id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2022-20420 | In getBackgroundRestrictionExemptionReason of AppRestrictionController.java, there is a possible way to bypass device policy restrictions due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-238377411 | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-24548 | On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets | On affected platforms running Arista EOS with VXLAN configured, malformed or truncated packets received over a VXLAN tunnel and forwarded in hardware can cause egress ports to be unable to forward packets. The device will continue to be susceptible to the issue until remediation is in place.
| [
"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arista:eos:4.25.0f:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-32d4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-32p4:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-36s:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3-96:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3a-24d12:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3a-48d6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280cr3a-72:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3a-36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3a-54:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3ak-36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3ak-54:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3am-36:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280dr3am-54:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280pr3-24:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280sr3-40yc6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280sr3-48yc8:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7280tr3-40c6:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3-24d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3-36cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3k-36cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7500r3k-48y4d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7504r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7508r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7512r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3-36d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3-36p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3-48cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3a-36d:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3a-36dm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3a-36p:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3a-36pm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3ak-36dm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3ak-36pm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3k-36dm:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3k-48cq:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3k-48cqms:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7800r3k-72y7512r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7808r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7812r3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:arista:7816r3:-:*:*:*:*:*:*:*"
] |
GHSA-xhx4-fvj6-gvh5 | libstagefright in Android before 5.1.1 LMY48Z and 6.0 before 2015-12-01 allows remote attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24310423. | [] |
|
GHSA-fr75-x856-q6j8 | Octobot mishandles Tentacles upload | WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled. | [] |
CVE-2023-38207 | Adobe Commerce XML Injection (aka Blind XPath Injection) Arbitrary file system read | Adobe Commerce versions 2.4.6-p1 (and earlier), 2.4.5-p3 (and earlier) and 2.4.4-p4 (and earlier) are affected by a XML Injection (aka Blind XPath Injection) vulnerability that could lead in minor arbitrary file system read. Exploitation of this issue does not require user interaction. | [
"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*"
] |
GHSA-9pg7-c56m-xqjx | In the Linux kernel, the following vulnerability has been resolved:wifi: brcmfmac: Fix oops due to NULL pointer dereference in brcmf_sdiod_sglist_rw()This patch fixes a NULL pointer dereference bug in brcmfmac that occurs
when a high 'sd_sgentry_align' value applies (e.g. 512) and a lot of queued SKBs
are sent from the pkt queue.The problem is the number of entries in the pre-allocated sgtable, it is
nents = max(rxglom_size, txglom_size) + max(rxglom_size, txglom_size) >> 4 + 1.
Given the default [rt]xglom_size=32 it's actually 35 which is too small.
Worst case, the pkt queue can end up with 64 SKBs. This occurs when a new SKB
is added for each original SKB if tailroom isn't enough to hold tail_pad.
At least one sg entry is needed for each SKB. So, eventually the "skb_queue_walk loop"
in brcmf_sdiod_sglist_rw may run out of sg entries. This makes sg_next return
NULL and this causes the oops.The patch sets nents to max(rxglom_size, txglom_size) * 2 to be able handle
the worst-case.
Btw. this requires only 64-35=29 * 16 (or 20 if CONFIG_NEED_SG_DMA_LENGTH) = 464
additional bytes of memory. | [] |
|
GHSA-qxf3-w2rf-mhmm | MyBB 1.8.19 allows remote attackers to obtain sensitive information because it discloses the username upon receiving a password-reset request that lacks the code parameter. | [] |
|
GHSA-jf8f-pphx-pmfh | Vulnerability in Oracle Application Express (component: General). Supported versions that are affected are 23.2 and 24.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Express. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Express, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Express accessible data as well as unauthorized read access to a subset of Oracle Application Express accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [] |
|
GHSA-qwhf-6m85-fm6c | Word in Microsoft Office 2000 SP3, XP SP3, Office 2003 SP2, and Office Word Viewer 2003 allows remote attackers to execute arbitrary code via crafted fields within the File Information Block (FIB) of a Word file, which triggers length calculation errors and memory corruption. | [] |
|
CVE-2014-125008 | FFmpeg oggparsevorbis.c vorbis_header memory corruption | A vulnerability classified as problematic has been found in FFmpeg 2.0. Affected is the function vorbis_header of the file libavformat/oggparsevorbis.c. The manipulation leads to memory corruption. It is possible to launch the attack remotely. It is recommended to apply a patch to fix this issue. | [
"cpe:2.3:a:ffmpeg:ffmpeg:2.0:*:*:*:*:*:*:*"
] |
CVE-2021-22927 | A session fixation vulnerability exists in Citrix ADC and Citrix Gateway 13.0-82.45 when configured SAML service provider that could allow an attacker to hijack a session. | [
"cpe:2.3:o:citrix:application_delivery_controller_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:application_delivery_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx\\/sdx_14030_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx\\/sdx_14060_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx\\/sdx_14080_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_15030-50g_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_15040-50g_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_15060-50g_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_15080-50g_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_15100-50g_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_15120-50g_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_8905_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_8910_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:h:citrix:mpx_8920_fips:-:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-33333 | The Portal Workflow module in Liferay Portal 7.3.2 and earlier, and Liferay DXP 7.0 before fix pack 93, 7.1 before fix pack 19 and 7.2 before fix pack 6, does not properly check user permission, which allows remote authenticated users to view and delete workflow submissions via crafted URLs. | [
