Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
GHSA-77p6-g8qp-84c3
Novell Access Manager iManager before 4.3.3 did not validate parameters so that cross site scripting content could be reflected back into the result page using the "a" parameter.
[]
GHSA-5886-r5hr-c2v4
A Missing Release of Memory after Effective Lifetime vulnerability in the Anti-Virus processing of Juniper Networks Junos OS on SRX Seriesallows an unauthenticated, network-based attacker to cause a Denial-of-Service (DoS).On all SRX platforms with Anti-Virus enabled, if a server sends specific content in the HTTP body of a response to a client request, these packets are queued by Anti-Virus processing in Juniper Buffers (jbufs) which are never released. When these jbufs are exhausted, the device stops forwarding all transit traffic.A jbuf memory leak can be noticed from the following logs:(<node>.)<fpc> Warning: jbuf pool id <#> utilization level (<current level>%) is above <threshold>%!To recover from this issue, the affected device needs to be manually rebooted to free the leaked jbufs.This issue affects Junos OS on SRX Series:all versions before 21.2R3-S9,21.4 versions before 21.4R3-S10,22.2 versions before 22.2R3-S6,22.4 versions before 22.4R3-S6,23.2 versions before 23.2R2-S3,23.4 versions before 23.4R2-S3,24.2 versions before 24.2R2.
[]
GHSA-6c46-9x5g-g2vg
The affected Reason S20 Ethernet Switch is vulnerable to cross-site scripting (XSS), which may allow attackers to trick users into following a link or navigating to a page that posts a malicious JavaScript statement to the vulnerable site, causing the malicious JavaScript to be rendered by the site and executed by the victim client.
[]
GHSA-wq43-mwf7-pm7c
Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
[]
GHSA-rrfw-qqmx-gqwx
A command injection vulnerability exists in the workflow-checker.yml workflow of significant-gravitas/autogpt. The untrusted user input `github.head.ref` is used insecurely, allowing an attacker to inject arbitrary commands. This vulnerability affects versions up to and including the latest version. An attacker can exploit this by creating a branch name with a malicious payload and opening a pull request, potentially leading to reverse shell access or theft of sensitive tokens and keys.
[]
GHSA-cfq8-fj46-w8p7
search.php in eggblog 2.0 allows remote attackers to obtain the full path via an invalid q parameter, as used by the Keyword and Search fields, possibly due to an SQL injection vulnerability.
[]
GHSA-23x2-f488-jm35
Samsung Gallery on the Samsung Galaxy S6 allows local users to cause a denial of service (process crash).
[]
CVE-2022-48792
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
In the Linux kernel, the following vulnerability has been resolved: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task Currently a use-after-free may occur if a sas_task is aborted by the upper layer before we handle the I/O completion in mpi_ssp_completion() or mpi_sata_completion(). In this case, the following are the two steps in handling those I/O completions: - Call complete() to inform the upper layer handler of completion of the I/O. - Release driver resources associated with the sas_task in pm8001_ccb_task_free() call. When complete() is called, the upper layer may free the sas_task. As such, we should not touch the associated sas_task afterwards, but we do so in the pm8001_ccb_task_free() call. Fix by swapping the complete() and pm8001_ccb_task_free() calls ordering.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-rqwr-hf3j-vwq9
The HTTP TRACK & TRACE methods were enabled in Kiwi Syslog Server 9.7.1 and earlier. These methods are intended for diagnostic purposes only. If enabled, the web server will respond to requests that use these methods by returning exact HTTP request that was received in the response to the client. This may lead to the disclosure of sensitive information such as internal authentication headers appended by reverse proxies.
[]
CVE-2024-12238
Ninja Forms – The Contact Form Builder That Grows With You <= 3.8.22 - Authenticated (Subscriber+) Arbitrary Shortcode Execution
The The Ninja Forms – The Contact Form Builder That Grows With You plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 3.8.22. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes.
[]
CVE-2021-30668
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.4. A person with physical access to a Mac may be able to bypass Login Window during a software update.
[ "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" ]
CVE-2010-3220
Unspecified vulnerability in Microsoft Word 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Parsing Vulnerability."
[ "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "cpe:2.3:a:microsoft:word:2002:sp3:*:*:*:*:*:*" ]
CVE-2021-46813
Vulnerability of residual files not being deleted after an update in the ChinaDRM module. Successful exploitation of this vulnerability may affect availability.
[ "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
CVE-2023-40631
In Dialer, there is a possible missing permission check. This could lead to local information disclosure with System execution privileges needed
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
GHSA-66mc-4v3r-qwh3
In Etherpad < 1.8.3, a specially crafted URI would raise an unhandled exception in the cache mechanism and cause a denial of service (crash the instance).
