id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-ghpp-p7j7-78gh | NETGEAR RAX40 devices before 1.0.3.64 are affected by disclosure of sensitive information. | [] |
|
CVE-2000-0406 | Netscape Communicator before version 4.73 and Navigator 4.07 do not properly validate SSL certificates, which allows remote attackers to steal information by redirecting traffic from a legitimate web server to their own malicious server, aka the "Acros-Suencksen SSL" vulnerability. | [
"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.5_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*"
] |
|
CVE-2005-0712 | Mac OS X before 10.3.8 users world-writable permissions for certain directories, which may allow local users to gain privileges, possibly via the receipt cache or ColorSync profiles. | [
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*"
] |
|
GHSA-5hf5-fh77-h2w2 | The Responsive Gallery Grid WordPress plugin before 2.3.11 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [] |
|
CVE-2020-24742 | An issue has been fixed in Qt versions 5.14.0 where QPluginLoader attempts to load plugins relative to the working directory, allowing attackers to execute arbitrary code via crafted files. | [
"cpe:2.3:a:qt:qt:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-1326 | WebKit, as used in Apple Safari before 6.1.4 and 7.x before 7.0.4, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-05-21-1. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:7.0.3:*:*:*:*:*:*:*"
] |
|
GHSA-3wc6-3hc2-3wc8 | In the Linux kernel before 5.3.4, a reference count usage error in the fib6_rule_suppress() function in the fib6 suppression feature of net/ipv6/fib6_rules.c, when handling the FIB_LOOKUP_NOREF flag, can be exploited by a local attacker to corrupt memory, aka CID-ca7a03c41753. | [] |
|
CVE-2008-4906 | SQL injection vulnerability in lyrics_song.php in the Lyrics (lyrics_menu) plugin 0.42 for e107 allows remote attackers to execute arbitrary SQL commands via the l_id parameter. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:w1n78:lyrics:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-28709 | Apache Tomcat: Fix for CVE-2023-24998 is incomplete | The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. | [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:11.0.0:milestone3:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:11.0.0:milestone4:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*"
] |
GHSA-mq52-895v-f8xx | Cross-site scripting (XSS) vulnerability in asdoc/templates/index.html in Apache Flex before 4.14.1 allows remote attackers to inject arbitrary web script or HTML by providing a crafted URI to JavaScript code generated by the asdoc component. | [] |
|
CVE-2021-27330 | Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents. | [
"cpe:2.3:a:triconsole:datepicker_calendar:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-2704 | Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.3.0 and 12.4.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Payments accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Banking Payments. CVSS 3.0 Base Score 8.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H). | [
"cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*"
] |
|
GHSA-rfgc-5r25-fw46 | Frappe version 14.10.0 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not correctly validate the information injected by the user in the import_file parameter. | [] |
|
GHSA-pqvr-487j-j8c4 | In ProtocolEmergencyCallListIndAdapter::Init of protocolcalladapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with baseband firmware compromise required. User interaction is not needed for exploitation. | [] |
|
GHSA-xqc9-pqh7-3h69 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Really Simple Plugins Recipe Maker For Your Food Blog from Zip Recipes.This issue affects Recipe Maker For Your Food Blog from Zip Recipes: from n/a through 8.1.0. | [] |
|
CVE-2017-7538 | A cross-site scripting (XSS) flaw was found in how an organization name is displayed in Satellite 5, before 5.8. A user able to change an organization's name could exploit this flaw to perform XSS attacks against other Satellite users. | [
"cpe:2.3:a:redhat:satellite:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-17042 | An issue was discovered in Rsyslog v8.1908.0. contrib/pmcisconames/pmcisconames.c has a heap overflow in the parser for Cisco log messages. The parser tries to locate a log message delimiter (in this case, a space or a colon), but fails to account for strings that do not satisfy this constraint. If the string does not match, then the variable lenMsg will reach the value zero and will skip the sanity check that detects invalid log messages. The message will then be considered valid, and the parser will eat up the nonexistent colon delimiter. In doing so, it will decrement lenMsg, a signed integer, whose value was zero and now becomes minus one. The following step in the parser is to shift left the contents of the message. To do this, it will call memmove with the right pointers to the target and destination strings, but the lenMsg will now be interpreted as a huge value, causing a heap overflow. | [
"cpe:2.3:a:rsyslog:rsyslog:8.1908.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] |
|
CVE-2008-5884 | AyeView 2.20 allows user-assisted attackers to cause a denial of service (application crash) via a GIF file with a malformed header. | [
"cpe:2.3:a:zkesoft:ayeview:2.20:*:*:*:*:*:*:*"
] |
|
CVE-2019-1003002 | A sandbox bypass vulnerability exists in Pipeline: Declarative Plugin 1.3.3 and earlier in pipeline-model-definition/src/main/groovy/org/jenkinsci/plugins/pipeline/modeldefinition/parser/Converter.groovy that allows attackers with Overall/Read permission to provide a pipeline script to an HTTP endpoint that can result in arbitrary code execution on the Jenkins master JVM. | [
"cpe:2.3:a:jenkins:pipeline\\:_declarative:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*"
] |
|