"cpe:2.3:a:liferay:dxp:7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_13:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_14:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_24:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_25:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_26:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_27:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_28:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_3\\+:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_30:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_33:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_35:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_36:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_39:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_40:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_41:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_42:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_43:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_44:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_45:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_46:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_47:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_48:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_49:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_50:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_51:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_52:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_53:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_54:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_56:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_57:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_58:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_59:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_60:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_61:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_64:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_65:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_66:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_67:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_68:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_69:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_70:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_71:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_72:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_73:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_75:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_76:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_78:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_79:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_80:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_81:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_82:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_83:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_84:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_85:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_86:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_87:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_88:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_89:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_90:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_91:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.0:fix_pack_92:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_10:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_11:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_12:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_13:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_14:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_15:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_16:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_17:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_18:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_6:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_7:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_8:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.1:fix_pack_9:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:-:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_1:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_2:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_3:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_4:*:*:*:*:*:*",
"cpe:2.3:a:liferay:dxp:7.2:fix_pack_5:*:*:*:*:*:*",
"cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*"
] |
|
GHSA-jpjf-6xrf-gp68 | The Car Insurance Quote Comparison (aka com.seopa.quotezone) application 2.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2022-38141 | WordPress Sales Report Email for WooCommerce Plugin <= 2.8 is vulnerable to Broken Access Control | Missing Authorization vulnerability in Zorem Sales Report Email for WooCommerce.This issue affects Sales Report Email for WooCommerce: from n/a through 2.8.
| [
"cpe:2.3:a:zorem:sales_report_email_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-14563 | Vulnerability in the Oracle Enterprise Communications Broker product of Oracle Communications Applications (component: WebGUI). Supported versions that are affected are 3.0.0-3.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Communications Broker. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Communications Broker, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Enterprise Communications Broker accessible data as well as unauthorized read access to a subset of Oracle Enterprise Communications Broker accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:enterprise_communications_broker:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-52450 | perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology() | In the Linux kernel, the following vulnerability has been resolved:
perf/x86/intel/uncore: Fix NULL pointer dereference issue in upi_fill_topology()
Get logical socket id instead of physical id in discover_upi_topology()
to avoid out-of-bound access on 'upi = &type->topology[nid][idx];' line
that leads to NULL pointer dereference in upi_fill_topology() | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2011-4014 | The TAC Case Attachment tool in Cisco Wireless Control System (WCS) 7.0 allows remote authenticated users to read arbitrary files under webnms/Temp/ via unspecified vectors, aka Bug ID CSCtq86807. | [
"cpe:2.3:a:cisco:wireless_control_system_software:7.0.164.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_control_system_software:7.0.164.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_control_system_software:7.0.172.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_control_system_software:7.0.220.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_control_system_software:7.0.230.0:*:*:*:*:*:*:*"
] |
|
GHSA-9fqh-jpcp-95fv | Mozilla developers reported memory safety bugs present in Firefox 89. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 90. | [] |
|
GHSA-2cqr-c5qf-cc3q | ClipSoft REXPERT 1.0.0.527 and earlier version allows arbitrary file creation via a POST request with the parameter set to the file path to be written. This can be an executable file that is written to in the arbitrary directory. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page. | [] |