[]
CVE-2022-40784
Unlimited strcpy on user input when setting a locale file leads to stack buffer overflow in mIPC camera firmware 5.3.1.2003161406.
[ "cpe:2.3:o:mipcm:mipc_camera_firmware:5.3.1.2003161406:*:*:*:*:*:*:*", "cpe:2.3:h:mipcm:mipc_camera:-:*:*:*:*:*:*:*" ]
CVE-2022-22262
ASUS Armoury Crate & Aura Creator Installer之ROG Live Service - Improper Link Resolution Before File Access
ROG Live Service’s function for deleting temp files created by installation has an improper link resolution before file access vulnerability. Since this function does not validate the path before deletion, an unauthenticated local attacker can create an unexpected symbolic link to system file path, to delete arbitrary system files and disrupt system service.
[ "cpe:2.3:a:asus:rog_live_service:*:*:*:*:*:*:*:*" ]
CVE-2024-30036
Windows Deployment Services Information Disclosure Vulnerability
Windows Deployment Services Information Disclosure Vulnerability
[ "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*" ]
GHSA-6j2g-pgmq-rm4f
Windows Performance Monitor in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an information disclosure vulnerability due to the way it parses XML input, aka "Windows Performance Monitor Information Disclosure Vulnerability".
[]
GHSA-8h63-79mj-3p3q
Memory leak in passwd 0.68 allows local users to cause a denial of service (memory consumption) via a large number of failed read attempts from the password buffer.
[]
CVE-2023-3854
phpscriptpoint BloodBank POST Parameter search sql injection
A vulnerability classified as critical has been found in phpscriptpoint BloodBank 1.1. Affected is an unknown function of the file /search of the component POST Parameter Handler. The manipulation of the argument country/city/blood_group_id leads to sql injection. It is possible to launch the attack remotely. VDB-235206 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:phpscriptpoint:bloodbank:1.1:*:*:*:*:*:*:*" ]
GHSA-rc9q-9gjh-f3q6
In the Linux kernel, the following vulnerability has been resolved:ice: Fix potential memory leak in ice_gnss_tty_write()The ice_gnss_tty_write() return directly if the write_buf alloc failed, leaking the cmd_buf.Fix by free cmd_buf if write_buf alloc failed.
[]
GHSA-qm4j-q6jh-qw3p
In the Linux kernel, the following vulnerability has been resolved:iommu/amd: Fix I/O page table memory leakThe current logic updates the I/O page table mode for the domain before calling the logic to free memory used for the page table. This results in IOMMU page table memory leak, and can be observed when launching VM w/ pass-through devices.Fix by freeing the memory used for page table before updating the mode.
[]
GHSA-cqrw-65hp-hpv3
jsonlint 1.0 is vulnerable to heap-buffer-overflow via /home/hjsz/jsonlint/src/lexer.
[]
GHSA-8832-m7jx-c7wv
Use of a hard-coded cryptographic key to encrypt password data in CLI configuration in FortiManager 6.2.3 and below may allow an attacker with access to the CLI configuration or the CLI backup file to decrypt the sensitive data, via knowledge of the hard-coded key.
[]
CVE-2019-1704
Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities
Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition. For more information about these vulnerabilities, see the Details section of this advisory.
[ "cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*" ]
CVE-2022-30820
In Wedding Management v1.0, there is an arbitrary file upload vulnerability in the picture upload point of "users_edit.php" file.
[ "cpe:2.3:a:wedding_management_system_project:wedding_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-v6q8-8wgx-8hm7
Croogo vulnerable to XSS in title field
A stored-self XSS exists in Croogo through v3.0.5, allowing an attacker to execute HTML or JavaScript code in a vulnerable Title field to /admin/blocks/blocks/edit/8.
[]
CVE-2017-15099
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
[ "cpe:2.3:a:postgresql:postgresql:9.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:9.6.5:*:*:*:*:*:*:*", "cpe:2.3:a:postgresql:postgresql:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2016-2104
Multiple cross-site scripting (XSS) vulnerabilities in Red Hat Satellite 5 allow remote attackers to inject arbitrary web script or HTML via (1) the label parameter to admin/BunchDetail.do; (2) the package_name, (3) search_subscribed_channels, or (4) channel_filter parameter to software/packages/NameOverview.do; or unspecified vectors related to (5) <input:hidden> or (6) <bean:message> tags.
