.5 allows a remote unauthenticated attacker to execute arbitrary OS commands via shell metacharacters in the username parameter (a failed login attempt returns the command-injection output to a limited login failure field). This is fixed in 16.6. | [
"cpe:2.3:a:akips:network_monitor:*:*:*:*:*:*:*:*"
] |
|
GHSA-phvc-ghwf-mr3q | This affects the package Crow before 0.3+4. When using attributes without quotes in the template, an attacker can manipulate the input to introduce additional attributes, potentially executing code. This may lead to a Cross-site Scripting (XSS) vulnerability, assuming an attacker can influence the value entered into the template. If the template is used to render user-generated content, this vulnerability may escalate to a persistent XSS vulnerability. | [] |
|
GHSA-qphq-c5f9-q7v9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Iqonic Design WP Roadmap – Product Feedback Board allows Stored XSS.This issue affects WP Roadmap – Product Feedback Board: from n/a through 1.0.8. | [] |
|
GHSA-qj3p-g2m7-rx94 | An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. | [] |
|
CVE-2020-36160 | An issue was discovered in Veritas System Recovery before 21.2. On start-up, it loads the OpenSSL library from \usr\local\ssl. This library attempts to load the from \usr\local\ssl\openssl.cnf configuration file, which does not exist. By default, on Windows systems, users can create directories under C:\. A low privileged user can create a C:\usr\local\ssl\openssl.cnf configuration file to load a malicious OpenSSL engine, resulting in arbitrary code execution as SYSTEM when the service starts. This gives the attacker administrator access on the system, allowing the attacker (by default) to access all data and installed applications, etc. If the system is also an Active Directory domain controller, then this can affect the entire domain. | [
"cpe:2.3:a:veritas:system_recovery:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-26208 | Heap-buffer-overflow in jhead | JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue. | [
"cpe:2.3:a:jhead_project:jhead:*:*:*:*:*:*:*:*"
] |
CVE-2024-27362 | A vulnerability was discovered in Samsung Mobile Processors Exynos 1280, Exynos 2200, Exynos 1330, Exynos 1380, and Exynos 2400 where they do not properly check the length of the data, which can lead to a Information disclosure. | [
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_2200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_2400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_2400:-:*:*:*:*:*:*:*"
] |
|
GHSA-8pww-55pm-85vv | GL-iNet products AR750/AR750S/AR300M/AR300M16/MT300N-V2/B1300/MT1300/SFT1200/X750 v4.3.11, MT3000/MT2500/AXT1800/AX1800/A1300/X300B v4.5.16, XE300 v4.3.16, E750 v4.3.12, AP1300/S1300 v4.3.13, and XE3000/X3000 v4.4 were discovered to contain a remote code execution (RCE) vulnerability. | [] |
|
GHSA-m4jm-xmcc-hjcm | Improper following of a certificate's chain of trust exists in SkyBridge MB-A200 firmware Ver. 01.00.05 and earlier, and SkyBridge BASIC MB-A130 firmware Ver. 1.4.1 and earlier, which may allow a remote unauthenticated attacker to eavesdrop on or alter the communication sent to the WebUI of the product. | [] |
|
CVE-2022-28308 | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley View 10.16.02.022. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of 3DS files. Crafted data in a 3DS file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-16307. | [
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-5560 | CWE-125: Out-of-bounds Read vulnerability exists that could cause denial of service of the
device’s web interface when an attacker sends a specially crafted HTTP request. | [
"cpe:2.3:h:schneider-electric:sage_3030_magnum:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:sage_1410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:sage_1430:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:sage_1450:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:sage_2400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:sage_4400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:sage_rtu_firmware:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-9919 | A buffer overflow issue was addressed with improved memory handling. This issue is fixed in iOS 13.6 and iPadOS 13.6, macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-2997 | Use-after-free vulnerability in RealNetworks RealPlayer 11.0 through 11.1, RealPlayer SP 1.0 through 1.0.1, Mac RealPlayer 11.0 through 11.1, Linux RealPlayer 11.0.2.1744, and possibly HelixPlayer 1.0.6 and other versions, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted StreamTitle tag in an ICY SHOUTcast stream, related to the SMIL file format. | [
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-20760 | In GPAC 0.7.1 and earlier, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because a certain -1 return value is mishandled. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*"
] |
|