|
GHSA-8v7j-86mr-4824 | An issue was discovered in certain Apple products. iOS before 11.2.5 is affected. macOS before 10.13.3 is affected. Safari before 11.0.3 is affected. iCloud before 7.3 on Windows is affected. iTunes before 12.7.3 on Windows is affected. tvOS before 11.2.5 is affected. watchOS before 4.2.2 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. | [] |
|
GHSA-hjv5-8xv5-vmfp | In the Linux kernel, the following vulnerability has been resolved:memory: fsl_ifc: fix leak of IO mapping on probe failureOn probe error the driver should unmap the IO memory. Smatch reports:drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: 'fsl_ifc_ctrl_dev->gregs' not released on lines: 298. | [] |
|
CVE-2022-0302 | Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
GHSA-v3cg-7r9h-r2g6 | Field-level security issue with .keyword fields in OpenSearch | Advisory title: Field-level security issue with .keyword fieldsAffected versions:OpenSearch 1.0.0-1.3.7 and 2.0.0-2.4.1Patched versions:OpenSearch 1.3.8 and 2.5.0Impact:There is an issue in the implementation of field-level security (FLS) and field masking where rules written to explicitly exclude fields are not correctly applied for certain queries that rely on their auto-generated .keyword fields.This issue is only present for authenticated users with read access to the indexes containing the restricted fields.Workaround:FLS rules that use explicit exclusions can be written to grant explicit access instead. Policies authored in this way are not subject to this issue.Patches:OpenSearch versions 1.3.8 and 2.5.0 contain a fix for this issue.For more information:If you have any questions or comments about this advisory, please contact AWS/Amazon Security via our issue reporting page (https://aws.amazon.com/security/vulnerability-reporting/) or directly via email to [[email protected]](mailto:[email protected]). Please do not create a public GitHub issue. | [] |
CVE-2022-47447 | WordPress WP-Advanced-Search Plugin <= 3.3.8 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Mathieu Chartier WordPress WP-Advanced-Search plugin <= 3.3.8 versions. | [
"cpe:2.3:a:internet-formation:wp-advanced-search:*:*:*:*:*:wordpress:*:*"
] |
GHSA-jr8m-x5pc-vrvr | A vulnerability in Cisco Webex Teams, formerly Cisco Spark, could allow an authenticated, remote attacker to view and modify data for an organization other than their own organization. The vulnerability exists because the affected software performs insufficient checks for associations between user accounts and organization accounts. An attacker who has administrator or compliance officer privileges for one organization account could exploit this vulnerability by using those privileges to view and modify data for another organization account. No customer data was impacted by this vulnerability. | [] |
|
GHSA-5mmp-v3w4-wjmj | Cisco IOS 12.4MDA before 12.4(24)MDA5 on the Cisco Content Services Gateway - Second Generation (CSG2) allows remote attackers to cause a denial of service (device reload) via crafted ICMP packets, aka Bug ID CSCtl79577. | [] |
|
CVE-2017-12593 | ASUS DSL-N10S V2.1.16_APAC devices allow CSRF. | [
"cpe:2.3:o:asus:dsl-n10s_firmware:v2.1.16_apac:*:*:*:*:*:*:*",
"cpe:2.3:h:asus:dsl-n10s_router:-:*:*:*:*:*:*:*"
] |
|
CVE-2019-6772 | This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader 2019.010.20098. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the removeField method when processing AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-8231. | [
"cpe:2.3:a:foxitsoftware:foxit_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-mjw9-3f9f-jq2w | XWiki Platform vulnerable to code injection from view right on XWiki.ClassSheet | ImpactAny user with view rights can execute arbitrary script macros including Groovy and Python macros that allow remote code execution including unrestricted read and write access to all wiki contents. The attack works by opening a non-existing page with a name crafted to contain a dangerous payload.For instance: `Open <xwiki-host>/xwiki/bin/view/%22%2F%7D%7D%7B%7B%2Fhtml%7D%7D%20%7B%7Basync%20async%3D%22true%22%20cached%3D%22false%22%20context%3D%22doc.reference%22%7D%7D%7B%7Bgroovy%7D%7Dprintln(%22Hello%20%22%20%2B%20%22from%20groovy!%22)%7B%7B%2Fgroovy%7D%7D%7B%7B%2Fasync%7D%7D?sheet=XWiki.ClassSheet&xpage=view`, where `<xwiki-host>` is the URL of your XWiki installation.PatchesThis has been patched in XWiki 14.4.8, 14.10.3 and 15.0RC1.WorkaroundsThe fix is only impacting Velocity templates and page contents, so applying this [patch](https://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfee) is enough to fix the issue.Referenceshttps://github.com/xwiki/xwiki-platform/commit/d7e56185376641ee5d66477c6b2791ca8e85cfeehttps://jira.xwiki.org/browse/XWIKI-20456For more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected]) | [] |
CVE-2015-5990 | Cross-site request forgery (CSRF) vulnerability on Belkin F9K1102 2 devices with firmware 2.10.17 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:o:zyxel:gs1900-10hp_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-mpj7-7mg7-x95j | Apache NiFi: Missing Complete Authorization for Parameter and Service References | Apache NiFi 1.10.0 through 2.0.0 are missing fine-grained authorization checking for Parameter Contexts, referenced Controller Services, and referenced Parameter Providers, when creating new Process Groups.Creating a new Process Group can include binding to a Parameter Context, but in cases where the Process Group did not reference any Parameter values, the framework did not check user authorization for the bound Parameter Context. Missing authorization for a bound Parameter Context enabled clients to download non-sensitive Parameter values after creating the Process Group.Creating a new Process Group can also include referencing existing Controller Services or Parameter Providers. The framework did not check user authorization for referenced Controller Services or Parameter Providers, enabling clients to create Process Groups and use these components that were otherwise unauthorized.This vulnerability is limited in scope to authenticated users authorized to create Process Groups. The scope is further limited to deployments with component-based authorization policies. Upgrading to Apache NiFi 2.1.0 is the recommended mitigation, which includes authorization checking for Parameter and Controller Service references on Process Group creation. | [] |
CVE-2024-6100 | Type Confusion in V8 in Google Chrome prior to 126.0.6478.114 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-2575 | Vulnerability in the Oracle AutoVue 3D Professional Advanced component of Oracle Supply Chain Products Suite (subcomponent: Format Handling - 2D). Supported versions that are affected are 21.0.0 and 21.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle AutoVue 3D Professional Advanced. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle AutoVue 3D Professional Advanced accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:autovue_3d_professional_advanced:21.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:autovue_3d_professional_advanced:21.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-47363 | nexthop: Fix division by zero while replacing a resilient group | In the Linux kernel, the following vulnerability has been resolved:
nexthop: Fix division by zero while replacing a resilient group
The resilient nexthop group torture tests in fib_nexthop.sh exposed a
possible division by zero while replacing a resilient group [1]. The
division by zero occurs when the data path sees a resilient nexthop
group with zero buckets.
