id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2024-11450 | ONLYOFFICE Docs <= 2.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting | The ONLYOFFICE Docs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'onlyoffice' shortcode in all versions up to, and including, 2.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] |
CVE-2025-30964 | WordPress Photography theme <= 7.5.2 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in EPC Photography. This issue affects Photography: from n/a through 7.5.2. | [] |
GHSA-964p-3v8x-fww6 | Improper input validation in Contacts Storage prior to SMR Jul-2022 Release 1 allows attacker to access arbitrary file. | [] |
|
GHSA-qp2g-vj63-24p5 | In btor2parser/btor2parser.c in Boolector Btor2Tools before 2019-01-15, opening a specially crafted input file leads to an out of bounds write in pusht_bfr. | [] |
|
GHSA-p4qg-w83v-686g | IBM Planning Analytics 2.0 allows web pages to be stored locally which can be read by another user on the system. IBM X-Force ID: 190834. | [] |
|
GHSA-ff33-vc6x-7mcf | SPIP before 3.1.11 and 3.2 before 3.2.5 allows authenticated visitors to modify any published content and execute other modifications in the database. This is related to ecrire/inc/meta.php and ecrire/inc/securiser_action.php. | [] |
|
GHSA-x5fm-xvwh-8j69 | Missing Authorization vulnerability in Melodic Media Slide Banners allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Slide Banners: from n/a through 1.3. | [] |
|
CVE-2008-1898 | A certain ActiveX control in WkImgSrv.dll 7.03.0616.0, as distributed in Microsoft Works 7 and Microsoft Office 2003 and 2007, allows remote attackers to execute arbitrary code or cause a denial of service (browser crash) via an invalid WksPictureInterface property value, which triggers an improper function call. | [
"cpe:2.3:a:microsoft:office:2003:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:works:7.0:*:*:*:*:*:*:*"
] |
|
GHSA-562v-pvgc-xrg8 | In the Linux kernel, the following vulnerability has been resolved:drm/amdgpu: fix usage slab after free[ +0.000021] BUG: KASAN: slab-use-after-free in drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[ +0.000027] Read of size 8 at addr ffff8881b8605f88 by task amd_pci_unplug/2147[ +0.000023] CPU: 6 PID: 2147 Comm: amd_pci_unplug Not tainted 6.10.0+ #1
[ +0.000016] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020
[ +0.000016] Call Trace:
[ +0.000008] <TASK>
[ +0.000009] dump_stack_lvl+0x76/0xa0
[ +0.000017] print_report+0xce/0x5f0
[ +0.000017] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[ +0.000019] ? srso_return_thunk+0x5/0x5f
[ +0.000015] ? kasan_complete_mode_report_info+0x72/0x200
[ +0.000016] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[ +0.000019] kasan_report+0xbe/0x110
[ +0.000015] ? drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[ +0.000023] __asan_report_load8_noabort+0x14/0x30
[ +0.000014] drm_sched_entity_flush+0x6cb/0x7a0 [gpu_sched]
[ +0.000020] ? srso_return_thunk+0x5/0x5f
[ +0.000013] ? __kasan_check_write+0x14/0x30
[ +0.000016] ? __pfx_drm_sched_entity_flush+0x10/0x10 [gpu_sched]
[ +0.000020] ? srso_return_thunk+0x5/0x5f
[ +0.000013] ? __kasan_check_write+0x14/0x30
[ +0.000013] ? srso_return_thunk+0x5/0x5f
[ +0.000013] ? enable_work+0x124/0x220
[ +0.000015] ? __pfx_enable_work+0x10/0x10
[ +0.000013] ? srso_return_thunk+0x5/0x5f
[ +0.000014] ? free_large_kmalloc+0x85/0xf0
[ +0.000016] drm_sched_entity_destroy+0x18/0x30 [gpu_sched]
[ +0.000020] amdgpu_vce_sw_fini+0x55/0x170 [amdgpu]
[ +0.000735] ? __kasan_check_read+0x11/0x20
[ +0.000016] vce_v4_0_sw_fini+0x80/0x110 [amdgpu]
[ +0.000726] amdgpu_device_fini_sw+0x331/0xfc0 [amdgpu]
[ +0.000679] ? mutex_unlock+0x80/0xe0
[ +0.000017] ? __pfx_amdgpu_device_fini_sw+0x10/0x10 [amdgpu]
[ +0.000662] ? srso_return_thunk+0x5/0x5f
[ +0.000014] ? __kasan_check_write+0x14/0x30
[ +0.000013] ? srso_return_thunk+0x5/0x5f
[ +0.000013] ? mutex_unlock+0x80/0xe0
[ +0.000016] amdgpu_driver_release_kms+0x16/0x80 [amdgpu]
[ +0.000663] drm_minor_release+0xc9/0x140 [drm]
[ +0.000081] drm_release+0x1fd/0x390 [drm]
[ +0.000082] __fput+0x36c/0xad0
[ +0.000018] __fput_sync+0x3c/0x50
[ +0.000014] __x64_sys_close+0x7d/0xe0
[ +0.000014] x64_sys_call+0x1bc6/0x2680
[ +0.000014] do_syscall_64+0x70/0x130
[ +0.000014] ? srso_return_thunk+0x5/0x5f
[ +0.000014] ? irqentry_exit_to_user_mode+0x60/0x190
[ +0.000015] ? srso_return_thunk+0x5/0x5f
[ +0.000014] ? irqentry_exit+0x43/0x50
[ +0.000012] ? srso_return_thunk+0x5/0x5f
[ +0.000013] ? exc_page_fault+0x7c/0x110
[ +0.000015] entry_SYSCALL_64_after_hwframe+0x76/0x7e
[ +0.000014] RIP: 0033:0x7ffff7b14f67
[ +0.000013] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff
[ +0.000026] RSP: 002b:00007fffffffe378 EFLAGS: 00000246 ORIG_RAX: 0000000000000003
[ +0.000019] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007ffff7b14f67
[ +0.000014] RDX: 0000000000000000 RSI: 00007ffff7f6f47a RDI: 0000000000000003