[ "cpe:2.3:a:redhat:satellite:5.7:*:*:*:*:*:*:*" ]
GHSA-cr7j-rwmv-vgch
Duplicate Advisory: aimeos-core arbitrary file upload vulnerability
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-rhc2-23c2-ww7c. This link is maintained to preserve external references.Original DescriptionAn arbitrary file upload vulnerability in the image upload function of aimeos-core v2024.04 allows attackers to execute arbitrary code via uploading a crafted PHP file.
[]
CVE-2024-49241
WordPress Tito plugin <= 2.3 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tady Walsh Tito allows DOM-Based XSS.This issue affects Tito: from n/a through 2.3.
[ "cpe:2.3:a:tadywalsh:tito:*:*:*:*:*:wordpress:*:*" ]
CVE-2005-4204
Cross-site scripting (XSS) vulnerability in LogiSphere 0.9.9j allows remote attackers to inject arbitrary Javascript via the msg command. NOTE: due to lack of appropriate details by the original researcher, it is unclear whether this issue is distinct from the msg DoS.
[ "cpe:2.3:a:logisphere:logisphere:0.9.9j:*:*:*:*:*:*:*" ]
GHSA-mq5w-h63c-48mj
Studio-42 eLfinder 2.1.62 contains a filename restriction bypass leading to a persistent Cross-site Scripting (XSS) vulnerability.
[]
CVE-2021-32714
Integer Overflow in Chunked Transfer-Encoding
hyper is an HTTP library for Rust. In versions prior to 0.14.10, hyper's HTTP server and client code had a flaw that could trigger an integer overflow when decoding chunk sizes that are too big. This allows possible data loss, or if combined with an upstream HTTP proxy that allows chunk sizes larger than hyper does, can result in "request smuggling" or "desync attacks." The vulnerability is patched in version 0.14.10. Two possible workarounds exist. One may reject requests manually that contain a `Transfer-Encoding` header or ensure any upstream proxy rejects `Transfer-Encoding` chunk sizes greater than what fits in 64-bit unsigned integers.
[ "cpe:2.3:a:hyper:hyper:*:*:*:*:*:rust:*:*" ]
CVE-2021-20733
Improper authorization in handler for custom URL scheme vulnerability in あすけんダイエット (asken diet) for Android versions from v.3.0.0 to v.4.2.x allows a remote attacker to lead a user to access an arbitrary website via the vulnerable App.
[ "cpe:2.3:a:asken:asken:*:*:*:*:*:android:*:*" ]
CVE-2023-37932
An improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in FortiVoiceEntreprise version 7.0.0 and before 6.4.7 allows an authenticated attacker to read arbitrary files from the system via sending crafted HTTP or HTTPS requests
[ "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortivoice:7.0.0:*:*:*:*:*:*:*" ]
CVE-2006-6340
keystone.exe in nVIDIA nView allows attackers to cause a denial of service via a long command line argument. NOTE: it is not clear whether this issue crosses security boundaries. If not, then this is not a vulnerability.
[ "cpe:2.3:a:nvidia:nview:*:*:*:*:*:*:*:*" ]
GHSA-w9wh-crfh-q6jv
Multiple cross-site scripting (XSS) vulnerabilities in Dolibarr 3.1.0 allow remote attackers to inject arbitrary web script or HTML via (1) the username parameter in a setup action to admin/company.php, or the PATH_INFO to (2) admin/security_other.php, (3) admin/events.php, or (4) admin/user.php.
[]
GHSA-g3jm-r39g-546q
Cross-site scripting (XSS) vulnerability in forgot.php in AudioShare 2.0.2 allows remote attackers to inject arbitrary web script or HTML via the email parameter.
[]
CVE-2020-0713
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0674, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0767.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*" ]
GHSA-hmg3-h6wx-fmc2
** DISPUTED ** PHP remote file inclusion vulnerability in form/db_form/employee.php in PHPortal 0.2.7 allows remote attackers to execute arbitrary PHP code via a URL in the DOCUMENT_ROOT parameter. NOTE: this issue is disputed by CVE, since DOCUMENT_ROOT cannot be modified by an attacker.
[]
GHSA-qxh2-x3x4-mxxw
Weak Password Requirements in GitHub repository weseek/growi prior to v5.0.0.
[]
CVE-2009-3338
Stack-based buffer overflow in EffectMatrix (E.M.) Magic Morph 1.95b allows remote attackers to execute arbitrary code via a long string in a .mor file.