The tests replace a resilient nexthop group in a loop while traffic is
forwarded through it. The tests do not specify the number of buckets
while performing the replacement, resulting in the kernel allocating a
stub resilient table (i.e, 'struct nh_res_table') with zero buckets.
This table should never be visible to the data path, but the old nexthop
group (i.e., 'oldg') might still be used by the data path when the stub
table is assigned to it.
Fix this by only assigning the stub table to the old nexthop group after
making sure the group is no longer used by the data path.
Tested with fib_nexthops.sh:
Tests passed: 222
Tests failed: 0
[1]
divide error: 0000 [#1] PREEMPT SMP KASAN
CPU: 0 PID: 1850 Comm: ping Not tainted 5.14.0-custom-10271-ga86eb53057fe #1107
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014
RIP: 0010:nexthop_select_path+0x2d2/0x1a80
[...]
Call Trace:
fib_select_multipath+0x79b/0x1530
fib_select_path+0x8fb/0x1c10
ip_route_output_key_hash_rcu+0x1198/0x2da0
ip_route_output_key_hash+0x190/0x340
ip_route_output_flow+0x21/0x120
raw_sendmsg+0x91d/0x2e10
inet_sendmsg+0x9e/0xe0
__sys_sendto+0x23d/0x360
__x64_sys_sendto+0xe1/0x1b0
do_syscall_64+0x35/0x80
entry_SYSCALL_64_after_hwframe+0x44/0xae | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*"
] |
CVE-2006-1155 | Cross-site scripting (XSS) vulnerability in manas tungare Site Membership Script before 8 March, 2006 allows remote attackers to inject arbitrary web script or HTML via the Error parameter in (1) login.asp and (2) default.asp. | [
"cpe:2.3:a:manas_tungare:site_membership_script:*:*:*:*:*:*:*:*"
] |
|
CVE-2010-1024 | SQL injection vulnerability in the TGM-Newsletter (tgm_newsletter) extension 0.0.2 for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:chris_wederka:tgm_newsletter:0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:typo3:typo3:*:*:*:*:*:*:*:*"
] |
|
GHSA-96qq-9h7m-67pw | KASAGO TCP/IP stack provided by Zuken Elmic generates ISNs(Initial Sequence Number) for TCP connections from an insufficiently random source. An attacker may be able to determine the ISN of the current or future TCP connections and either hijack existing ones or spoof future ones. | [] |
|
GHSA-9fm6-ffj9-f3wc | IBM Platform LSF 9.1 and 10.1, IBM Spectrum LSF Suite 10.2, and IBM Spectrum Suite for HPA 10.2 could allow a local user to escalate their privileges due to weak file permissions when specific debug settings are enabled in a Linux or Unix enviornment. IBM X-Force ID: 176137. | [] |
|
CVE-2019-5294 | There is an out of bound read vulnerability in some Huawei products. A remote, unauthenticated attacker may send a corrupt or crafted message to the affected products. Due to a buffer read overflow error when parsing the message, successful exploit may cause some service to be abnormal. | [
"cpe:2.3:o:huawei:ar120-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar120-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar120-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar1200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar1200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar150-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar150-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar160_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar2200-s_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar2200-s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3200_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ar3600_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ar3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:netengine16ex_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:netengine16ex:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg1300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg1300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg2300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg2300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r005c20:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r006c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:srg3300_firmware:v200r007c00:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:srg3300:-:*:*:*:*:*:*:*"
] |
|
CVE-2013-7471 | An issue was discovered in soap.cgi?service=WANIPConn1 on D-Link DIR-845 before v1.02b03, DIR-600 before v2.17b01, DIR-645 before v1.04b11, DIR-300 rev. B, and DIR-865 devices. There is Command Injection via shell metacharacters in the NewInternalClient, NewExternalPort, or NewInternalPort element of a SOAP POST request. | [
"cpe:2.3:o:dlink:dir-300_firmware:2.14b01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-300:b:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-645_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-845_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dir-865_firmware:1.05b03:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-865:-:*:*:*:*:*:*:*"
] |
|
GHSA-ggv4-4qfx-2gh6 | In the Linux kernel, the following vulnerability has been resolved:lib: alloc_tag_module_unload must wait for pending kfree_rcu callsBen Greear reports following splat:
------------[ cut here ]------------
net/netfilter/nf_nat_core.c:1114 module nf_nat func:nf_nat_register_fn has 256 allocated at module unload
WARNING: CPU: 1 PID: 10421 at lib/alloc_tag.c:168 alloc_tag_module_unload+0x22b/0x3f0
Modules linked in: nf_nat(-) btrfs ufs qnx4 hfsplus hfs minix vfat msdos fat
...
