Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2020-27825
A use-after-free flaw was found in kernel/trace/ring_buffer.c in Linux kernel (before 5.10-rc1). There was a race problem in trace_open and resize of cpu buffer running parallely on different cpus, may cause a denial of service problem (DOS). This flaw could even allow a local attacker with special user privilege to a kernel information leak threat.
[ "cpe:2.3:o:linux:linux_kernel:5.10:rc1:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:solidfire_baseboard_management_controller_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:solidfire_baseboard_management_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*" ]
CVE-2017-2182
Hands-on Vulnerability Learning Tool "AppGoat" for Web Application V3.0.2 and earlier allow remote attackers to obtain local files via unspecified vectors, a different vulnerability than CVE-2017-2179 and CVE-2017-2181.
[ "cpe:2.3:a:ipa:appgoat:*:*:*:*:*:*:*:*" ]
CVE-2024-45779
Grub2: fs/bfs: integer overflow leads to heap oob read in the bfs parser
An integer overflow flaw was found in the BFS file system driver in grub2. When reading a file with an indirect extent map, grub2 fails to validate the number of extent entries to be read. A crafted or corrupted BFS filesystem may cause an integer overflow during the file reading, leading to a heap of bounds read. As a consequence, sensitive data may be leaked, or grub2 will crash.
[ "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:8", "cpe:/o:redhat:enterprise_linux:9", "cpe:/a:redhat:openshift:4" ]
CVE-2010-3690
Multiple cross-site scripting (XSS) vulnerabilities in phpCAS before 1.1.3, when proxy mode is enabled, allow remote attackers to inject arbitrary web script or HTML via (1) a crafted Proxy Granting Ticket IOU (PGTiou) parameter to the callback function in client.php, (2) vectors involving functions that make getCallbackURL calls, or (3) vectors involving functions that make getURL calls.
[ "cpe:2.3:a:apereo:phpcas:*:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.18:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.19:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.20:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.21:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.22:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.4.23:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:apereo:phpcas:1.1.1:*:*:*:*:*:*:*" ]
CVE-2023-6240
Kernel: marvin vulnerability side-channel leakage in the rsa decryption operation
A Marvin vulnerability side-channel leakage was found in the RSA decryption operation in the Linux Kernel. This issue may allow a network attacker to decrypt ciphertexts or forge signatures, limiting the services that use that private key.
[ "cpe:/a:redhat:enterprise_linux:8::realtime", "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/o:redhat:enterprise_linux:8::baseos", "cpe:/a:redhat:enterprise_linux:8::crb", "cpe:/a:redhat:enterprise_linux:9::crb", "cpe:/o:redhat:enterprise_linux:9::baseos", "cpe:/a:redhat:enterprise_linux:9::nfv", "cpe:/a:redhat:enterprise_linux:9::realtime", "cpe:/a:redhat:enterprise_linux:9::appstream", "cpe:/o:redhat:rhel_eus:9.0::baseos", "cpe:/a:redhat:rhel_eus:9.0::appstream", "cpe:/a:redhat:rhel_eus:9.0::crb", "cpe:/a:redhat:rhel_eus:9.0::nfv", "cpe:/a:redhat:rhel_eus:9.0::realtime", "cpe:/a:redhat:rhel_eus:9.2::crb", "cpe:/a:redhat:rhel_eus:9.2::appstream", "cpe:/o:redhat:rhel_eus:9.2::baseos", "cpe:/a:redhat:rhel_eus:9.2::nfv", "cpe:/a:redhat:rhel_eus:9.2::realtime", "cpe:/o:redhat:enterprise_linux:6", "cpe:/o:redhat:enterprise_linux:7", "cpe:/o:redhat:enterprise_linux:9", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*" ]
CVE-2018-20877
cPanel before 74.0.8 allows self XSS in WHM Style Upload interface (SEC-437).
[ "cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*" ]
CVE-2024-13796
Post Grid and Gutenberg Blocks – ComboBlocks <= 2.3.6 - Unauthenticated User Information Exposure
The Post Grid and Gutenberg Blocks – ComboBlocks plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.3.6 via the /wp-json/post-grid/v2/get_users REST API This makes it possible for unauthenticated attackers to extract sensitive data including including emails and other user data.
[]
GHSA-q5wj-948j-qpw4
Cross-site scripting (XSS) vulnerability in the Web-Dorado Instagram Feed WD plugin before 1.3.1 for WordPress allows remote attackers to inject arbitrary web script or HTML by passing payloads in an Instagram profile's bio.
[]
CVE-2022-23471
containerd CRI stream server: Host memory exhaustion through terminal resize goroutine leak
containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.