[ "cpe:2.3:a:effectmatrix:magic_morph:1.95b:*:*:*:*:*:*:*" ]
GHSA-pwwc-8qxc-5w7f
In the Linux kernel, the following vulnerability has been resolved:net: qrtr: Avoid potential use after free in MHI sendIt is possible that the MHI ul_callback will be invoked immediately following the queueing of the skb for transmission, leading to the callback decrementing the refcount of the associated sk and freeing the skb.As such the dereference of skb and the increment of the sk refcount must happen before the skb is queued, to avoid the skb to be used after free and potentially the sk to drop its last refcount..
[]
CVE-2007-1606
Multiple cross-site scripting (XSS) vulnerabilities in w-Agora (Web-Agora) allow remote attackers to inject arbitrary web script or HTML via (1) the showuser parameter to profile.php, the (2) search_forum or (3) search_user parameter to search.php, or (4) the userid parameter to change_password.php.
[ "cpe:2.3:a:w-agora:w-agora:4.2.1:*:*:*:*:*:*:*" ]
CVE-2018-17481
Incorrect object lifecycle handling in PDFium in Google Chrome prior to 71.0.3578.98 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_desktop:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_server:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:linux_workstation:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
GHSA-h7wf-jg4f-x2wc
TYPO3 vulnerable to authentication bypass via leveraging knowledge of password hash
The Authentication component in TYPO3 before 6.2, when salting for password hashing is disabled, does not require knowledge of the cleartext password if the password hash is known, which allows remote attackers to bypass authentication and gain access to the backend by leveraging knowledge of a password hash.
[]
GHSA-fhxx-pw5c-g2gc
WebKit.dll in WebKit, as used in Safari.exe 4.531.9.1 in Apple Safari, allows remote attackers to cause a denial of service (application crash) via JavaScript that writes <marquee> sequences in an infinite loop.
[]
GHSA-w373-phfp-m2jq
In the Linux kernel, the following vulnerability has been resolved:mptcp: fix TCP options overflow.Syzbot reported the following splat:Oops: general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN PTI KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f] CPU: 1 UID: 0 PID: 5836 Comm: sshd Not tainted 6.13.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/25/2024 RIP: 0010:_compound_head include/linux/page-flags.h:242 [inline] RIP: 0010:put_page+0x23/0x260 include/linux/mm.h:1552 Code: 90 90 90 90 90 90 90 55 41 57 41 56 53 49 89 fe 48 bd 00 00 00 00 00 fc ff df e8 f8 5e 12 f8 49 8d 5e 08 48 89 d8 48 c1 e8 03 <80> 3c 28 00 74 08 48 89 df e8 8f c7 78 f8 48 8b 1b 48 89 de 48 83 RSP: 0000:ffffc90003916c90 EFLAGS: 00010202 RAX: 0000000000000001 RBX: 0000000000000008 RCX: ffff888030458000 RDX: 0000000000000100 RSI: 0000000000000000 RDI: 0000000000000000 RBP: dffffc0000000000 R08: ffffffff898ca81d R09: 1ffff110054414ac R10: dffffc0000000000 R11: ffffed10054414ad R12: 0000000000000007 R13: ffff88802a20a542 R14: 0000000000000000 R15: 0000000000000000 FS: 00007f34f496e800(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f9d6ec9ec28 CR3: 000000004d260000 CR4: 00000000003526f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: <TASK> skb_page_unref include/linux/skbuff_ref.h:43 [inline] __skb_frag_unref include/linux/skbuff_ref.h:56 [inline] skb_release_data+0x483/0x8a0 net/core/skbuff.c:1119 skb_release_all net/core/skbuff.c:1190 [inline] __kfree_skb+0x55/0x70 net/core/skbuff.c:1204 tcp_clean_rtx_queue net/ipv4/tcp_input.c:3436 [inline] tcp_ack+0x2442/0x6bc0 net/ipv4/tcp_input.c:4032 tcp_rcv_state_process+0x8eb/0x44e0 net/ipv4/tcp_input.c:6805 tcp_v4_do_rcv+0x77d/0xc70 net/ipv4/tcp_ipv4.c:1939 tcp_v4_rcv+0x2dc0/0x37f0 net/ipv4/tcp_ipv4.c:2351 ip_protocol_deliver_rcu+0x22e/0x440 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x341/0x5f0 net/ipv4/ip_input.c:233 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5785 process_backlog+0x662/0x15b0 net/core/dev.c:6117 __napi_poll+0xcb/0x490 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x89b/0x1240 net/core/dev.c:7074 handle_softirqs+0x2d4/0x9b0 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0xf7/0x220 kernel/softirq.c:662 irq_exit_rcu+0x9/0x30 kernel/softirq.c:678 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0x57/0xc0 