Hardware name: Default string Default string/SKYBAY, BIOS 5.12 08/04/2020
RIP: 0010:alloc_tag_module_unload+0x22b/0x3f0
codetag_unload_module+0x19b/0x2a0
? codetag_load_module+0x80/0x80nf_nat module exit calls kfree_rcu on those addresses, but the free
operation is likely still pending by the time alloc_tag checks for leaks.Wait for outstanding kfree_rcu operations to complete before checking
resolves this warning.Reproducer:
unshare -n iptables-nft -t nat -A PREROUTING -p tcp
grep nf_nat /proc/allocinfo # will list 4 allocations
rmmod nft_chain_nat
rmmod nf_nat # will WARN.[[email protected]: add comment] | [] |
|
CVE-2024-56026 | WordPress Simple Proxy plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Greg Priday Simple Proxy allows Reflected XSS.This issue affects Simple Proxy: from n/a through 1.0. | [] |
CVE-2023-30767 | Improper buffer restrictions in Intel(R) Optimization for TensorFlow before version 2.13.0 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2021-38113 | In addBouquet in js/bqe.js in OpenWebif (aka e2openplugin-OpenWebif) through 1.4.7, inserting JavaScript into the Add Bouquet feature of the Bouquet Editor (i.e., bouqueteditor/api/addbouquet?name=) leads to Stored XSS. | [
"cpe:2.3:a:openwebif_project:openwebif:*:*:*:*:*:enigma2:*:*"
] |
|
GHSA-h342-5v8g-h229 | Prototype pollution vulnerability in beautify-web js-beautify 1.13.7 via the name variable in options.js. | [] |
|
CVE-2025-31003 | WordPress Squeeze plugin <= 1.6 - Full Path Disclosure (FPD) vulnerability | Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Bogdan Bendziukov Squeeze allows Retrieve Embedded Sensitive Data. This issue affects Squeeze: from n/a through 1.6. | [] |
GHSA-pj2r-jq64-j78p | Microsoft PowerPoint 2007 SP2 and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate TimeColorBehaviorContainer Floating Point records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document containing an invalid record, aka "Floating Point Techno-color Time Bandit RCE Vulnerability." | [] |
|
CVE-2020-21667 | In fastadmin-tp6 v1.0, in the file app/admin/controller/Ajax.php the 'table' parameter passed is not filtered so a malicious parameter can be passed for SQL injection. | [
"cpe:2.3:a:fastadmin-tp6_project:fastadmin-tp6:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-3702 | The Gfx::getPos function in the PDF parser in xpdf before 3.02pl5, poppler 0.8.7 and possibly other versions up to 0.15.1, CUPS, kdegraphics, and possibly other products allows context-dependent attackers to cause a denial of service (crash) via unknown vectors that trigger an uninitialized pointer dereference. | [
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:-:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl1:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl2:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl3:*:*:*:*:*:*",
"cpe:2.3:a:xpdfreader:xpdf:3.02:pl4:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.3:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*"
] |
|
CVE-2019-12653 | Cisco IOS XE Software Raw Socket Transport Denial of Service Vulnerability | A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol. | [
"cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*"
] |
CVE-2006-3183 | Cross-site scripting (XSS) vulnerability in index.php in MobeScripts Mobile Space Community 2.0 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) browse parameter, which is not filtered in the resulting error message, and multiple unspecified input fields, including those involved when (2) updating a profile, (3) posting comments or entries in a blog, (4) uploading files, (5) picture captions, and (6) sending a private message (PM). | [
"cpe:2.3:a:mobescripts:mobile_space_community:2.0:*:*:*:*:*:*:*"
] |
|
GHSA-g2h3-9497-7mxh | The boot_linux_from_mmc function in app/aboot/aboot.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not properly validate a certain address value, which allows attackers to write data to a controllable memory location by leveraging the ability to initiate an attempted boot of an arbitrary image. | [] |
|
CVE-2024-42377 | Multiple Missing Authorization Check vulnerabilities in SAP Shared Service Framework | SAP shared service framework allows an
authenticated non-administrative user to call a remote-enabled function, which
will allow them to insert value entries into a non-sensitive table, causing low
impact on integrity of the application | [
"cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_746:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_747:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:shared_service_framework:sap_bs_fnd_748:*:*:*:*:*:*:*"
] |
CVE-2017-5136 | An issue was discovered on SendQuick Entera and Avera devices before 2HF16. The application failed to check the access control of the request which could result in an attacker being able to shutdown the system. | [
"cpe:2.3:o:sendquick:entera_sms_gateway_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sendquick:entera_sms_gateway:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sendquick:avera_sms_gateway_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sendquick:avera_sms_gateway:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-39558 | AudimexEE v15.0 was discovered to contain multiple reflected cross-site scripting (XSS) vulnerabilities via the Show Kai Data component. | [
"cpe:2.3:a:web-audimex:audimexee:15.0:*:*:*:*:*:*:*"