[ "cpe:2.3:a:linuxfoundation:containerd:*:*:*:*:*:*:*:*" ]
CVE-2024-30272
Adobe Illustrator 2024 GIF file parsing Out-Of-Bound Write remote code execution vulnerabiity
Illustrator versions 28.3, 27.9.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
CVE-2025-20921
Out-of-bounds read in applying binary of text content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory.
[]
GHSA-gqrj-6wmm-3f3c
ImageMagick 7.0.6-6 has a memory leak vulnerability in ReadXCFImage in coders/xcf.c via a crafted xcf image file.
[]
CVE-2019-14272
In SilverStripe asset-admin 4.0, there is XSS in file titles managed through the CMS.
[ "cpe:2.3:a:silverstripe:silverstripe:*:*:*:*:*:*:*:*" ]
GHSA-678p-2fg5-j3m2
In WhatsUp Gold versions released before 2023.1, a stored cross-site scripting (XSS) vulnerability has been identified. It is possible for an attacker to craft a XSS payload and store that value within a device group.If a WhatsUp Gold user interacts with the crafted payload, the attacker would be able to execute malicious JavaScript within the context of the victims browser.
[]
CVE-2022-32974
An authenticated attacker could read arbitrary files from the underlying operating system of the scanner using a custom crafted compliance audit file without providing any valid SSH credentials.
[ "cpe:2.3:a:tenable:nessus:*:*:*:*:*:*:*:*" ]
CVE-2017-15217
ImageMagick 7.0.7-2 has a memory leak in ReadSGIImage in coders/sgi.c.
[ "cpe:2.3:a:imagemagick:imagemagick:7.0.7-2:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
GHSA-cwgh-vfcm-53f2
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FULL SERVICES FULL Customer allows PHP Local File Inclusion. This issue affects FULL Customer: from n/a through 3.1.26.
[]
GHSA-g4p4-g8hm-9prr
Direct static code injection vulnerability in the download module in Flatnuke 3 allows remote authenticated administrators to inject arbitrary PHP code into a description.it.php file in a subdirectory of Download/ by saving a description and setting fneditmode to 1. NOTE: unauthenticated remote attackers can exploit this by leveraging a cookie manipulation issue.
[]
GHSA-5rfp-9wcc-x567
Cross site scripting (XSS) vulnerability in Zoho ManageEngine ServiceDesk Plus 14 via the comment field when changing the credentials in the Assets.
[]
GHSA-76hp-qc2m-qh2g
An information disclosure vulnerability exists in the confctl_get_master_wlan functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted network packet can lead to information disclosure. An attacker can send packets to trigger this vulnerability.
[]
CVE-2019-18614
On the Cypress CYW20735 evaluation board, any data that exceeds 384 bytes is copied and causes an overflow. This is because the maximum BLOC buffer size for sending and receiving data is set to 384 bytes, but everything else is still configured to the usual size of 1092 (which was used for everything in the previous CYW20719 and later CYW20819 evaluation board). To trigger the overflow, an attacker can either send packets over the air or as unprivileged local user. Over the air, the minimal PoC is sending "l2ping -s 600" to the target address prior to any pairing. Locally, the buffer overflow is immediately triggered by opening an ACL or SCO connection to a headset. This occurs because, in WICED Studio 6.2 and 6.4, BT_ACL_HOST_TO_DEVICE_DEFAULT_SIZE and BT_ACL_DEVICE_TO_HOST_DEFAULT_SIZE are set to 384.
[ "cpe:2.3:o:cypress:cyw20735_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cypress:cyw20735:-:*:*:*:*:*:*:*" ]
CVE-2010-0405
Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.
[ "cpe:2.3:a:bzip:bzip2:*:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.0:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.0a:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.0b:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.0c:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5_a:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5_b:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5_c:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5_d:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5a:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5b:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5c:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9.5d:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9_a:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9_b:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:0.9_c:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bzip:bzip2:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:libzip2:libzip2:*:*:*:*:*:*:*:*" ]
CVE-2022-36510
H3C GR2200 MiniGR1A0V100R014 was discovered to contain a command injection vulnerability via the param parameter at DelL2tpLNSList.
[ "cpe:2.3:o:h3c:gr2200_firmware:minigr1a0v100r014:*:*:*:*:*:*:*", "cpe:2.3:h:h3c:gr2200:-:*:*:*:*:*:*:*" ]
GHSA-79f7-6jwc-94qw
jpeg-xl v0.3.2 is affected by a heap buffer overflow in /lib/jxl/coeff_order.cc ReadPermutation. When decoding a malicous jxl file using djxl, an attacker can trigger arbitrary code execution or a denial of service.