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 RIP: 0033:0x7f34f4519ad5 Code: 85 d2 74 0d 0f 10 02 48 8d 54 24 20 0f 11 44 24 20 64 8b 04 25 18 00 00 00 85 c0 75 27 41 b8 08 00 00 00 b8 0f 01 00 00 0f 05 <48> 3d 00 f0 ff ff 76 75 48 8b 15 24 73 0d 00 f7 d8 64 89 02 48 83 RSP: 002b:00007ffec5b32ce0 EFLAGS: 00000246 RAX: 0000000000000001 RBX: 00000000000668a0 RCX: 00007f34f4519ad5 RDX: 00007ffec5b32d00 RSI: 0000000000000004 RDI: 0000564f4bc6cae0 RBP: 0000564f4bc6b5a0 R08: 0000000000000008 R09: 0000000000000000 R10: 00007ffec5b32de8 R11: 0000000000000246 R12: 0000564f48ea8aa4 R13: 0000000000000001 R14: 0000564f48ea93e8 R15: 00007ffec5b32d68 </TASK>Eric noted a probable shinfo->nr_frags corruption, which indeed occurs.The root cause is a buggy MPTCP option len computation in some circumstances: the ADD_ADDR option should be mutually exclusive with DSS since the blamed commit.Still, mptcp_established_options_add_addr() tries to set the relevant info in mptcp_out_options, if ---truncated---
[]
CVE-2023-52380
Vulnerability of improper access control in the email module.Successful exploitation of this vulnerability may affect service confidentiality.
[]
GHSA-96m6-2664-p2j5
Travel Website v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'hotelIDHidden' parameter of the booking.php resource does not validate the characters received and they are sent unfiltered to the database.
[]
GHSA-828c-xpc3-jqw5
DMM Movie Player App for Android before 1.2.1, and DMM Movie Player App for iPhone/iPad before 2.1.3 does not verify SSL certificates.
[]
GHSA-7grw-xfx6-qhx6
Joplin Cross-site Scripting vulnerability
Joplin before 2.11.5 allows XSS via a USE element in an SVG document.
[]
GHSA-hmf2-cp2m-j8x7
An elevation of privilege vulnerability exists in the way the Windows Now Playing Session Manager handles objects in memory, aka 'Windows Now Playing Session Manager Elevation of Privilege Vulnerability'.
[]
CVE-2023-24157
A command injection vulnerability in the serverIp parameter in the function updateWifiInfo of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet.
[ "cpe:2.3:o:totolink:t8_firmware:v4.1.5cu:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*" ]
CVE-2007-0117
DiskManagementTool in the DiskManagement.framework 92.29 on Mac OS X 10.4.8 does not properly validate Bill of Materials (BOM) files, which allows attackers to gain privileges via a BOM file under /Library/Receipts/, which triggers arbitrary file permission changes upon execution of a diskutil permission repair operation.
[ "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*" ]
CVE-2012-3819
Stack consumption vulnerability in dartwebserver.dll 1.9 and earlier, as used in Dart PowerTCP WebServer for ActiveX and other products, allows remote attackers to cause a denial of service (daemon crash) via a long request.
[ "cpe:2.3:a:dart:powertcp_activex:-:*:*:*:*:*:*:*" ]
CVE-2013-4361
The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.
[ "cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:o:xen:xen:4.3.0:*:*:*:*:*:*:*" ]
GHSA-829c-jp2v-3j35
Deserialization of Untrusted Data vulnerability in magepeopleteam WpTravelly allows Object Injection. This issue affects WpTravelly: from n/a through 1.8.7.
[]
CVE-2014-2827
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2774, CVE-2014-2820, CVE-2014-2826, and CVE-2014-4063.
[ "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
CVE-2019-3422
The Sec Consult Security Lab reported an information disclosure vulnerability in MF910S product to ZTE PSIRT in October 2019. Through the analysis of related product team, the information disclosure vulnerability is confirmed. The MF910S product's one-click upgrade tool can obtain the Telnet remote login password in the reverse way. If Telnet is opened, the attacker can remotely log in to the device through the cracked password, resulting in information leakage. The MF910S was end of service on October 23, 2019, ZTE recommends users to choose new products for the purpose of better security.
[ "cpe:2.3:o:zte:mf910s_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:zte:mf910s:-:*:*:*:*:*:*:*" ]
GHSA-vhqq-r65q-2hff
An Integer-based buffer overflow vulnerability in the SonicOS via IPSec allows a remote attacker in specific conditions to cause Denial of Service (DoS) and potentially execute arbitrary code by sending a specially crafted IKEv2 payload.