CVE-2024-28550 | Tenda AC18 V15.03.05.05 has a stack overflow vulnerability in the filePath parameter of formExpandDlnaFile function. | [
"cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*"
] |
|
GHSA-23c8-gv7j-76hv | A Null Pointer Dereference vulnerability in WLAvalancheService component of Ivanti Avalanche before 6.4.3 allows an authenticated remote attacker to perform denial of service attacks. | [] |
|
CVE-2020-10069 | Zephyr Bluetooth unchecked packet data results in denial of service | Zephyr Bluetooth unchecked packet data results in denial of service. Zephyr versions >= v1.14.2, >= v2.2.0 contain Improper Handling of Parameters (CWE-233). For more information, see https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-f6vh-7v4x-8fjp | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] |
CVE-2021-35202 | NETSCOUT Systems nGeniusONE 6.3.0 build 1196 allows Authorization Bypass (to access an endpoint) in FDSQueryService. | [
"cpe:2.3:a:netscout:ngeniusone:6.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-44039 | WordPress WP Travel – Ultimate Travel Booking System, Tour Management Engine plugin <= 9.3.1 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Travel allows Stored XSS.This issue affects WP Travel: from n/a through 9.3.1. | [] |
GHSA-78w8-jw35-5rj7 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 does not properly implement the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for unintended HTTP traffic on port 8445. | [] |
|
GHSA-cp9g-348x-3wqv | A vulnerability found in the OPTILINK OP-XT71000N Hardware Version: V2.2 , Firmware Version: OP_V3.3.1-191028 allows an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to men in the middle attack by adding New Routes in RoutingConfiguration on " /routing.asp ". | [] |
|
GHSA-cjw9-8435-h4q5 | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.5. An app may be able to execute arbitrary code with kernel privileges. | [] |
|
GHSA-64mh-22cg-c7mf | In PHOENIX CONTACTs WP 6xxx series web panels in versions prior to 4.0.10 a remote attacker with low privileges may use a command injection in a HTTP POST request releated to font configuration operations to gain full access to the device. | [] |
|
GHSA-h5x9-4j34-4q7p | A maliciously crafted DWF file, when parsed in w3dtk.dll through Autodesk Navisworks, can force a Use-After-Free. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the context of the current process. | [] |
|
CVE-2025-32679 | WordPress User Registration Using Contact Form 7 plugin <= 2.2 - Cross Site Request Forgery (CSRF) Vulnerability | Cross-Site Request Forgery (CSRF) vulnerability in ZealousWeb User Registration Using Contact Form 7 allows Cross Site Request Forgery. This issue affects User Registration Using Contact Form 7: from n/a through 2.2. | [] |
CVE-2015-3149 | The Hotspot component in OpenJDK8 as packaged in Red Hat Enterprise Linux 6 and 7 allows local users to write to arbitrary files via a symlink attack. | [
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6z:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-c37p-8677-9fjp | A code execution vulnerability exists in the Xiaomi Game center application product. The vulnerability is caused by improper input validation and can be exploited by attackers to execute malicious code. | [] |
|
CVE-2016-5724 | Cloudera CDH before 5.9 has Potentially Sensitive Information in Diagnostic Support Bundles. | [
"cpe:2.3:a:cloudera:cdh:*:*:*:*:*:*:*:*"
] |
|
GHSA-w7qw-j374-vmgx | To maintain compliance with CNA rules, we have rejected this CVE record because it has not been used. | [] |
|
GHSA-wm68-vvjf-2rc3 | Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability. | [] |
|
GHSA-r8rh-2mfh-6v8x | Multiple stored cross-site scripting (XSS) vulnerabilities in Arcadyan Wifi routers VRV9506JAC23 allow remote attackers to inject arbitrary web script or HTML via the hostName and domain_name parameters present in the LAN configuration section of the administrative dashboard. | [] |
|
GHSA-349g-pr27-x5hf | DameWare Mini Remote Control 3.x before 3.74 and 4.x before 4.2 transmits the Blowfish encryption key in plaintext, which allows remote attackers to gain sensitive information. | [] |
|
GHSA-fcvh-7h6p-x524 | Lockbox in EMC Documentum D2 before 4.5 uses a hardcoded passphrase when a server lacks a D2.Lockbox file, which makes it easier for remote authenticated users to decrypt admin tickets by locating this passphrase in a decompiled D2 JAR archive. | [] |
|
GHSA-8v36-8jq8-23wc | SAP Business Objects Platform - versions 420, and 430, allows an attacker with normal BI user privileges to upload/replace any file on Business Objects server at the operating system level, enabling the attacker to take full control of the system causing a high impact on confidentiality, integrity, and availability of the application. | [] |
|
GHSA-88rc-96xj-2mvh | In the Linux kernel, the following vulnerability has been resolved:dma-buf: heaps: Fix potential spectre v1 gadgetIt appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.[sumits: added fixes and cc: stable tags] | [] |
|
GHSA-xr3c-3fp9-4fcp | An issue was discovered in Joomla! 4.0.0 through 4.2.6. A missing token check causes a CSRF vulnerability in the handling of post-installation messages. | [] |
|
CVE-2023-53091 | ext4: update s_journal_inum if it changes after journal replay | In the Linux kernel, the following vulnerability has been resolved:
ext4: update s_journal_inum if it changes after journal replay
When mounting a crafted ext4 image, s_journal_inum may change after journal
replay, which is obviously unreasonable because we have successfully loaded
and replayed the journal through the old s_journal_inum. And the new
s_journal_inum bypasses some of the checks in ext4_get_journal(), which
may trigger a null pointer dereference problem. So if s_journal_inum
changes after the journal replay, we ignore the change, and rewrite the
current journal_inum to the superblock. | [] |
GHSA-x4w2-gh57-r677 | In the Linux kernel, the following vulnerability has been resolved:bpf: Fix deadlock when freeing cgroup storageThe following commit