GHSA-x8f4-mm5h-f849 | The Hawk Console component of TIBCO Software Inc.'s TIBCO Hawk and TIBCO Operational Intelligence Hawk RedTail contains a vulnerability that will return the EMS transport password and EMS SSL password to a privileged user. Affected releases are TIBCO Software Inc.'s TIBCO Hawk: versions 6.2.1 and below and TIBCO Operational Intelligence Hawk RedTail: versions 7.2.0 and below. | [] |
|
GHSA-m589-mv4q-p7rj | webbrowser-rs allows attackers to access arbitrary files via supplying a crafted URL | An issue in the IpFile argument of rust-lang webbrowser-rs v0.8.2 allows attackers to access arbitrary files via supplying a crafted URL. | [] |
GHSA-rphc-vh34-9jmw | A vulnerability exists on all versions of Ivanti Connect Secure below 22.6R2 where an attacker with a foothold on an Ivanti Connect Secure (ICS) appliance can escalate their privileges by exploiting a vulnerable installed application. This vulnerability allows the attacker to gain elevated execution privileges on the affected system. | [] |
|
GHSA-6p7f-fgg5-pfgg | telnetd in Cisco IOS XR 5.0.1 on Network Convergence System 6000 devices allows remote attackers to cause a denial of service (device reload) via a malformed TELNET packet, aka Bug ID CSCuq31566. | [] |
|
GHSA-cm43-f2pv-6v68 | OS Command Injection in Apache Airflow | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Hive Provider, Apache Airflow allows an attacker to execute arbtrary commands in the task execution context, without write access to DAG files. This issue affects Hive Provider versions prior to 4.1.0. It also impacts any Apache Airflow versions prior to 2.3.0 in case HIve Provider is installed (Hive Provider 4.1.0 can only be installed for Airflow 2.3.0+). Note that you need to manually install the HIve Provider version 4.1.0 in order to get rid of the vulnerability on top of Airflow 2.3.0+ version that has lower version of the Hive Provider installed). | [] |
CVE-2022-0343 | Local Priviledge escalation in Perfetto Dev scripts | A local attacker, as a different local user, may be able to send a HTTP request to 127.0.0.1:10000 after the user (typically a developer) manually invoked the ./tools/run-dev-server script. It is recommended to upgrade to any version beyond 24.2 | [
"cpe:2.3:a:google:perfetto:*:*:*:*:*:*:*:*"
] |
GHSA-6hgc-m2jj-hh5x | Stack-based buffer overflow in the base, IPDS DLE, Forms DLE, Barcode DLE, Prescribe DLE, and Printcryption DLE components on certain Lexmark laser printers and multi-function printers allows remote attackers to execute arbitrary code or cause a denial of service (device hang) via a long argument to a PJL INQUIRE command. | [] |
|
CVE-2022-20051 | In ims service, there is a possible unexpected application behavior due to incorrect privilege assignment. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06219127; Issue ID: ALPS06219127. | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*"
] |
|
CVE-2005-3126 | The (1) kantiword (kantiword.sh) and (2) gantiword (gantiword.sh) scripts in antiword 0.35 and earlier allow local users to overwrite arbitrary files via a symlink attack on temporary (a) output and (b) error files. | [
"cpe:2.3:a:antiword:antiword:0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:antiword:antiword:0.35:*:*:*:*:*:*:*"
] |
|
GHSA-6wf2-4962-r5f7 | Buffer overflows in Avirt Gateway Suite 4.2 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) long header fields to the HTTP proxy, or (2) a long string to the telnet proxy. | [] |
|
CVE-2022-26839 | Delta Electronics DIAEnergie Incorrect Default Permissions | Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) is vulnerable to an incorrect default permission in the DIAEnergie application, which may allow an attacker to plant new files (such as DLLs) or replace existing executable files. | [
"cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*"
] |
CVE-2023-25358 | A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely. | [
"cpe:2.3:a:webkitgtk:webkitgtk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] |
|
CVE-2006-5300 | Unspecified vulnerability in HP Version Control Agent before 2.1.5 allows remote authenticated users to obtain "unauthorized access" to a remote Repository Manager account and potentially gain privileges via unspecified vectors. | [
"cpe:2.3:a:hp:version_control_agent:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-30699 | Out-of-bounds write vulnerability in parser_hvcC function of libsimba library prior to SMR Aug-2023 Release 1 allows code execution by remote attackers. | [
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*"
] |
|
GHSA-5vx5-9q73-wgp4 | Safemode Gem Has Incomplete List of Disallowed Inputs | rubygem-safemode, as used in Foreman, versions 1.3.1 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation. | [] |
CVE-2023-45706 | HCL BigFix Platform is susceptible to Cross Site Scripting (XSS) and/or Man in the Middle (MITM) attack | An administrative user of WebReports may perform a Cross Site Scripting (XSS) and/or Man in the Middle (MITM) exploit through SAML configuration.