[]
CVE-2008-7183
PHP remote file inclusion vulnerability in eva/index.php in EVA CMS 2.3.1, when register_globals is enabled, allows remote attackers to execute arbitrary PHP code via a URL in the eva[caminho] parameter to index.php.
[ "cpe:2.3:a:evacms:eva_cms:2.3.1:*:*:*:*:*:*:*" ]
CVE-2013-3830
Unspecified vulnerability in the Hyperion Strategic Finance component in Oracle Hyperion 11.1.2.1 and 11.1.2.2 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors related to Server.
[ "cpe:2.3:a:oracle:hyperion_interactive_reporting:11.1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hyperion_interactive_reporting:11.1.2.2:*:*:*:*:*:*:*" ]
GHSA-ghmj-7h5q-q89g
showCode.php in xml2owl 0.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the path parameter.
[]
GHSA-9hm7-j2jc-wh96
The Stray Random Quotes WordPress plugin through 1.9.9 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
CVE-2019-6265
The Scripting and AutoUpdate functionality in Cordaware bestinformed Microsoft Windows client versions before 6.2.1.0 are affected by insecure implementations which allow remote attackers to execute arbitrary commands and escalate privileges.
[ "cpe:2.3:a:cordaware:bestinformed:*:*:*:*:*:windows:*:*" ]
CVE-2010-0598
Cisco Mediator Framework 1.5.1 before 1.5.1.build.14-eng, 2.2 before 2.2.1.dev.1, and 3.0 before 3.0.9.release.1 on the Cisco Network Building Mediator NBM-2400 and NBM-4800 and the Richards-Zeta Mediator 2500 does not encrypt HTTP sessions from operator workstations, which allows remote attackers to discover Administrator credentials by sniffing the network, aka Bug ID CSCtb83631.
[ "cpe:2.3:a:cisco:mediator_framework:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:mediator_framework:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:mediator_framework:3.0.8:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_building_mediator_nbm-2400:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:network_building_mediator_nbm-4800:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:richards-zeta_mediator_2500:*:*:*:*:*:*:*:*" ]
GHSA-22hp-gvgq-7pg5
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Console). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.3.0 and 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle WebLogic Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data as well as unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
[]
CVE-2017-2423
An issue was discovered in certain Apple products. iOS before 10.3 is affected. macOS before 10.12.4 is affected. The issue involves the "Security" component. It allows remote attackers to bypass intended access restrictions by leveraging a successful result from a SecKeyRawVerify API call with an empty signature.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-g4q7-4cgj-g72g
Heap-based buffer overflow in novell-tftp.exe in Novell ZENworks Configuration Manager (ZCM) 10.3.1, 10.3.2, and 11.0, and earlier versions, allows remote attackers to execute arbitrary code via a long TFTP request.
[]
GHSA-jqjg-g4gc-qvcw
In fixUpIncomingShortcutInfo of ShortcutService.java, there is a possible way to view another user's image due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[]
GHSA-5pj2-wxrp-8h2h
Heap-based buffer overflow vulnerability in sheifd_get_info_image function in libsimba library prior to SMR Apr-2022 Release 1 allows code execution by remote attacker.
[]
GHSA-84pw-hw22-9v6h
A blind SQL Injection vulnerability in Nozomi Networks Guardian and CMC, due to improper input validation in the sorting parameter, allows an authenticated attacker to execute arbitrary SQL queries on the DBMS used by the web application.Authenticated users can extract arbitrary information from the DBMS in an uncontrolled way.
[]
GHSA-jc3c-7crw-rhq4
Use after free in WebRTC in Google Chrome prior to 89.0.4389.90 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[]
CVE-2015-6707
The ANSendForReview method in Adobe Reader and Acrobat 10.x before 10.1.16 and 11.x before 11.0.13, Acrobat and Acrobat Reader DC Classic before 2015.006.30094, and Acrobat and Acrobat Reader DC Continuous before 2015.009.20069 on Windows and OS X allows attackers to bypass JavaScript API execution restrictions via unspecified vectors, a different vulnerability than CVE-2015-6708, CVE-2015-6709, CVE-2015-6710, CVE-2015-6711, CVE-2015-6712, CVE-2015-6713, CVE-2015-6714, CVE-2015-6715, CVE-2015-6716, CVE-2015-6717, CVE-2015-6718, CVE-2015-6719, CVE-2015-6720, CVE-2015-6721, CVE-2015-6722, CVE-2015-6723, CVE-2015-6724, CVE-2015-6725, CVE-2015-7614, CVE-2015-7616, CVE-2015-7618, CVE-2015-7619, CVE-2015-7620, and CVE-2015-7623.