bc235cdb423a ("bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]")
first introduced deadlock prevention for fentry/fexit programs attaching
on bpf_task_storage helpers. That commit also employed the logic in map
free path in its v6 version.Later bpf_cgrp_storage was first introduced in
c4bcfb38a95e ("bpf: Implement cgroup storage available to non-cgroup-attached bpf progs")
which faces the same issue as bpf_task_storage, instead of its busy
counter, NULL was passed to bpf_local_storage_map_free() which opened
a window to cause deadlock:Progs:A: SEC("fentry/cgroup_storage_ptr")cgid (BPF_MAP_TYPE_HASH)
Record the id of the cgroup the current task belonging
to in this hash map, using the address of the cgroup
as the map key.cgrpa (BPF_MAP_TYPE_CGRP_STORAGE)
If current task is a kworker, lookup the above hash
map using function parameter @owner as the key to get
its corresponding cgroup id which is then used to get
a trusted pointer to the cgroup through
bpf_cgroup_from_id(). This trusted pointer can then
be passed to bpf_cgrp_storage_get() to finally trigger
the deadlock issue.B: SEC("tp_btf/sys_enter")cgrpb (BPF_MAP_TYPE_CGRP_STORAGE)
The only purpose of this prog is to fill Prog A's
hash map by calling bpf_cgrp_storage_get() for as
many userspace tasks as possible.Steps to reproduce:Run A;while (true) { Run B; Destroy B; }Fix this issue by passing its busy counter to the free procedure so
it can be properly incremented before storage/smap locking. | [] |
|
GHSA-2q58-xp4p-xpqc | IBM Security Directory Server 6.4.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to view arbitrary files on the system. IBM X-Force ID: 228582. | [] |
|
CVE-2023-41956 | WordPress Simple Membership plugin <= 4.3.4 - Authenticated Account Takeover vulnerability | Improper Authentication vulnerability in smp7, wp.Insider Simple Membership.This issue affects Simple Membership: from n/a through 4.3.4. | [
"cpe:2.3:a:smp7_wpinsider:simple_membership:*:*:*:*:*:*:*:*"
] |
CVE-2014-7740 | The Pony Magazine (aka com.triactivemedia.ponymagazine) application @7F080193 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:pocketmags:pony_magazine:\\@7f080193:*:*:*:*:android:*:*"
] |
|
GHSA-v2v7-v2fq-rjwr | Unknown vulnerability in Xerox MicroServer Web Server for various WorkCentre products including M35/M45/M55 2.028.11.000 through 2.97.20.032 and 4.84.16.000 through 4.97.20.032, Pro 35/45/55 3.028.11.000 through 3.97.20.032, Pro 65/75/90 1.001.00.060 through 1.001.02.084, and others, related to SNMP authentication, allows remote attackers to modify system configuration, a different vulnerability than CVE-2005-0703. | [] |
|
GHSA-x723-g4p2-w8m5 | Buffer over-reads were discovered in the CoAP library in Arm Mbed OS 5.15.3. The CoAP parser is responsible for parsing received CoAP packets. The function sn_coap_parser_options_parse() parses CoAP input linearly using a while loop. Once an option is parsed in a loop, the current point (*packet_data_pptr) is increased correspondingly. The pointer is restricted by the size of the received buffer, as well as by the option delta and option length bytes. The actual input packet length is not verified against the number of bytes read when processing the option extended delta and the option extended length. Moreover, the calculation of the message_left variable, in the case of non-extended option deltas, is incorrect and indicates more data left for processing than provided in the function input. All of these lead to heap-based or stack-based memory location read access that is outside of the intended boundary of the buffer. Depending on the platform-specific memory management mechanisms, it can lead to processing of unintended inputs or system memory access violation errors. | [] |
|
CVE-2023-44207 | Stored cross-site scripting (XSS) vulnerability in protection plan name. The following products are affected: Acronis Cyber Protect 15 (Linux, Windows) before build 35979. | [
"cpe:2.3:a:acronis:cyber_protect:*:*:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:-:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update1:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update2:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update3:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update4:*:*:*:*:*:*",
"cpe:2.3:a:acronis:cyber_protect:15:update5:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
CVE-2020-5944 | In BIG-IQ 7.1.0, accessing the DoS Summary events and DNS Overview pages in the BIG-IQ system interface returns an error message due to disabled Grafana reverse proxy in web service configuration. F5 has done further review of this vulnerability and has re-classified it as a defect. CVE-2020-5944 will continue to be referenced in F5 Security Advisory K57274211 and will not be assigned to other F5 vulnerabilities. | [
"cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*"
] |
|
CVE-2000-1128 | The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory. | [
"cpe:2.3:a:mcafee:virusscan:4.5:*:*:*:*:*:*:*"
] |
|
CVE-2019-10068 | An issue was discovered in Kentico 12.0.x before 12.0.15, 11.0.x before 11.0.48, 10.0.x before 10.0.52, and 9.x versions. Due to a failure to validate security headers, it was possible for a specially crafted request to the staging service to bypass the initial authentication and proceed to deserialize user-controlled .NET object input. This deserialization then led to unauthenticated remote code execution on the server where the Kentico instance was hosted. | [
"cpe:2.3:a:kentico:kentico:*:*:*:*:*:*:*:*"
] |
|
GHSA-9cgf-pxwq-2cpw | Stimulsoft Dashboard.JS Cross Site Scripting vulnerability | Cross Site Scripting vulnerability in Stimulsoft GmbH Stimulsoft Dashboard.JS before v.2024.1.2 allows a remote attacker to execute arbitrary code via a crafted payload to the ReportName field. | [] |
GHSA-9q4q-2xpr-pvwv | Cross-Site Request Forgery (CSRF) vulnerability in Paid Memberships Pro.This issue affects Paid Memberships Pro: from n/a through 2.12.10. | [] |