[]
CVE-2024-0073
CVE
NVIDIA GPU Display Driver for Windows contains a vulnerability in the kernel mode layer when the driver is performing an operation at a privilege level that is higher than the minimum level required. A successful exploit of this vulnerability may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
[ "cpe:2.3:a:nvidia:geforce:-:*:*:*:*:*:*:*", "cpe:2.3:a:nvidia:studio:-:*:*:*:*:*:*:*", "cpe:2.3:a:nvidia:tesla:-:*:*:*:*:*:*:*", "cpe:2.3:a:nvidia:quadro:-:*:*:*:*:*:*:*" ]
CVE-2014-4033
Cross-site scripting (XSS) vulnerability in libraries/includes/personal/profile.php in Epignosis eFront 3.6.14.4 allows remote attackers to inject arbitrary web script or HTML via the surname parameter to student.php.
[ "cpe:2.3:a:efrontlearning:efront:3.6.14.4:*:*:*:*:*:*:*" ]
CVE-2021-21806
An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.
[ "cpe:2.3:a:webkitgtk:webkitgtk:2.30.3:*:*:*:*:*:x64:*" ]
GHSA-qq53-8g57-9gr8
In dispatchGraphTerminationMessage() of packages/services/Car/computepipe/runner/graph/StreamSetObserver.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Android ID: A-170407229.
[]
GHSA-x3rq-33c5-7669
A vulnerability has been identified in Simcenter Femap V2020.2 (All versions), Simcenter Femap V2021.1 (All versions). Affected application contains an out of bounds write past the end of an allocated structure while parsing specially crafted NEU files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-15050)
[]
CVE-2024-49602
Dell PowerScale OneFS Versions 8.2.2.x through 9.8.0.x contain an improper resource unlocking vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading to denial of service.
[ "cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*", "cpe:2.3:a:dell:powerscale_onefs:9.8.0.0:*:*:*:*:*:*:*" ]
GHSA-7rq4-qc4c-57j9
A vulnerability was found in itsourcecode Online Food Ordering System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /purchase.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-269420.
[]
CVE-2025-25280
Buffer overflow vulnerability exists in FutureNet AS series (Industrial Routers) and FA series (Protocol Conversion Machine) provided by Century Systems Co., Ltd. If this vulnerability is exploited, a remote unauthenticated attacker may reboot the device by sending a specially crafted request.
[]
GHSA-rgmc-25hj-7gpf
IrfanView DXF File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.The specific flaw exists within the parsing of DXF files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24780.
[]
GHSA-mfgj-27xx-9qxp
In Window Manager, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local information disclosure with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153654357
[]
CVE-2022-42281
NVIDIA DGX A100 contains a vulnerability in SBIOS in the FsRecovery, which may allow a highly privileged local attacker to cause an out-of-bounds write, which may lead to code execution, denial of service, compromised integrity, and information disclosure.
[ "cpe:2.3:o:nvidia:dgx_a100_firmware:*:*:*:*:sbios:*:*:*", "cpe:2.3:h:nvidia:dgx_a100:-:*:*:*:*:*:*:*" ]
GHSA-fc95-v3hf-fhc9
In libming 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the readUInt32 function (util/read.c). Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file.
[]
CVE-2004-1397
Cross-site scripting (XSS) vulnerability in UseModWiki 1.0 allows remote attackers to inject arbitrary web script or HTML via an argument to wiki.pl.
[ "cpe:2.3:a:usemod:usemodwiki:1.0:*:*:*:*:*:*:*" ]
GHSA-64q7-7v79-hm2j
InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-pxgp-xp3x-chh5
Alarm.com ADC-V522IR 0100b9 devices have Incorrect Access Control, a different issue than CVE-2018-19588. This occurs because of incorrect protection of VPN certificates (used for initiating a VPN session to the Alarm.com infrastructure) on the local camera device.
[]
GHSA-hx95-xh6x-vgcq
A vulnerability was found in Campcodes Online Shopping Portal 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/category.php. The manipulation of the argument Category leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-7qfx-rm3x-wjcq
Symantec Messaging Gateway (SMG) before 10.0 allows remote authenticated users to modify the web application by leveraging access to the management interface.
[]
CVE-2006-3608
The Gallery module in Simone Vellei Flatnuke 2.5.7 and earlier, when Gallery uploads are enabled, does not restrict the extensions of uploaded files that begin with a GIF header, which allows remote authenticated users to execute arbitrary PHP code via an uploaded .php file.