[ "cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-4q97-fh3f-j294
Prototype Pollution in tiny-conf
All versions of package tiny-conf up to and including version 1.1.0 are vulnerable to Prototype Pollution via the set function.
[]
CVE-2021-21980
The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.
[ "cpe:2.3:a:vmware:cloud_foundation:3.0:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_1b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_1c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_1d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_1e:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_1g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_2b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_2d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_2g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3d:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3k:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3n:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3p:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.5:update_3q:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:-:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_1:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_1b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_2:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_2a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_2c:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3a:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3b:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3f:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3g:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3j:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3l:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3m:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3n:*:*:*:*:*:*", "cpe:2.3:a:vmware:vcenter_server:6.7:update_3o:*:*:*:*:*:*" ]
CVE-2017-6648
A vulnerability in the Session Initiation Protocol (SIP) of the Cisco TelePresence Codec (TC) and Collaboration Endpoint (CE) Software could allow an unauthenticated, remote attacker to cause a TelePresence endpoint to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a lack of flow-control mechanisms within the software. An attacker could exploit this vulnerability by sending a flood of SIP INVITE packets to the affected device. An exploit could allow the attacker to impact the availability of services and data of the device, including a complete DoS condition. This vulnerability affects the following Cisco TC and CE platforms when running software versions prior to TC 7.3.8 and CE 8.3.0. Cisco Bug IDs: CSCux94002.
[ "cpe:2.3:a:cisco:telepresence_ce_software:8.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:3.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:4.2_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.0.2-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.3-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.4-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.5-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.6-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.7-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1.13:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:5.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.0-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.1-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.0-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.1-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.2-cucm:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:6.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:7.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:telepresence_tc_software:8.2.1:*:*:*:*:*:*:*" ]
CVE-2015-3184
mod_authz_svn in Apache Subversion 1.7.x before 1.7.21 and 1.8.x before 1.8.14, when using Apache httpd 2.4.x, does not properly restrict anonymous access, which allows remote anonymous users to read hidden files via the path name.
[ "cpe:2.3:a:apple:xcode:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.17:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.7.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:subversion:1.8.13:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:http_server:2.4.16:*:*:*:*:*:*:*" ]
GHSA-79x9-x734-8qxj
Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2718, CVE-2013-2719, CVE-2013-2720, CVE-2013-2721, CVE-2013-2722, CVE-2013-2723, CVE-2013-2725, CVE-2013-2726, CVE-2013-2731, CVE-2013-2734, CVE-2013-2735, CVE-2013-2736, CVE-2013-3337, CVE-2013-3338, CVE-2013-3339, CVE-2013-3340, and CVE-2013-3341.
[]
CVE-2021-39796
In HarmfulAppWarningActivity of HarmfulAppWarningActivity.java, there is a possible way to trick victim to install harmful app due to a tapjacking/overlay attack. This could lead to local escalation of privilege with User execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-205595291
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*" ]
CVE-2007-4171
SQL injection vulnerability in komentar.php in the Forum Module for auraCMS (Modul Forum Sederhana) allows remote attackers to execute arbitrary SQL commands via the id parameter to the default URI. NOTE: some of these details are obtained from third party information.
[ "cpe:2.3:a:auracms:modul_forum_sederhana:*:*:*:*:*:*:*:*" ]
CVE-2009-0960
The Mail component in Apple iPhone OS 1.0 through 2.2.1 and iPhone OS for iPod touch 1.1 through 2.2.1 does not provide an option to disable remote image loading in HTML email, which allows remote attackers to determine the device address and when an e-mail is read via an HTML email containing an image URL.
[ "cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*" ]
GHSA-wrfh-r93c-gw3f
On open-vsx.org http://open-vsx.org/  it was possible to run an arbitrary build scripts for auto-published extensions because of missing sandboxing of CI job runs. An attacker who had access to an existing extension could take over the service account of the marketplace. The issue has been fixed on June 24th, 2025 and the vulnerable code present in the publish-extension code repository.
[]
CVE-2021-34391
Trusty contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow through a specific SMC call that is triggered by the user, which may lead to denial of service.
[ "cpe:2.3:o:nvidia:jetson_linux:*:*:*:*:*:*:*:*", "cpe:2.3:h:nvidia:jetson_tx1:-:*:*:*:*:*:*:*" ]
CVE-2025-27668
Vasion Print (formerly PrinterLogic) before Virtual Appliance Host 22.0.843 Application 20.0.1923 allows Arbitrary Content Inclusion via Iframe OVE-20230524-0012.