|
CVE-2020-0684 | A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed.An attacker who successfully exploited this vulnerability could gain the same user rights as the local user, aka 'LNK Remote Code Execution Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2017-2990 | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable memory corruption vulnerability in the h264 decompression routine. Successful exploitation could lead to arbitrary code execution. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*"
] |
|
CVE-2009-3431 | Stack consumption vulnerability in Adobe Reader and Acrobat 9.1.3, 9.1.2, 9.1.1, and earlier 9.x versions; 8.1.6 and earlier 8.x versions; and possibly 7.1.4 and earlier 7.x versions allows remote attackers to cause a denial of service (application crash) via a PDF file with a large number of [ (open square bracket) characters in the argument to the alert method. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:adobe:acrobat:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.5:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.6:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.7:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:elements:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.8:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.0.9:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:7.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:security_update:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:professional:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:standard:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:security_update:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*"
] |
|
GHSA-pj2h-85jq-g5vg | Answer Missing Authentication for Critical Function | Missing Authentication for Critical Function in GitHub repository answerdev/answer prior to v1.1.3. | [] |
CVE-2006-1890 | Multiple PHP remote file inclusion vulnerabilities in myWebland myEvent 1.2 allow remote attackers to execute arbitrary PHP code via a URL in the myevent_path parameter in (1) event.php and (2) initialize.php. NOTE: vector 2 was later reported to affect 1.4 as well. | [
"cpe:2.3:a:mywebland:myevent:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebland:myevent:1.4:*:*:*:*:*:*:*"
] |
|
CVE-2024-27733 | File Upload vulnerability in Byzro Network Smart s42 Management Platform v.S42 allows a local attacker to execute arbitrary code via the useratte/userattestation.php component. | [
"cpe:2.3:a:byzronetwork:management_platform:s42:*:*:*:*:*:*:*"
] |
|
CVE-2018-12034 | In YARA 3.7.1 and prior, parsing a specially crafted compiled rule file can cause an out of bounds read vulnerability in yr_execute_code in libyara/exec.c. | [
"cpe:2.3:a:virustotal:yara:*:*:*:*:*:*:*:*"
] |
|
GHSA-46x2-rxf4-75x5 | In certain Secustation products the administrator account password can be read. This affects V2.5.5.3116-S50-SMA-B20171107A, V2.3.4.1301-M20-TSA-B20150617A, V2.5.5.3116-S50-RXA-B20180502A, V2.5.5.3116-S50-SMA-B20190723A, V2.5.5.3116-S50-SMB-B20161012A, V2.3.4.2103-S50-NTD-B20170508B, V2.5.5.3116-S50-SMB-B20160601A, V2.5.5.2601-S50-TSA-B20151229A, and V2.5.5.3116-S50-SMA-B20170217. | [] |
|
CVE-2011-0457 | Cross-site scripting (XSS) vulnerability in e107 0.7.22 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:e107:e107:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_10:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_11:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_12:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_13:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_14:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6_15a:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.12:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.13:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.14:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.15:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.16:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.17:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.18:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.19:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.545:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.547:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.548:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.549:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.551:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.552:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.553:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.554:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.554:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.555:beta:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.600:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.601:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.602:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.603:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.604:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.605:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.606:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.607:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.608:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.609:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.610:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.611:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.612:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.613:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.614:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.615:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.615a:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.616:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.617:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6171:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6172:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6173:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6174:*:*:*:*:*:*:*",