] |
|
GHSA-p7jx-q735-v62j | Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory. | [] |
|
CVE-2023-42653 | In faceid service, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service with no additional execution privileges | [
"cpe:2.3:o:google:android:10.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:-:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-7764 | SQL Injection in vanna-ai/vanna | Vanna-ai v0.6.2 is vulnerable to SQL Injection due to insufficient protection against injecting additional SQL commands from user requests. The vulnerability occurs when the `generate_sql` function calls `extract_sql` with the LLM response. An attacker can include a semi-colon between a search data field and their own command, causing the `extract_sql` function to remove all LLM generated SQL and execute the attacker's command if it passes the `is_sql_valid` function. This allows the execution of user-defined SQL beyond the expected boundaries, notably the trained schema. | [] |
GHSA-qvf9-958h-6h8p | In the Linux kernel, the following vulnerability has been resolved:bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relosIn case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL
referencing a non-existing BTF type, function bpf_core_calc_relo_insn
would cause a null pointer deference.Fix this by adding a proper check upper in call stack, as malformed
relocation records could be passed from user space.Simplest reproducer is a program:With a single relocation record:See the link for original reproducer or next commit for a test case. | [] |
|
CVE-2019-2015 | In rw_t3t_act_handle_check_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120503926 | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2017-11847 | Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and RT1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016, and Windows Server, version 1709 allows an attacker to run arbitrary code in kernel mode, install programs, view, change or delete data, and create new accounts with full user rights due to improperly handing objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
|
GHSA-x5rg-6gf6-5wg5 | An issue was discovered in Paessler PRTG Network Monitor 23.2.83.1760. Due to command-line parameter injection and an undocumented debug feature flag, an attacker can utilize the DICOM sensor to write arbitrary data to the disk. This can be utilized to write a custom EXE(.bat) sensor, that will then run. This primitive gives remote code execution. | [] |
|
CVE-2021-37081 | There is a Improper Input Validation vulnerability in Huawei Smartphone.Successful exploitation of this vulnerability may lead to nearby crash. | [
"cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*"
] |
|
GHSA-7p9v-555g-5hgg | An issue was discovered on D-Link DSL-2888A devices with firmware prior to AU_2.31_V1.1.47ae55. An unauthenticated attacker could bypass authentication to access authenticated pages and functionality. | [] |
|
CVE-2024-31582 | FFmpeg version n6.1 was discovered to contain a heap buffer overflow vulnerability in the draw_block_rectangle function of libavfilter/vf_codecview.c. This vulnerability allows attackers to cause undefined behavior or a Denial of Service (DoS) via crafted input. | [
"cpe:2.3:a:ffmpeg:ffmpeg:6.1:*:*:*:*:*:*:*"
] |
|
GHSA-qrgr-qfr9-4xfh | The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. | [] |
|
CVE-2019-2106 | In ihevcd_sao_shift_ctb of ihevcd_sao.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-130023983. | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-mr5j-qcjf-p9xm | BSCW groupware system 3.3 through 4.0.2 beta allows remote attackers to read or modify arbitrary files by uploading and extracting a tar file with a symlink into the data-bag space. | [] |
|
CVE-2006-3767 | Cross-site scripting (XSS) vulnerability in showprofile.php in Darren's $5 Script Archive osDate 1.1.7 and earlier allows remote attackers to inject arbitrary web script or HTML via the onerror attribute in an HTML IMG tag with a non-existent source file in txtcomment parameter, which is used when posting a comment. | [
"cpe:2.3:a:darrens_5-dollar_script_archive:osdate:*:*:*:*:*:*:*:*",
"cpe:2.3:a:darrens_5-dollar_script_archive:osdate:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:darrens_5-dollar_script_archive:osdate:1.1.6:*:*:*:*:*:*:*"
] |
|
CVE-2021-23264 | Transmission of Private Resources into a New Sphere ('Resource Leak') and Exposure of Resource to Wrong Sphere in Crafter Search | Installations, where crafter-search is not protected, allow unauthenticated remote attackers to create, view, and delete search indexes. | [
"cpe:2.3:a:craftercms:crafter_cms:*:*:*:*:*:*:*:*"
] |
GHSA-pc25-5426-q5x9 | Illustrator versions 28.5, 27.9.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to an application denial-of-service (DoS). An attacker could exploit this vulnerability to crash the application, resulting in a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-9622-pfwg-vcxc | Integer signedness error in Safari on Apple iPhone before 2.0 and iPod touch before 2.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving JavaScript array indices that trigger an out-of-bounds access, a different vulnerability than CVE-2008-2307. | [] |
|
CVE-2002-1236 | The remote management web server for Linksys BEFSR41 EtherFast Cable/DSL Router before firmware 1.42.7 allows remote attackers to cause a denial of service (crash) via an HTTP request to Gozila.cgi without any arguments. | [