| [] |
CVE-2018-10901 | A flaw was found in Linux kernel's KVM virtualization subsystem. The VMX code does not restore the GDT.LIMIT to the previous host value, but instead sets it to 64KB. With a corrupted GDT limit a host's userspace code has an ability to place malicious entries in the GDT, particularly to the per-cpu variables. An attacker can use this to escalate their privileges. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] |
|
GHSA-3999-5ffv-wp2r | Yamux Memory Exhaustion Vulnerability via Active::pending_frames property | SummaryAttack scenario
The Rust implementation of the Yamux stream multiplexer uses a vector for pending frames. This vector is not bounded in length. Every time the Yamux protocol requires sending of a new frame, this frame gets appended to this vector. This can be remotely triggered in a number of ways, for example by:Opening a new libp2p Identify stream. This causes the node to send its Identify message. Of course, every other protocol that causes the sending of data also works. The larger the response, the more data is enqueued.Sending a Yamux Ping frame. This causes a Pong frame to be enqueued.Under normal circumstances, this queue of pending frames would be drained once they’re sent out over the network. However, the attacker can use TCP’s receive window mechanism to prevent the victim from sending out any data: By not reading from the TCP connection, the receive window will never be increased, and the victim won’t be able to send out any new data (this is how TCP implements backpressure). Once this happens, Yamux’s queue of pending frames will start growing indefinitely. The queue will only be drained once the underlying TCP connection is closed.Components
https://github.com/libp2p/rust-yamux/blob/yamux-v0.13.1/yamux/src/connection.rs#L289DetailsThis attack is inspired by the HTTP/2 Rapid Reset Attack (CVE 2023-44487), HTTP/2 Ping Flood (CVE-2019-9512), and the QUIC Path Validation attack (see my blog post: https://seemann.io/posts/2023-12-18-exploiting-quics-path-validation/).ImpactAn attacker can cause a remote node to run out of memory, which will result in the corresponding process getting terminated by the operating system.Depending on the application protocols running on top of rust-libp2p, higher amplification factors are possible. For example, image a protocol that sends out 10 MB of data as a result of an incoming request. By issuing that request and sending a Yamux stream window update (together ~100-200 bytes), the victim would now enqueue the entire 10 MB into its frame buffer. Any block transfer / sync protocols might be good candidates.In addition to consuming huge amounts of memory, this attack also drives up the victim's CPU load, such that the allocation of memory at some point becomes CPU-limited.This was originally submitted by @marteen-seemann to the Ethereum Foundation bug bounty program. | [] |
CVE-2023-29476 | In Menlo On-Premise Appliance before 2.88, web policy may not be consistently applied properly to intentionally malformed client requests. This is fixed in 2.88.2+, 2.89.1+, and 2.90.1+. | [] |
|
GHSA-pqvm-jxcc-r49r | IBM Security Guardium Big Data Intelligence 1.0 (SonarG) uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 175560. | [] |
|
GHSA-m8x3-h4fm-hpp2 | All versions up to V1.1.10P3T18 of ZTE ZXHN F670 product are impacted by improper access control vulnerability, which may allows an unauthorized user to perform unauthorized operations on the router. | [] |
|
CVE-2012-6139 | libxslt before 1.1.28 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via an (1) empty match attribute in a XSL key to the xsltAddKey function in keys.c or (2) uninitialized variable to the xsltDocumentFunction function in functions.c. | [
"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.24:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.25:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:1.1.26:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] |
|
GHSA-j9ww-72pm-37h3 | UNIX Symbolic Link (Symlink) Following vulnerability in the packaging of privoxy on openSUSE Leap 15.1, Factory allows local attackers to escalate from user privoxy to root. This issue affects: openSUSE Leap 15.1 privoxy version 3.0.28-lp151.1.1 and prior versions. openSUSE Factory privoxy version 3.0.28-2.1 and prior versions. | [] |
|
GHSA-m394-x67v-rr97 | Vulnerability in the Oracle Banking Corporate Lending component of Oracle Financial Services Applications (subcomponent: Core module). Supported versions that are affected are 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Corporate Lending. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Corporate Lending accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Corporate Lending. CVSS 3.0 Base Score 8.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H). | [] |