[]
GHSA-pmhh-pxq2-c7gj
Pivotal Operations Manager, 2.1.x versions prior to 2.1.20, 2.2.x versions prior to 2.2.16, 2.3.x versions prior to 2.3.10, 2.4.x versions prior to 2.4.3, contains a reflected cross site scripting vulnerability. A remote user that is able to convince an Operations Manager user to interact with malicious content could execute arbitrary JavaScript in the user's browser.
[]
GHSA-g8qf-h77h-c3gw
Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 11.0, Firefox ESR 10.x before 10.0.4, Thunderbird 5.0 through 11.0, Thunderbird ESR 10.x before 10.0.4, and SeaMonkey before 2.9 allow remote attackers to inject arbitrary web script or HTML via the (1) ISO-2022-KR or (2) ISO-2022-CN character set.
[]
CVE-2007-2429
ManageEngine PasswordManager Pro (PMP) allows remote attackers to obtain administrative access to a database by injecting a certain command line for the mysql program, as demonstrated by the "-port 2345" and "-u root" arguments. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[ "cpe:2.3:a:manageengine:passwordmanager_pro:*:*:*:*:*:*:*:*" ]
GHSA-q5ch-j8vf-q4vm
LVRTC eParakstitajs 3.0 (1.3.0) and edoc-libraries-2.5.4_01 allow attackers to write to arbitrary files via crafted EDOC files.
[]
GHSA-wfmf-9fg9-6h9p
An input validation issue was addressed with improved input validation. This issue affected versions prior to macOS Mojave 10.14.
[]
CVE-2019-12688
Cisco Firepower Management Center Remote Code Execution Vulnerability
A vulnerability in the web UI of the Cisco Firepower Management Center (FMC) could allow an authenticated, remote attacker to execute arbitrary commands on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted input to the web UI. A successful exploit could allow the attacker to execute arbitrary commands within the affected device.
[ "cpe:2.3:a:cisco:secure_firewall_management_center:6.2.2:*:*:*:*:*:*:*" ]
GHSA-2xmq-mr23-jvxq
Multiple cross-site scripting (XSS) vulnerabilities in MySQLDumper 1.24.4 allow remote attackers to inject arbitrary web script or HTML via the (1) page parameter to index.php, (2) phase parameter to install.php, (3) tablename or (4) dbid parameter to sql.php, or (5) filename parameter to restore.php in learn/cubemail/.
[]
CVE-2017-9191
libautotrace.a in AutoTrace 0.31.1 has a heap-based buffer overflow in the rle_fread function in input-tga.c:252:15.
[ "cpe:2.3:a:autotrace_project:autotrace:0.31.1:*:*:*:*:*:*:*" ]
CVE-2021-21887
A stack-based buffer overflow vulnerability exists in the Web Manager SslGenerateCSR functionality of Lantronix PremierWave 2050 8.9.0.0R4 (in QEMU). A specially crafted HTTP request can lead to remote code execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[ "cpe:2.3:o:lantronix:premierwave_2050_firmware:8.9.0.0:r4:*:*:*:*:*:*", "cpe:2.3:h:lantronix:premierwave_2050:-:*:*:*:*:*:*:*" ]
GHSA-639q-4j2p-pfqv
On the QFX3500 and QFX3600 platforms, the number of bytes collected from the RANDOM_INTERRUPT entropy source when the device boots up is insufficient, possibly leading to weak or duplicate SSH keys or self-signed SSL/TLS certificates. Entropy increases after the system has been up and running for some time, but immediately after boot, the entropy is very low. This issue only affects the QFX3500 and QFX3600 switches. No other Juniper Networks products or platforms are affected by this weak entropy vulnerability.
[]
CVE-2024-42150
net: txgbe: remove separate irq request for MSI and INTx
In the Linux kernel, the following vulnerability has been resolved: net: txgbe: remove separate irq request for MSI and INTx When using MSI or INTx interrupts, request_irq() for pdev->irq will conflict with request_threaded_irq() for txgbe->misc.irq, to cause system crash. So remove txgbe_request_irq() for MSI/INTx case, and rename txgbe_request_msix_irqs() since it only request for queue irqs. Add wx->misc_irq_domain to determine whether the driver creates an IRQ domain and threaded request the IRQs.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc5:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.10:rc6:*:*:*:*:*:*" ]
CVE-2011-1593
Multiple integer overflows in the next_pidmap function in kernel/pid.c in the Linux kernel before 2.6.38.4 allow local users to cause a denial of service (system crash) via a crafted (1) getdents or (2) readdir system call.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_aus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:5.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:lts:*:*:*" ]