[ "cpe:2.3:a:flatnuke:flatnuke:*:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:1.8:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:2.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:2.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:flatnuke:flatnuke:2.5.6:*:*:*:*:*:*:*" ]
GHSA-6fv7-4pjh-r37q
The Quran multilanguage Text & Audio plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'sourate' and 'lang' parameter in all versions up to, and including, 2.3.21 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
CVE-2024-36268
Apache InLong TubeMQ Client: Remote Code Execution vulnerability
Improper Control of Generation of Code ('Code Injection') vulnerability in Apache InLong. This issue affects Apache InLong: from 1.10.0 through 1.12.0, which could lead to Remote Code Execution. Users are advised to upgrade to Apache InLong's 1.13.0 or cherry-pick [1] to solve it. [1]  https://github.com/apache/inlong/pull/10251
[ "cpe:2.3:a:apache_software_foundation:apache_inlong:*:*:*:*:*:*:*:*", "cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*" ]
CVE-2012-2771
Unspecified vulnerability in FFmpeg before 0.10.3 has unknown impact and attack vectors, a different vulnerability than CVE-2012-2773, CVE-2012-2778, CVE-2012-2780, and CVE-2012-2781.
[ "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*" ]
GHSA-v2qx-4m4h-cjmg
Certain Lexmark devices through 2023-02-19 mishandle Input Validation (issue 1 of 4).
[]
CVE-2023-25991
WordPress RegistrationMagic Plugin <= 5.1.9.2 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in RegistrationMagic plugin <= 5.1.9.2 versions.
[ "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*" ]
CVE-2006-5349
Unspecified vulnerability in Oracle HTTP Server 9.2.0.7, when running on HP Tru64 UNIX, has unknown impact and remote attack vectors related to HTTPS and SSL, aka Vuln# OHS07.
[ "cpe:2.3:a:oracle:http_server:9.2.0.7:*:*:*:*:*:*:*" ]
CVE-2025-47774
Vyper's `slice()` may elide side-effects when output length is 0
Vyper is the Pythonic Programming Language for the Ethereum Virtual Machine. In versions up to and including 0.4.2rc1, the `slice()` builtin can elide side effects when the output length is 0, and the source bytestring is a builtin (`msg.data` or `<address>.code`). The reason is that for these source locations, the check that `length >= 1` is skipped. The result is that a 0-length bytestring constructed with slice can be passed to `make_byte_array_copier`, which elides evaluation of its source argument when the max length is 0. The impact is that side effects in the `start` argument may be elided when the `length` argument is 0, e.g. `slice(msg.data, self.do_side_effect(), 0)`. The fix in pull request 4645 disallows any invocation of `slice()` with length 0, including for the ad hoc locations discussed in this advisory. The fix is expected to be part of version 0.4.2.
[]
CVE-2010-0750
pkexec.c in pkexec in libpolkit in PolicyKit 0.96 allows local users to determine the existence of arbitrary files via the argument.
[ "cpe:2.3:a:freedesktop:policykit:0.96:*:*:*:*:*:*:*" ]
GHSA-4w6g-25w8-c8vc
** DISPUTED ** SQL injection vulnerability in the 'reorder' method in Ruby on Rails 5.1.4 and earlier allows remote attackers to execute arbitrary SQL commands via the 'name' parameter. NOTE: The vendor disputes this issue because the documentation states that this method is not intended for use with untrusted input.
[]
GHSA-xjr9-2wf2-3v4w
Subrion CMS Cross-site scripting in search
A cross-site scripting (XSS) vulnerability in Subrion CMS before 3.2.3 allows remote attackers to inject arbitrary web script or HTML via the `PATH_INFO` to `subrion/search/`.
[]
CVE-2024-13832
Ultra Addons Lite for Elementor <= 1.1.8 - Authenticated (Contributor+) Restricted Post Disclosure
The Ultra Addons Lite for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.1.8 via the 'ut_elementor' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, or draft posts that they should not have access to.
[]
GHSA-prcq-9p67-4w6h
In the Linux kernel, the following vulnerability has been resolved:ASoC: SOF: Add some bounds checking to firmware dataSmatch complains about "head->full_size - head->header_size" can underflow. To some extent, we're always going to have to trust the firmware a bit. However, it's easy enough to add a check for negatives, and let's add a upper bounds check as well.
[]
GHSA-2pc3-m7w9-6vv5
The Simple Download Monitor WordPress plugin before 3.9.5 does not escape the 1) sdm_active_tab GET parameter and 2) sdm_stats_start_date/sdm_stats_end_date POST parameters before outputting them back in attributes, leading to Reflected Cross-Site Scripting issues
[]
CVE-2024-42248
tty: serial: ma35d1: Add a NULL check for of_node
In the Linux kernel, the following vulnerability has been resolved: tty: serial: ma35d1: Add a NULL check for of_node The pdev->dev.of_node can be NULL if the "serial" node is absent. Add a NULL check to return an error in such cases.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
GHSA-c77q-62vf-hxq5
The Easy Digital Downloads (EDD) Software Licensing extension for WordPress, as used with EDD 1.8.x before 1.8.7, 1.9.x before 1.9.10, 2.0.x before 2.0.5, 2.1.x before 2.1.11, 2.2.x before 2.2.9, and 2.3.x before 2.3.7, has XSS because add_query_arg is misused.