"cpe:2.3:a:e107:e107:0.6175:*:*:*:*:*:*:*"
] |
|
GHSA-w3hv-rp5r-hr2c | Buffer overflow in yaSSL, as used in MySQL 5.5.20 and possibly other versions including 5.5.x before 5.5.22 and 5.1.x before 5.1.62, allows remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by VulnDisco Pack Professional 9.17. NOTE: as of 20120224, this disclosure has no actionable information. However, because the module author is a reliable researcher, the issue is being assigned a CVE identifier for tracking purposes. NOTE: due to lack of details, it is not clear whether this issue is a duplicate of CVE-2012-0492 or another CVE. | [] |
|
GHSA-gmrq-4x3w-3rjh | Cross-site request forgery (CSRF) vulnerability in VaM Shop 1.6, 1.6.1, and probably earlier versions allows remote attackers to hijack the authentication of administrators for requests that (1) change user status via admin/customers.php or (2) change user permissions via admin/accounting.php. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2024-7772 | Jupiter X Core <= 4.6.5 - Unauthenticated Arbitrary File Upload | The Jupiter X Core plugin for WordPress is vulnerable to arbitrary file uploads due to a mishandled file type validation in the 'validate' function in all versions up to, and including, 4.6.5. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. | [
"cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*"
] |
GHSA-83p3-xf8j-2pxj | Cross Site Scripting vulnerability in TinyMCE v.4.9.6 and before and v.5.0.0 thru v.5.1.4 allows an attacker to execute arbitrary code via the editor function. | [] |
|
GHSA-2xgx-58x8-9qqr | The issue was addressed with improved permissions logic. This issue is fixed in iOS 15 and iPadOS 15. An attacker with physical access to a device may be able to see private contact information. | [] |
|
CVE-2006-2663 | Multiple cross-site scripting (XSS) vulnerabilities in iFlance 1.1 allow remote attackers to inject arbitrary web script or HTML via certain inputs to (1) acc_verify.php or (2) project.php. | [
"cpe:2.3:a:ifusionservices:iflance:1.1:*:*:*:*:*:*:*"
] |
|
GHSA-4r39-f4rh-j6q8 | Missing permission check in Jenkins Gerrit Trigger Plugin | A missing permission check in Jenkins Gerrit Trigger Plugin 2.30.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP URL or SSH server using attacker-specified credentials, or determine the existence of a file with a given path on the Jenkins master. | [] |
CVE-2014-125008 | FFmpeg oggparsevorbis.c vorbis_header memory corruption | A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. | [
"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*"
] |
GHSA-2m4c-5v2r-9p3g | libde265 v1.0.4 contains a heap buffer overflow in the mc_chroma function, which can be exploited via a crafted a file. | [] |
|
CVE-2015-8642 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8634, CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:20.0.0.228:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:20.0.0.235:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"
] |
|
CVE-2025-0460 | Blog Botz for Journal Theme blog_add unrestricted upload | A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
GHSA-pqwr-phvv-v49f | Open WebUI Allows Admin Deletion via API Endpoint | In open-webui/open-webui version v0.3.8, there is an improper privilege management vulnerability. The application allows an attacker, acting as an admin, to delete other administrators via the API endpoint `http://0.0.0.0:8080/api/v1/users/{uuid_administrator}`. This action is restricted by the user interface but can be performed through direct API calls. | [] |
GHSA-h4f2-63f6-jv7q | The Virtual Token driver (vdlptokn.sys) 1.0.2.43 in DESlock+ 3.2.7 allows local users to cause a denial of service (system crash) via a crafted IOCTL request to \Device\DLPTokenWalter0. | [] |
|
GHSA-pww6-pfx4-8p5c | A maliciously crafted DWG file can be used to write beyond the allocated buffer while parsing DWG files. The vulnerability exists because the application fails to handle a crafted DWG file, which causes an unhandled exception. An attacker can leverage this vulnerability to execute arbitrary code. | [] |
|
CVE-2011-5137 | Multiple SQL injection vulnerabilities in tForum b0.915 allow remote attackers to execute arbitrary SQL commands via the (1) TopicID parameter to viewtopic.php, the (2) BoardID parameter to viewboard.php, or (3) CatID parameter to viewcat.php. | [
"cpe:2.3:a:tforum:tforum:b0.915:*:*:*:*:*:*:*"
] |
|
CVE-2022-32129 | 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/account/safety/trade. | [
"cpe:2.3:a:74cms:74cmsse:3.5.1:*:*:*:*:*:*:*"
] |
|
GHSA-8vrr-cjgj-wp73 | Cowbell 0.2.7.1 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | [] |
|
CVE-2020-5233 | Open Redirect in OAuth2 Proxy | OAuth2 Proxy before 5.0 has an open redirect vulnerability. Authentication tokens could be silently harvested by an attacker. This has been patched in version 5.0. | [
"cpe:2.3:a:oauth2_proxy_project:oauth2_proxy:*:*:*:*:*:*:*:*"
] |
GHSA-qrqf-2crr-jvqf | An issue was discovered in libbzip3.a in bzip3 before 1.2.3. There is a bz3_decode_block out-of-bounds read. | [] |
|
GHSA-g5xw-fr6p-pc5j | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AWSM Innovations AWSM Team allows Path Traversal.This issue affects AWSM Team: from n/a through 1.3.1. | [] |
|