|
GHSA-wvmm-4rq2-x524 | Buffer overflow in the Launcher in IBM WebSphere Transformation Extender 8.4.x before 8.4.0.4 allows local users to cause a denial of service (process crash or Admin Console command-stream outage) via unspecified vectors. | [] |
|
GHSA-rwv8-w229-vr4v | The Views for WPForms – Display & Edit WPForms Entries on your site frontend plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'save_view' function in all versions up to, and including, 3.2.2. This makes it possible for authenticated attackers, with subscriber access and above, to modify the titles of arbitrary posts. | [] |
|
GHSA-f3f5-3w2j-q3qx | Heap-based buffer overflow in the unhtmlify function in foomatic-rip in foomatic-filters before 4.0.6 allows remote attackers to cause a denial of service (memory corruption and crash) or possibly execute arbitrary code via a long job title. | [] |
|
CVE-2013-1864 | The Portable Tool Library (aka PTLib) before 2.10.10, as used in Ekiga before 4.0.1, does not properly detect recursion during entity expansion, which allows remote attackers to cause a denial of service (memory and CPU consumption) via a crafted PXML document containing a large number of nested entity references, aka a "billion laughs attack." | [
"cpe:2.3:a:opalvoip:portable_tool_library:2.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opalvoip:portable_tool_library:2.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:opalvoip:portable_tool_library:2.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:opalvoip:portable_tool_library:2.10.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ekiga:ekiga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:suse:suse_linux_enterprise_software_development_kit:11.0:sp3:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*"
] |
|
GHSA-fpf8-6xj4-hr2q | Cross-site scripting (XSS) vulnerability in the AddThis Button module 5.x before 5.x-2.2 and 6.x before 6.x-2.9 for Drupal allows remote authenticated users, with administer addthis privileges, to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2021-41539 | A vulnerability has been identified in Solid Edge SE2021 (All versions < SE2021MP8). The affected application contains a use-after-free vulnerability while parsing OBJ files. An attacker could leverage this vulnerability to execute code in the context of the current process (ZDI-CAN-13773). | [
"cpe:2.3:a:siemens:solid_edge:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:-:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack1:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack2:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack3:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack4:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack5:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack6:*:*:*:*:*:*",
"cpe:2.3:a:siemens:solid_edge:se2021:maintenance_pack7:*:*:*:*:*:*"
] |
|
CVE-2024-1199 | CodeAstro Employee Task Management System attendance-info.php denial of service | A vulnerability has been found in CodeAstro Employee Task Management System 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file \employee-tasks-php\attendance-info.php. The manipulation of the argument aten_id leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-252697 was assigned to this vulnerability. | [
"cpe:2.3:a:employee_task_management_system_project:employee_task_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2022-35521 | WAVLINK WN572HP3, WN533A8, WN530H4, WN535G3, WN531P3 firewall.cgi has no filtering on parameters: remoteManagementEnabled, blockPortScanEnabled, pingFrmWANFilterEnabled and blockSynFloodEnabled, which leads to command injection in page /man_security.shtml. | [
"cpe:2.3:o:wavlink:wn572hp3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn572hp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn533a8_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn533a8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn530h4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn530h4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn535g3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn535g3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wavlink:wn531p3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:wavlink:wn531p3:-:*:*:*:*:*:*:*"
] |
|