[]
GHSA-j923-f665-9rqm
Rescue Dispatch Management System v1.0 is vulnerable to SQL Injection via rdms/admin/teams/view_team.php?id=.
[]
GHSA-62p7-mwj3-4h9f
The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to unauthorized filter calling due to insufficient restrictions on the get_smth() function in all versions up to, and including, 1.0.6.7. This makes it possible for unauthenticated attackers to call arbitrary WordPress filters with a single parameter.
[]
CVE-2017-8643
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to leave a malicious website open during user clipboard activities, due to the way that Microsoft Edge handles clipboard events, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-8597 and CVE-2017-8648.
[ "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*" ]
CVE-2008-4446
Cross-site scripting (XSS) vulnerability in Nucleus EUC-JP 3.31 SP1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:nucleus_cms:nucleus:*:sp1:*:ja:*:*:*:*" ]
CVE-2014-6699
The Weather Channel (aka com.weather.Weather) application 5.2.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:weather:weather_channel:5.2.0:*:*:*:*:android:*:*" ]
GHSA-6m4g-jhp3-f6r4
An incomplete filtering of one or more instances of special elements vulnerability [CWE-792] in the command line interpreter of FortiAP-W2 7.2.0 through 7.2.1, 7.0.3 through 7.0.5, 7.0.0 through 7.0.1, 6.4 all versions, 6.2 all versions, 6.0 all versions; FortiAP-C 5.4.0 through 5.4.4, 5.2 all versions; FortiAP 7.2.0 through 7.2.1, 7.0.0 through 7.0.5, 6.4 all versions, 6.0 all versions; FortiAP-U 7.0.0, 6.2.0 through 6.2.5, 6.0 all versions, 5.4 all versions may allow an authenticated attacker to read arbitrary files via specially crafted command arguments.
[]
CVE-2021-4089
Improper Access Control in snipe/snipe-it
snipe-it is vulnerable to Improper Access Control
[ "cpe:2.3:a:snipeitapp:snipe-it:*:*:*:*:*:*:*:*" ]
GHSA-qqmf-49x5-v6mm
IBM DOORS Next Generation (DNG/RRC) 6.0.2, 6.0.6, 6.0.6.1, and 7.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176474.
[]
GHSA-245g-gjxh-59c2
Red Hat Enterprise Linux 4 does not properly compile and link gdm with tcp_wrappers on x86_64 platforms, which might allow remote attackers to bypass intended access restrictions.
[]
GHSA-j24h-fjfc-58fr
An information disclosure vulnerability exists when the Windows Remote Procedure Call (RPC) runtime improperly initializes objects in memory, aka 'Windows Remote Procedure Call Information Disclosure Vulnerability'.
[]
GHSA-x6f2-cj4j-2gxc
Adobe Illustrator versions 26.5.1 (and earlier), and 27.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-73rp-q4rx-5grc
Incorrect Authorization in microweber
Users Account Pre-Takeover or Users Account Takeover. in GitHub repository microweber/microweber prior to 1.2.15. Victim Account Take Over. Since, there is no email confirmation, an attacker can easily create an account in the application using the Victim’s Email. This allows an attacker to gain pre-authentication to the victim’s account. Further, due to the lack of proper validation of email coming from Social Login and failing to check if an account already exists, the victim will not identify if an account is already existing. Hence, the attacker’s persistence will remain. An attacker would be able to see all the activities performed by the victim user impacting the confidentiality and attempt to modify/corrupt the data impacting the integrity and availability factor. This attack becomes more interesting when an attacker can register an account from an employee’s email address. Assuming the organization uses G-Suite, it is much more impactful to hijack into an employee’s account.
[]
GHSA-mjxw-48pc-cfq7
Use-after-free vulnerability in Google Chrome before 8.0.552.215 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to history handling.
[]
GHSA-gccc-7hmg-c996
Dell PowerScale OneFS 9.4.0.x contains an incorrect default permissions vulnerability. A local malicious user could potentially exploit this vulnerability to overwrite arbitrary files causing denial of service.
[]
CVE-2021-40956
LaiKetui v3.5.0 has SQL injection in the background through the menu management function, and sensitive data can be obtained.
[ "cpe:2.3:a:laiketui:laiketui:3.5.0:*:*:*:*:*:*:*" ]
GHSA-8g5w-5wrq-jqg3
EMC Secure Remote Services Virtual Edition (ESRS VE) 3.x before 3.06 does not properly generate random values for session cookies, which makes it easier for remote attackers to hijack sessions by predicting a value.