GHSA-g4gq-j4p2-j8fr | Remote Code Execution via Script (Python) objects under Python 3 | ImpactBackground: The optional add-on package `Products.PythonScripts` adds `Script (Python)` to the list of content items a user can add to the Zope object database. Inside these scripts users can write Python code that is executed when rendered through the web. The code environment in these script objects is limited, it relies on the `RestrictedPython` package to provide a "safe" subset of Python instructions as well as the `AccessControl` package that defines security policies for execution in the context of a Zope application.Recently the `AccessControl` package was updated to fix a remote code execution security issue. A link to the security advisory is provided in the References section below. The bug tightens the `AccessControl` security policies for Zope by blocking access to unsafe classes inside the Python `string` module.You are only affected if the following are true:You use Python 3 for your Zope deployment (Zope 4 on Python 2 is not affected)You run Zope 4 below version 4.6.3 or Zope 5 below version 5.3You have installed the optional `Products.PythonScripts` add-on packageBy default, you need to have the admin-level Zope "Manager" role to add or edit Script (Python) objects through the web. Only sites that allow untrusted users to add/edit these scripts through the web - which would be a very unusual configuration to begin with - are at risk.PatchesThe problem has been fixed in `AccessControl` versions 4.3 and 5.2. Zope releases 4.6.3 and 5.3 now require these new `AccessControl` releases.WorkaroundsA site administrator can restrict adding/editing Script (Python) objects through the web using the standard Zope user/role permission mechanisms. Untrusted users should not be assigned the Zope Manager role and adding/editing these scripts through the web should be restricted to trusted users only. This is the default configuration in Zope.References[AccessControl security advisory GHSA-qcx9-j53g-ccgf](https://github.com/zopefoundation/AccessControl/security/advisories/GHSA-qcx9-j53g-ccgf)For more informationIf you have any questions or comments about this advisory:Open an issue in the [Zope issue tracker](https://github.com/zopefoundation/Zope/issues)Email us at [[email protected]](mailto:[email protected]) | [] |
CVE-2010-3996 | festival_server in Centre for Speech Technology Research (CSTR) Festival, probably 2.0.95-beta and earlier, places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory. | [
"cpe:2.3:a:cstr:festival:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:cstr:festival:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cstr:festival:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cstr:festival:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cstr:festival:1.95:*:*:*:*:*:*:*",
"cpe:2.3:a:cstr:festival:1.96:*:*:*:*:*:*:*"
] |
|
CVE-2006-1786 | Cross-site scripting (XSS) vulnerability in Adobe Document Server for Reader Extensions 6.0 allows remote attackers to inject arbitrary web script or HTML via (1) the actionID parameter in ads-readerext and (2) the op parameter in AlterCast. NOTE: it is not clear whether the vendor advisory addresses this issue. | [
"cpe:2.3:a:adobe:document_server:6.0:*:reader_extensions:*:*:*:*:*"
] |
|
GHSA-79mg-j8gj-jwc2 | Mikrotik RouterOS before 6.44.5 (long-term release tree) is vulnerable to memory exhaustion. By sending a crafted HTTP request, an authenticated remote attacker can crash the HTTP server and in some circumstances reboot the system. Malicious code cannot be injected. | [] |
|
CVE-2021-27343 | SerenityOS Unspecified is affected by: Buffer Overflow. The impact is: obtain sensitive information (context-dependent). The component is: /Userland/Libraries/LibCrypto/ASN1/DER.h Crypto::der_decode_sequence() function. The attack vector is: Parsing RSA Key ASN.1. | [
"cpe:2.3:o:serenityos:serenityos:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-36645 | SQL injection vulnerability in ITB-GmbH TradePro v9.5, allows remote attackers to run SQL queries via oordershow component in customer function. | [
"cpe:2.3:a:itb_gmbh:tradepro:9.5:*:*:*:*:*:*:*"
] |
|
GHSA-fhxg-444p-h63x | Cross-site Scripting (XSS) vulnerability in SmarterTools SmarterTrack This issue affects: SmarterTools SmarterTrack 100.0.8019.14010. | [] |
|
CVE-2025-24117 | This issue was addressed with improved redaction of sensitive information. This issue is fixed in iPadOS 17.7.4, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3. An app may be able to fingerprint the user. | [] |
|
CVE-2015-8787 | The nf_nat_redirect_ipv4 function in net/netfilter/nf_nat_redirect.c in the Linux kernel before 4.4 allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by sending certain IPv4 packets to an incompletely configured interface, a related issue to CVE-2003-1604. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-8322 | A potential vulnerability in the SMI callback function used in the Legacy USB driver in some Lenovo Notebook and ThinkStation models may allow arbitrary code execution. | [
"cpe:2.3:o:lenovo:330-14ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:330-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:330-17ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:330-17ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:340c-15api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:340c-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:340c-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:340c-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:720s_touch-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:720s_touch-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:720s-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:720s-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:730s-13iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:730s-13iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:c640-iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:c640-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e42-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e42-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e52-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e52-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k22-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k22-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v720-12_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v720-12:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k32-80_kbl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k32-80_kbl