"cpe:2.3:h:linksys:befsr41:1.40.2:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.41:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.42.3:*:*:*:*:*:*:*",
"cpe:2.3:h:linksys:befsr41:1.42.7:*:*:*:*:*:*:*"
] |
|
GHSA-3jw5-8hpm-44m2 | Improper input validation vulnerability in the Transaction Server CLUSTERPRO X 1.0 for Windows and later, EXPRESSCLUSTER X 1.0 for Windows and later allows attacker to read files upload via network.. | [] |
|
GHSA-f86m-4hjx-mgqr | Multiple cross-site scripting (XSS) vulnerabilities in phpBB 2.0.17 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) error_msg parameter to usercp_register.php, (2) forward_page parameter to login.php, and (3) list_cat parameter to search.php, which are not initialized as variables. | [] |
|
GHSA-w6fj-qr27-8g23 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Booking Calendar Contact Form allows Stored XSS. This issue affects Booking Calendar Contact Form: from n/a through 1.2.55. | [] |
|
GHSA-rhxf-q9p5-8h29 | Cross-site scripting (XSS) vulnerability in IBM Rational Quality Manager 2.x and 3.x before 3.0.1.6 iFix4, 4.x before 4.0.7 iFix3, and 5.x before 5.0.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, a different vulnerability than CVE-2015-0124. | [] |
|
CVE-2017-3616 | Vulnerability in the Data Store component of Oracle Berkeley DB. The supported version that is affected is Prior to 6.2.32. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Data Store executes to compromise Data Store. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of Data Store. CVSS 3.0 Base Score 7.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H). | [
"cpe:2.3:a:oracle:berkeley_db:*:*:*:*:*:*:*:*"
] |
|
GHSA-mc6x-37m5-73h5 | A vulnerability has been identified in JT2Go (All versions), Teamcenter Visualization V13.2 (All versions < V13.2.0.12), Teamcenter Visualization V13.3 (All versions < V13.3.0.8), Teamcenter Visualization V14.0 (All versions < V14.0.0.4), Teamcenter Visualization V14.1 (All versions < V14.1.0.6). The CGM_NIST_Loader.dll contains an out of bounds write vulnerability when parsing a CGM file. An attacker can leverage this vulnerability to execute code in the context of the current process. | [] |
|
CVE-2023-38132 | LAN-W451NGR all versions provided by LOGITEC CORPORATION contains an improper access control vulnerability, which allows an unauthenticated attacker to log in to telnet service. | [
"cpe:2.3:a:logitec:lan-w451ngr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:elecom:lan-w451ngr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:elecom:lan-w451ngr:-:*:*:*:*:*:*:*"
] |
|
GHSA-7fm8-x8h8-39g3 | In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07629573; Issue ID: ALPS07629573. | [] |
|
GHSA-63fq-p354-4c4w | Dell SupportAssist for Home PCs (version 3.11.4 and prior) and SupportAssist for Business PCs (version 3.2.0 and prior) contain a privilege escalation vulnerability. A local authenticated malicious user could potentially exploit this vulnerability to elevate privileges and gain total control of the system. | [] |
|
GHSA-rff2-25mx-hcq2 | Multiple SQL injection vulnerabilities in includes/functions.php in Pro Chat Rooms Text Chat Rooms 8.2.0 allow remote authenticated users to execute arbitrary SQL commands via the (1) password, (2) email, or (3) id parameter. | [] |
|
CVE-2024-4291 | Tenda A301 setBlackRule formAddMacfilterRule stack-based overflow | A vulnerability was found in Tenda A301 15.13.08.12_multi_TDE01. It has been rated as critical. This issue affects the function formAddMacfilterRule of the file /goform/setBlackRule. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-262223. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*"
] |
CVE-2022-29537 | gp_rtp_builder_do_hevc in ietf/rtp_pck_mpeg4.c in GPAC 2.0.0 has a heap-based buffer over-read, as demonstrated by MP4Box. | [
"cpe:2.3:a:gpac:gpac:2.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-3m87-5598-2v4f | Withdrawn Advisory: Prometheus XSS Vulnerability | Withdrawn AdvisoryThis advisory has been withdrawn because the vulnerability does not apply to the Prometheus golang package. This link is maintained to preserve external references.Original DescriptionA stored, DOM based, cross-site scripting (XSS) flaw was found in Prometheus before version 2.7.1. An attacker could exploit this by convincing an authenticated user to visit a crafted URL on a Prometheus server, allowing for the execution and persistent storage of arbitrary scripts. | [] |
CVE-2023-26334 | ZDI-CAN-20149: Adobe Dimension USD File Parsing Uninitialized Pointer Information Disclosure Vulnerability | Adobe Dimension versions 3.4.7 (and earlier) is affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2005-1745 | The UserLogin control in BEA WebLogic Portal 8.1 through Service Pack 3 prints the password to standard output when an incorrect login attempt is made, which could make it easier for attackers to guess the correct password. | [