[]
CVE-2023-20066
Cisco IOS XE Software Web UI Path Traversal Vulnerability
A vulnerability in the web UI of Cisco IOS XE Software could allow an authenticated, remote attacker to perform a directory traversal and access resources that are outside the filesystem mountpoint of the web UI. This vulnerability is due to an insufficient security configuration. An attacker could exploit this vulnerability by sending a crafted request to the web UI. A successful exploit could allow the attacker to gain read access to files that are outside the filesystem mountpoint of the web UI. Note: These files are located on a restricted filesystem that is maintained for the web UI. There is no ability to write to any files on this filesystem.
[ "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-6g_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8800_12-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8800_18-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8800_4-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8800_8-slot:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:8831:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9800-40:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9800-80:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9800-cl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:9800-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_900:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000v:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9000v:v2:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-12c-f-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-12c-ft-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-4c-f-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-4c-ft-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-6cz-f-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-6cz-f-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-6cz-fs-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-6cz-fs-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-6cz-ft-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901-6cz-ft-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901s-2sg-f-ah:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901s-2sg-f-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901s-3sg-f-ah:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901s-3sg-f-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_901s-4sg-f-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9920:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-12x48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24pw-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xu:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48pw-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48u:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48xs:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-nm-2-40g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_3850-nm-8-10g:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9200cx:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9200l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300lm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9300x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9400:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9400_supervisor_engine-1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9407r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9410r:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9500:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9500h:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9600:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9600_supervisor_engine-1:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9600x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-40_wireless_controller:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-80_wireless_controller:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800_embedded_wireless_controller:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3200:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3200_rugged_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3300:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3300_rugged_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3400:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3400_heavy_duty_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie3400_rugged_switch:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_ie9300:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cbr-8:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cg418-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:cg522-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:esr6300:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-24t-con-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-24t-con-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-24t-ncp-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-24t-ncp-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-con-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-con-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-ncp-a:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess-3300-ncp-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:ess9300-10x-e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*" ]
GHSA-m824-p6mx-3cw8
In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel.
[]
CVE-2025-4176
PHPGurukul Blood Bank & Donor Management System request-received-bydonar.php sql injection
A vulnerability has been found in PHPGurukul Blood Bank & Donor Management System 2.4 and classified as critical. This vulnerability affects unknown code of the file /admin/request-received-bydonar.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
GHSA-wrrw-crp8-979q
Pageflow vulnerable to sensitive user data extraction via Ransack query injection
ImpactThe attack allows extracting sensitive properties of database objects that are associated with users or entries belonging to an account that the attacker has access to.Pageflow uses the `ActiveAdmin` Ruby library to provide some management features to its users. `ActiveAdmin` relies on the `Ransack` library to implement search functionality. In its default configuration, `Ransack` will allow for query conditions based on properties of associated database objects [1]. The `*_starts_with`, `*_ends_with` or `*_contains` search matchers [2] can then be abused to exfiltrate sensitive string values of associated database objects via character-by-character brute-force.[1] https://activerecord-hackery.github.io/ransack/going-further/associations/ [2] https://activerecord-hackery.github.io/ransack/getting-started/search-matches/MitigationUpgrade to version 15.7.1 or 14.5.2 of the `pageflow` gem.For more informationIf you have any questions or comments about this advisory email us at info(at)codevise.deCredits[Positive Security](https://positive.security/)
[]
GHSA-fcc9-mfrp-452q
The dashboard subscription interface in Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2 might allow remote authenticated users with certain privileges to execute arbitrary code via a crafted saved search name.
[]
CVE-2021-20518
IBM Jazz Foundation Products are vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 198437.
[ "cpe:2.3:a:ibm:engineering_insights:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_insights:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_insights:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_lifecycle_management:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_requirements_quality_assistant_on-premises:-:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:engineering_workflow_management:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_engineering_lifecycle_manager:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:rational_team_concert:6.0.6.2:*:*:*:*:*:*:*" ]
CVE-2024-50999
Netgear R8500 v1.0.2.160 was discovered to contain a command injection vulnerability in the sysNewPasswd parameter at password.cgi. This vulnerability allows attackers to execute arbitrary OS commands via a crafted request.
[ "cpe:2.3:o:netgear:r8500_firmware:1.0.2.160:*:*:*:*:*:*:*" ]
CVE-2006-2437
The viewfile servlet in the documentation package (resin-doc) for Caucho Resin 3.0.17 and 3.0.18 allows remote attackers to obtain the source code for file under the web root via the file parameter.
[ "cpe:2.3:a:caucho_technology:resin:3.0.17:*:*:*:*:*:*:*", "cpe:2.3:a:caucho_technology:resin:3.0.18:*:*:*:*:*:*:*" ]
CVE-2019-9599
The AirDroid application through 4.2.1.6 for Android allows remote attackers to cause a denial of service (service crash) via many simultaneous sdctl/comm/lite_auth/ requests.