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k32-80_skl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k32-80_skl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:miix_720-12ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:miix_720-12ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-14ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s145-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s145-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13api_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13api:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s750-iil_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s750-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s940-14iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s940-14iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_13s-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_13s-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_14s-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_14s-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v110-14ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v110-14ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v110-14ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v110-14ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v110-15ast_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v110-15ast:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v130-15igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v130-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v130-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v130-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v310-15igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v310-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v330-15igm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v330-15igm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v330-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v330-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v330-15isk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v330-15isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-iil_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v340-iml_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v340-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v540s-13_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v540s-13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:14iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:14iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v730-13ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v730-13ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v730-13isk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v730-13isk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v730-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v730-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:wei5-15ikb_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:wei5-15ikb:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:xiaoxin_14-ast_qc_2019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:xiaoxin_14-ast_qc_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:xx-14api_qc_2019_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:xx-14api_qc_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_s730-13iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_s730-13iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_s940-14iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_s940-14iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:6_pro-13-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:6_pro-13-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:6_pro-14-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:6_pro-14-iwl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:e53-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:e53-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:k4-iwl_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:k4-iwl:-:*:*:*:*:*:*:*"
] |
|
GHSA-hqgq-3r9h-h993 | ENC DataVault 7.1.1W uses an inappropriate encryption algorithm, such that an attacker (who does not know the secret key) can make ciphertext modifications that are reflected in modified plaintext. There is no data integrity mechanism. (This behavior occurs across USB drives sold under multiple brand names.) | [] |
|
CVE-2017-3319 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: X Plugin). Supported versions that are affected are 5.7.16 and earlier. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS v3.0 Base Score 3.1 (Confidentiality impacts). | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-44037 | An issue in ZPE Systems, Inc Nodegrid OS v.5.8.10 thru v.5.8.13 and v.5.10.3 thru v.5.10.5 allows a remote attacker to obtain sensitive information via the TACACS+ server component. | [
"cpe:2.3:o:zpesystems:nodegrid_os:*:*:*:*:*:*:*:*"
] |
|
GHSA-jj38-pjm7-xq96 | Multiple cross-site scripting (XSS) vulnerabilities in synetics i-doit open 0.9.9-7, i-doit pro 1.0 and earlier, and i-doit pro 1.0.2 when the 'sanitize user input' flag is not enabled, allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] |
|
CVE-2016-9601 | ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript. | [
"cpe:2.3:a:artifex:gpl_ghostscript:*:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:jbig2dec:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2022-48940 | bpf: Fix crash due to incorrect copy_map_value | In the Linux kernel, the following vulnerability has been resolved:
bpf: Fix crash due to incorrect copy_map_value
When both bpf_spin_lock and bpf_timer are present in a BPF map value,
copy_map_value needs to skirt both objects when copying a value into and
out of the map. However, the current code does not set both s_off and
t_off in copy_map_value, which leads to a crash when e.g. bpf_spin_lock
is placed in map value with bpf_timer, as bpf_map_update_elem call will
be able to overwrite the other timer object.