GHSA-rwjf-j42w-jfr4 | An issue was discovered in Squid through 4.7. When Squid is run as root, it spawns its child processes as a lesser user, by default the user nobody. This is done via the leave_suid call. leave_suid leaves the Saved UID as 0. This makes it trivial for an attacker who has compromised the child process to escalate their privileges back to root. | [] |
|
GHSA-xp5j-75x6-qx28 | awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname. | [] |
|
CVE-2018-0683 | Buffer overflow in Denbun by NEOJAPAN Inc. (Denbun POP version V3.3P R4.0 and earlier, Denbun IMAP version V3.3I R4.0 and earlier) allows remote attackers to execute arbitrary code or cause a denial-of-service (DoS) condition via Cookie data. | [
"cpe:2.3:a:neo:debun_imap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:neo:debun_pop:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-0914 | Cross-site scripting (XSS) vulnerability in display_renderers/panels_renderer_editor.class.php in the admin view in the Panels module 6.x-2.x before 6.x-3.10 and 7.x-3.x before 7.x-3.0 for Drupal allows remote authenticated users with certain privileges to inject arbitrary web script or HTML via the Region title. | [
"cpe:2.3:a:earl_miles:panels:6.x-3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:6.x-3.x:dev:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:7.x-3.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:7.x-3.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:7.x-3.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:earl_miles:panels:7.x-3.x:dev:*:*:*:*:*:*"
] |
|
GHSA-c77h-m7f7-v4v8 | An incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service. | [] |
|
GHSA-vqm8-3p4q-rch7 | A logic issue was addressed with improved restrictions. This issue is fixed in iOS 16.6 and iPadOS 16.6, macOS Monterey 12.6.8, watchOS 9.6, macOS Ventura 13.5, iOS 15.7.8 and iPadOS 15.7.8. An app may be able to read sensitive location information. | [] |
|
CVE-2024-43611 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*"
] |
CVE-2009-2083 | Cross-site scripting (XSS) vulnerability in the term data detail page in Taxonomy manager 5.x before 5.x-1.2, a module for Drupal, allows remote authenticated users, with administer taxonomy privileges or the ability to use free tagging to add taxonomy terms, to inject arbitrary web script or HTML via "Parent and related terms." | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mattias_hutterer:taxonomy_manager:5.x-1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mattias_hutterer:taxonomy_manager:5.x-1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mattias_hutterer:taxonomy_manager:5.x-1.x-dev:*:*:*:*:*:*:*"
] |
|
CVE-2022-36054 | Out-of-bounds write when decompressing 6LoWPAN payload in Contiki-NG | Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. The 6LoWPAN implementation in the Contiki-NG operating system (file os/net/ipv6/sicslowpan.c) contains an input function that processes incoming packets and copies them into a packet buffer. Because of a missing length check in the input function, it is possible to write outside the packet buffer's boundary. The vulnerability can be exploited by anyone who has the possibility to send 6LoWPAN packets to a Contiki-NG system. In particular, the vulnerability is exposed when sending either of two types of 6LoWPAN packets: an unfragmented packet or the first fragment of a fragmented packet. If the packet is sufficiently large, a subsequent memory copy will cause an out-of-bounds write with data supplied by the attacker. | [
"cpe:2.3:o:contiki-ng:contiki-ng:*:*:*:*:*:*:*:*"
] |
CVE-2024-41700 | Barix – CWE-200 Exposure of Sensitive Information to an Unauthorized Actor | Barix – CWE-200 Exposure of Sensitive Information to an Unauthorized Actor | [
"cpe:2.3:a:barix:sip_client_web_management_interface_ui:*:*:*:*:*:*:*:*",
"cpe:2.3:o:barix:sip_client_firmware:-:*:*:*:*:*:*:*"
] |
GHSA-4pmx-x3px-qgrr | IBM Storage Protect Plus Server 10.1.0 through 10.1.16 could allow an authenticated user with read-only permissions to add or delete entries from an existing HyperVisor configuration. IBM X-Force ID: 271538. | [] |
|
GHSA-xvhg-pwg9-qp4r | PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation. | [] |
|
CVE-2017-15311 | The baseband modules of Mate 10, Mate 10 Pro, Mate 9, Mate 9 Pro Huawei smart phones with software before ALP-AL00 8.0.0.120(SP2C00), before BLA-AL00 8.0.0.120(SP2C00), before MHA-AL00B 8.0.0.334(C00), and before LON-AL00B 8.0.0.334(C00) have a stack overflow vulnerability due to the lack of parameter validation. An attacker could send malicious packets to the smart phones within radio range by special wireless device, which leads stack overflow when the baseband module handles these packets. The attacker could exploit this vulnerability to perform a denial of service attack or remote code execution in baseband module. | [