"cpe:2.3:a:bea:weblogic_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.0:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp3:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp3:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp4:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp4:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp5:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp5:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp6:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:6.1:sp6:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp3:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0.0.1:sp4:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:win32:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:express:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp4:win32:*:*:*:*:*",
"cpe:2.3:a:oracle:weblogic_portal:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-7882 | Authentication bypass when using LDAP authentication in MongoDB Enterprise Server | Improper handling of LDAP authentication in MongoDB Server versions 3.0.0 to 3.0.6 allows an unauthenticated client to gain unauthorized access. | [
"cpe:2.3:a:mongodb:mongodb:*:*:*:*:enterprise:*:*:*"
] |
GHSA-w82j-q9x6-g553 | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | [] |
|
GHSA-64cp-h6cw-59mg | Mozilla Firefox 3.0.10 and earlier on Linux allows remote attackers to cause a denial of service (application crash) via a URI for a large GIF image in the BACKGROUND attribute of a BODY element. | [] |
|
GHSA-5cvx-2qx8-xfqp | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32. | [] |
|
GHSA-mf78-2287-6qf8 | A Code Execution Vulnerability exists in UMPlayer 0.98 in wintab32.dll due to insufficient path restrictions when loading external libraries. which could let a malicious user execute arbitrary code. | [] |
|
GHSA-v7q3-h4r2-3g3j | Cloudlog 2.6.15 allows Oqrs.php get_station_info station_id SQL injection. | [] |
|
GHSA-445q-cj49-wrrx | In the Linux kernel, the following vulnerability has been resolved:bpf: Fix accesses to uninit stack slotsPrivileged programs are supposed to be able to read uninitialized stack
memory (ever since 6715df8d5) but, before this patch, these accesses
were permitted inconsistently. In particular, accesses were permitted
above state->allocated_stack, but not below it. In other words, if the
stack was already "large enough", the access was permitted, but
otherwise the access was rejected instead of being allowed to "grow the
stack". This undesired rejection was happening in two places:in check_stack_slot_within_bounds()in check_stack_range_initialized()
This patch arranges for these accesses to be permitted. A bunch of tests
that were relying on the old rejection had to change; all of them were
changed to add also run unprivileged, in which case the old behavior
persists. One tests couldn't be updated - global_func16 - because it
can't run unprivileged for other reasons.This patch also fixes the tracking of the stack size for variable-offset
reads. This second fix is bundled in the same commit as the first one
because they're inter-related. Before this patch, writes to the stack
using registers containing a variable offset (as opposed to registers
with fixed, known values) were not properly contributing to the
function's needed stack size. As a result, it was possible for a program
to verify, but then to attempt to read out-of-bounds data at runtime
because a too small stack had been allocated for it.Each function tracks the size of the stack it needs in
bpf_subprog_info.stack_depth, which is maintained by
update_stack_depth(). For regular memory accesses, check_mem_access()
was calling update_state_depth() but it was passing in only the fixed
part of the offset register, ignoring the variable offset. This was
incorrect; the minimum possible value of that register should be used
instead.This tracking is now fixed by centralizing the tracking of stack size in
grow_stack_state(), and by lifting the calls to grow_stack_state() to
check_stack_access_within_bounds() as suggested by Andrii. The code is
now simpler and more convincingly tracks the correct maximum stack size.
check_stack_range_initialized() can now rely on enough stack having been
allocated for the access; this helps with the fix for the first issue.A few tests were changed to also check the stack depth computation. The
one that fails without this patch is verifier_var_off:stack_write_priv_vs_unpriv. | [] |
|
GHSA-7xj9-3fpx-jwvg | STDU Viewer 1.6.375 allows attackers to cause a denial of service or possibly have unspecified other impact via a crafted .xps file, related to a "Possible Stack Corruption starting at Unknown Symbol @ 0x00000000049f0281." | [] |
|
GHSA-7p99-vvwg-793p | Cross-site scripting (XSS) vulnerability in Organic Groups (OG) 5.x-7.x before 5.x-7.4, 5.x-8.x before 5.x-8.1, and 6.x-1.x before 6.x-1.4, a module for Drupal, allows remote authenticated users, with create or edit group nodes permissions, to inject arbitrary web script or HTML via the User-Agent HTTP header, a different issue than CVE-2008-3095. | [] |
|
GHSA-3rv3-jp5p-3jhw | PHPGURUKUL Hospital Management System V 4.0 does not properly restrict access to admin/dashboard.php, which allows attackers to access all data of users, doctors, patients, change admin password, get appointment history and access all session logs. | [] |
|
GHSA-85q7-2m9w-wq4f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in assorted[chips] DrawIt (draw.Io) plugin <= 1.1.3 versions. | [] |
|
GHSA-v3gr-mcr8-2wv5 | Multiple SHARP routers leave the hidden debug function enabled. An arbitrary OS command may be executed with the root privilege by a remote unauthenticated attacker. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.