[ "cpe:2.3:a:airdroid:airdroid:*:*:*:*:*:*:android:*" ]
GHSA-h3qh-v838-7h38
NetApp StorageGRID Webscale 10.2.x before 10.2.2.3, 10.3.x before 10.3.0.4, and 10.4.x before 10.4.0.2 allow remote authenticated users to delete arbitrary objects via unspecified vectors.
[]
CVE-2014-0595
/opt/novell/ncl/bin/nwrights in Novell Client for Linux in Novell Open Enterprise Server (OES) 11 Linux SP2 does not properly manage a certain array, which allows local users to obtain the S permission in opportunistic circumstances by leveraging the granting of the F permission by an administrator.
[ "cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*" ]
CVE-2016-0574
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6, 12.1.2, 12.1.3, and 12.2.1 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-0577.
[ "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.1.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:weblogic_server:12.2.1.0.0:*:*:*:*:*:*:*" ]
CVE-2023-47185
WordPress wpDiscuz Plugin <= 7.6.11 is vulnerable to Cross Site Scripting (XSS)
Unauth. Stored Cross-Site Scripting (XSS) vulnerability in gVectors Team Comments — wpDiscuz plugin <= 7.6.11 versions.
[ "cpe:2.3:a:gvectors:wpdiscuz:*:*:*:*:*:wordpress:*:*" ]
GHSA-mwrc-5q9v-5658
Cross Site Scripting (XSS) vulnerability in is_water parameter in eyoucms v.1.6.5 allows a remote attacker to run arbitrary code via crafted URL.
[]
CVE-2021-3179
GGLocker iOS application, contains an insecure data storage of the password hash value which results in an authentication bypass.
[ "cpe:2.3:a:gglocker_project:gglocker:-:*:*:*:*:iphone_os:*:*" ]
CVE-2025-22069
riscv: fgraph: Fix stack layout to match __arch_ftrace_regs argument of ftrace_return_to_handler
In the Linux kernel, the following vulnerability has been resolved: riscv: fgraph: Fix stack layout to match __arch_ftrace_regs argument of ftrace_return_to_handler Naresh Kamboju reported a "Bad frame pointer" kernel warning while running LTP trace ftrace_stress_test.sh in riscv. We can reproduce the same issue with the following command: ``` $ cd /sys/kernel/debug/tracing $ echo 'f:myprobe do_nanosleep%return args1=$retval' > dynamic_events $ echo 1 > events/fprobes/enable $ echo 1 > tracing_on $ sleep 1 ``` And we can get the following kernel warning: [ 127.692888] ------------[ cut here ]------------ [ 127.693755] Bad frame pointer: expected ff2000000065be50, received ba34c141e9594000 [ 127.693755] from func do_nanosleep return to ffffffff800ccb16 [ 127.698699] WARNING: CPU: 1 PID: 129 at kernel/trace/fgraph.c:755 ftrace_return_to_handler+0x1b2/0x1be [ 127.699894] Modules linked in: [ 127.700908] CPU: 1 UID: 0 PID: 129 Comm: sleep Not tainted 6.14.0-rc3-g0ab191c74642 #32 [ 127.701453] Hardware name: riscv-virtio,qemu (DT) [ 127.701859] epc : ftrace_return_to_handler+0x1b2/0x1be [ 127.702032] ra : ftrace_return_to_handler+0x1b2/0x1be [ 127.702151] epc : ffffffff8013b5e0 ra : ffffffff8013b5e0 sp : ff2000000065bd10 [ 127.702221] gp : ffffffff819c12f8 tp : ff60000080853100 t0 : 6e00000000000000 [ 127.702284] t1 : 0000000000000020 t2 : 6e7566206d6f7266 s0 : ff2000000065bd80 [ 127.702346] s1 : ff60000081262000 a0 : 000000000000007b a1 : ffffffff81894f20 [ 127.702408] a2 : 0000000000000010 a3 : fffffffffffffffe a4 : 0000000000000000 [ 127.702470] a5 : 0000000000000000 a6 : 0000000000000008 a7 : 0000000000000038 [ 127.702530] s2 : ba34c141e9594000 s3 : 0000000000000000 s4 : ff2000000065bdd0 [ 127.702591] s5 : 00007fff8adcf400 s6 : 000055556dc1d8c0 s7 : 0000000000000068 [ 127.702651] s8 : 00007fff8adf5d10 s9 : 000000000000006d s10: 0000000000000001 [ 127.702710] s11: 00005555737377c8 t3 : ffffffff819d899e t4 : ffffffff819d899e [ 127.702769] t5 : ffffffff819d89a0 t6 : ff2000000065bb18 [ 127.702826] status: 0000000200000120 badaddr: 0000000000000000 cause: 0000000000000003 [ 127.703292] [<ffffffff8013b5e0>] ftrace_return_to_handler+0x1b2/0x1be [ 127.703760] [<ffffffff80017bce>] return_to_handler+0x16/0x26 [ 127.704009] [<ffffffff80017bb8>] return_to_handler+0x0/0x26 [ 127.704057] [<ffffffff800d3352>] common_nsleep+0x42/0x54 [ 127.704117] [<ffffffff800d44a2>] __riscv_sys_clock_nanosleep+0xba/0x10a [ 127.704176] [<ffffffff80901c56>] do_trap_ecall_u+0x188/0x218 [ 127.704295] [<ffffffff8090cc3e>] handle_exception+0x14a/0x156 [ 127.705436] ---[ end trace 0000000000000000 ]--- The reason is that the stack layout for constructing argument for the ftrace_return_to_handler in the return_to_handler does not match the __arch_ftrace_regs structure of riscv, leading to unexpected results.