"cpe:2.3:o:huawei:mate_10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_10_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_10_pro:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_9_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:mate_9_pro_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:mate_9_pro:-:*:*:*:*:*:*:*"
] |
|
GHSA-qfv3-7r59-7jhg | IBM Sterling B2B Integrator Standard Edition 5.2.0. 0 through 6.1.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 210171. | [] |
|
CVE-2020-10367 | Certain Cypress (and Broadcom) Wireless Combo chips, when a January 2021 firmware update is not present, allow memory access via a "Spectra" attack. | [] |
|
GHSA-6979-7cwq-22m2 | SQL injection vulnerability in the Downloads module in Php-Nuke 6.x through 7.2 allows remote attackers to execute arbitrary SQL via the (1) orderby or (2) sid parameters to modules.php. | [] |
|
GHSA-gx7j-9f5h-mcm4 | The EventPrime – Events Calendar, Bookings and Tickets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability checks on the export_submittion_attendees function in all versions up to, and including, 4.0.7.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to download list of attendees for any event. | [] |
|
GHSA-2rf3-3mwr-3pqg | Multiple SQL injection vulnerabilities in EllisLab ExpressionEngine before 2.9.1 allow remote authenticated users to execute arbitrary SQL commands via the (1) column_filter or (2) category[] parameter to system/index.php or the (3) tbl_sort[0][] parameter in the comment module to system/index.php. | [] |
|
GHSA-ggwc-r3m2-wjp9 | cli/lib/main.js in Entropic before 2019-06-13 does not reject / and \ in command names, which might allow a directory traversal attack in unusual situations. | [] |
|
GHSA-68v9-3jjq-rvp4 | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly via the download overview. For older versions of 6.1, 6.2, and 6.3, corresponding security measures are also available via a plugin. | [] |
GHSA-73q2-7hjp-cq22 | In Exiv2 0.26, the Exiv2::PngImage::printStructure function in pngimage.cpp allows remote attackers to cause an information leak via a crafted file. | [] |
|
GHSA-6xq7-qqp2-9mmc | A use after free vulnerability exists in curl <v8.1.0 in the way libcurl offers a feature to verify an SSH server's public key using a SHA 256 hash. When this check fails, libcurl would free the memory for the fingerprint before it returns an error message containing the (now freed) hash. This flaw risks inserting sensitive heap-based data into the error message that might be shown to users or otherwise get leaked and revealed. | [] |
|
GHSA-g4x5-qfgc-f49g | Check Point Web Intelligence does not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic. | [] |
|
CVE-2024-42138 | mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file | In the Linux kernel, the following vulnerability has been resolved:
mlxsw: core_linecards: Fix double memory deallocation in case of invalid INI file
In case of invalid INI file mlxsw_linecard_types_init() deallocates memory
but doesn't reset pointer to NULL and returns 0. In case of any error
occurred after mlxsw_linecard_types_init() call, mlxsw_linecards_init()
calls mlxsw_linecard_types_fini() which performs memory deallocation again.
Add pointer reset to NULL.
Found by Linux Verification Center (linuxtesting.org) with SVACE. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*"
] |
GHSA-23f5-whxg-92j5 | Off-by-one error in t1lib 5.1.2 and earlier, as used in Xpdf before 3.02pl6, teTeX, and other products, allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764. | [] |
|
GHSA-vvj9-jphf-5vfh | Mware NSX contains a command injection vulnerability.A malicious actor with access to the NSX Edge CLI terminal may be able to craft malicious payloads to execute arbitrary commands on the operating system as root. | [] |
|
GHSA-pp32-w8f4-9cw6 | The installation procedure on Cisco Application Policy Infrastructure Controller (APIC) devices 1.3(2f) mishandles binary files, which allows local users to obtain root access via unspecified vectors, aka Bug ID CSCva50496. | [] |
|
GHSA-c9fm-3jwc-r8r6 | The Boom Fest plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'bf_admin_action' function in all versions up to, and including, 2.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin settings that change the appearance of the website. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.