When the issue is not fixed, an overwriting can produce the following
splat:
[root@(none) bpf]# ./test_progs -t timer_crash
[ 15.930339] bpf_testmod: loading out-of-tree module taints kernel.
[ 16.037849] ==================================================================
[ 16.038458] BUG: KASAN: user-memory-access in __pv_queued_spin_lock_slowpath+0x32b/0x520
[ 16.038944] Write of size 8 at addr 0000000000043ec0 by task test_progs/325
[ 16.039399]
[ 16.039514] CPU: 0 PID: 325 Comm: test_progs Tainted: G OE 5.16.0+ #278
[ 16.039983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS ArchLinux 1.15.0-1 04/01/2014
[ 16.040485] Call Trace:
[ 16.040645] <TASK>
[ 16.040805] dump_stack_lvl+0x59/0x73
[ 16.041069] ? __pv_queued_spin_lock_slowpath+0x32b/0x520
[ 16.041427] kasan_report.cold+0x116/0x11b
[ 16.041673] ? __pv_queued_spin_lock_slowpath+0x32b/0x520
[ 16.042040] __pv_queued_spin_lock_slowpath+0x32b/0x520
[ 16.042328] ? memcpy+0x39/0x60
[ 16.042552] ? pv_hash+0xd0/0xd0
[ 16.042785] ? lockdep_hardirqs_off+0x95/0xd0
[ 16.043079] __bpf_spin_lock_irqsave+0xdf/0xf0
[ 16.043366] ? bpf_get_current_comm+0x50/0x50
[ 16.043608] ? jhash+0x11a/0x270
[ 16.043848] bpf_timer_cancel+0x34/0xe0
[ 16.044119] bpf_prog_c4ea1c0f7449940d_sys_enter+0x7c/0x81
[ 16.044500] bpf_trampoline_6442477838_0+0x36/0x1000
[ 16.044836] __x64_sys_nanosleep+0x5/0x140
[ 16.045119] do_syscall_64+0x59/0x80
[ 16.045377] ? lock_is_held_type+0xe4/0x140
[ 16.045670] ? irqentry_exit_to_user_mode+0xa/0x40
[ 16.046001] ? mark_held_locks+0x24/0x90
[ 16.046287] ? asm_exc_page_fault+0x1e/0x30
[ 16.046569] ? asm_exc_page_fault+0x8/0x30
[ 16.046851] ? lockdep_hardirqs_on+0x7e/0x100
[ 16.047137] entry_SYSCALL_64_after_hwframe+0x44/0xae
[ 16.047405] RIP: 0033:0x7f9e4831718d
[ 16.047602] Code: b4 0c 00 0f 05 eb a9 66 0f 1f 44 00 00 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b3 6c 0c 00 f7 d8 64 89 01 48
[ 16.048764] RSP: 002b:00007fff488086b8 EFLAGS: 00000206 ORIG_RAX: 0000000000000023
[ 16.049275] RAX: ffffffffffffffda RBX: 00007f9e48683740 RCX: 00007f9e4831718d
[ 16.049747] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007fff488086d0
[ 16.050225] RBP: 00007fff488086f0 R08: 00007fff488085d7 R09: 00007f9e4cb594a0
[ 16.050648] R10: 0000000000000000 R11: 0000000000000206 R12: 00007f9e484cde30
[ 16.051124] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[ 16.051608] </TASK>
[ 16.051762] ================================================================== | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2007-4295 | Unspecified vulnerability in Cisco IOS 12.0 through 12.4 allows remote attackers to execute arbitrary code via a malformed SIP packet, aka CSCsi80749. | [
"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.