[]
GHSA-hvm6-p25j-5hjf
The HDF5 1.8.16 library allocating space for the array using a value from the file has an impact within the loop for initializing said array allowing a value within the file to modify the loop's terminator. Due to this, an aggressor can cause the loop's index to point outside the bounds of the array when initializing it.
[]
GHSA-6mqq-rw6c-7747
Users of the LearnPress WordPress plugin before 4.1.5 can upload an image as a profile avatar after the registration. After this process the user crops and saves the image. Then a "POST" request that contains user supplied name of the image is sent to the server for renaming and cropping of the image. As a result of this request, the name of the user-supplied image is changed with a MD5 value. This process can be conducted only when type of the image is JPG or PNG. An attacker can use this vulnerability in order to rename an arbitrary image file. By doing this, they could destroy the design of the web site.
[]
CVE-2023-30441
IBM Java information disclosure
IBM Runtime Environment, Java Technology Edition IBMJCEPlus and JSSE 8.0.7.0 through 8.0.7.11 components could expose sensitive information using a combination of flaws and configurations. IBM X-Force ID: 253188.
[ "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:java:*:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:-:*:*:*:liberty:*:*:*", "cpe:2.3:a:ibm:websphere_application_server:9.0.0.0:*:*:*:-:*:*:*", "cpe:2.3:a:ibm:z\\/transaction_processing_facility:1.1:*:*:*:*:*:*:*" ]
GHSA-673p-v8h5-89pm
Apple Terminal 1.4.4 allows attackers to execute arbitrary commands via terminal escape sequences.
[]
CVE-2020-15027
ConnectWise Automate through 2020.x has insufficient validation on certain authentication paths, allowing authentication bypass via a series of attempts. This was patched in 2020.7 and in a hotfix for 2019.12.
[ "cpe:2.3:a:connectwise:automate:*:*:*:*:*:*:*:*" ]
CVE-2017-0911
Twitter Kit for iOS versions 3.0 to 3.2.1 is vulnerable to a callback verification flaw in the "Login with Twitter" component allowing an attacker to provide alternate credentials. In the final step of "Login with Twitter" authentication information is passed back to the application using the registered custom URL scheme (typically twitterkit-<consumer-key>) on iOS. Because the callback handler did not verify the authenticity of the response, this step is vulnerable to forgery, potentially allowing attacker to associate a Twitter account with a third-party service.
[ "cpe:2.3:a:twitter:twitter_kit:*:*:*:*:*:iphone_os:*:*" ]
CVE-2024-57229
NETGEAR RAX5 (AX1600 WiFi Router) V1.0.2.26 was discovered to contain a command injection vulnerability via the devname parameter in the reset_wifi function.
[]
GHSA-gpv9-mgr2-7qpf
A vulnerability was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. It has been declared as critical. Affected by this vulnerability is the function WPS of the file /goform/WPS. The manipulation of the argument PIN leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
CVE-2022-30193
AV1 Video Extension Remote Code Execution Vulnerability
AV1 Video Extension Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:av1_video_extension:*:*:*:*:*:*:*:*" ]
GHSA-8hv7-4vfc-w8pg
Cross-site Scripting in Jenkins TestNG Results Plugin
TestNG Results Plugin has options in its post-build step configuration to not escape test descriptions and exception messages. If those options are unchecked, TestNG Results Plugin 554.va4a552116332 and earlier renders the unescaped text provided in test results. This results in a cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs or control test results. TestNG Results Plugin 555.va0d5f66521e3 by default ignores the user-level options to not escape content. Administrators who want to restore this functionality must set the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.plugins.testng.Publisher.allowUnescapedHTML` to true.
[]
CVE-2019-1209
An information disclosure vulnerability exists in Lync 2013, aka 'Lync 2013 Information Disclosure Vulnerability'.
[ "cpe:2.3:a:microsoft:lync:2013:*:*:*:*:*:*:*" ]