[ +0.000014] RBP: 00007fffffffe3a0 R08: 0000555555569890 R09: 0000000000000000
[ +0.000014] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fffffffe5c8
[ +0.000013] R13: 00005555555552a9 R14: 0000555555557d48 R15: 00007ffff7ffd040
[ +0.000020] </TASK>[ +0.000016] Allocated by task 383 on cpu 7 at 26.880319s:
[ +0.000014] kasan_save_stack+0x28/0x60
[ +0.000008] kasan_save_track+0x18/0x70
[ +0.000007] kasan_save_alloc_info+0x38/0x60
[ +0.000007] __kasan_kmalloc+0xc1/0xd0
[ +0.000007] kmalloc_trace_noprof+0x180/0x380
[ +0.000007] drm_sched_init+0x411/0xec0 [gpu_sched]
[ +0.000012] amdgpu_device_init+0x695f/0xa610 [amdgpu]
[ +0.000658] amdgpu_driver_load_kms+0x1a/0x120 [amdgpu]
[ +0.000662] amdgpu_pci_p
---truncated--- | [] |
|
CVE-2018-13007 | An issue was discovered in gpmf-parser 1.1.2. There is a heap-based buffer over-read in GPMF_parser.c in the function GPMF_Next, related to certain checks for GPMF_KEY_END and nest_level (not conditional on a buffer_size_longs check). | [
"cpe:2.3:a:gopro:gpmf-parser:1.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2020-1861 | CloudEngine 12800 with versions of V200R001C00SPC600,V200R001C00SPC700,V200R002C01,V200R002C50SPC800,V200R002C50SPC800PWE,V200R003C00SPC810,V200R003C00SPC810PWE,V200R005C00SPC600,V200R005C00SPC800,V200R005C00SPC800PWE,V200R005C10,V200R005C10SPC300 have an information leakage vulnerability in some Huawei products. In some special cases, an authenticated attacker can exploit this vulnerability because the software processes data improperly. Successful exploitation may lead to information leakage. | [
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r001c00spc700:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c01:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r002c50spc800pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r003c00spc810:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r003c00spc810pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c00spc600:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c00spc800:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c00spc800pwe:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c10:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:cloudengine_12800_firmware:v200r005c10spc300:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:cloudengine_12800:-:*:*:*:*:*:*:*"
] |
|
GHSA-3g9v-2x9v-4j4g | In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by adding length validation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9350. | [] |
|
GHSA-58c9-xr9w-j6fj | The SecureSphere Operations Manager (SOM) Management Server in Imperva SecureSphere 9.0.0.5 allows context-dependent attackers to obtain sensitive information by leveraging the presence of (1) a session ID in the jsessionid field to secsphLogin.jsp or (2) credentials in the j_password parameter to j_acegi_security_check, and reading (a) web-server access logs, (b) web-server Referer logs, or (c) the browser history. | [] |
|
GHSA-mp27-f932-mhvw | Vulnerability in the Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Oracle Management Service). Supported versions that are affected are 12.1.0.5, 13.2.0.0 and 13.3.0.0. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Enterprise Manager Base Platform. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Enterprise Manager Base Platform. CVSS 3.0 Base Score 6.0 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L). | [] |
|
GHSA-j8jh-fhfw-jx2c | An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match. | [] |
|
GHSA-755q-vpcq-4v46 | An exploitable buffer overflow vulnerability exists in the camera "create" feature of video-core's HTTP server of Samsung SmartThings Hub STH-ETH-250 devices with firmware version 0.20.17. The video-core process incorrectly extracts the "state" field from a user-controlled JSON payload, leading to a buffer overflow on the stack. An attacker can send an HTTP request to trigger this vulnerability. | [] |
|
CVE-2023-52606 | powerpc/lib: Validate size for vector operations | In the Linux kernel, the following vulnerability has been resolved:
powerpc/lib: Validate size for vector operations
Some of the fp/vmx code in sstep.c assume a certain maximum size for the
instructions being emulated. The size of those operations however is
determined separately in analyse_instr().
Add a check to validate the assumption on the maximum size of the
operations, so as to prevent any unintended kernel stack corruption. | [] |
CVE-2022-39347 | Missing path sanitation with `drive` channel in FreeRDP | FreeRDP is a free remote desktop protocol library and clients. Affected versions of FreeRDP are missing path canonicalization and base path check for `drive` channel. A malicious server can trick a FreeRDP based client to read files outside the shared directory. This issue has been addressed in version 2.9.0 and all users are advised to upgrade. Users unable to upgrade should not use the `/drive`, `/drives` or `+home-drive` redirection switch. | [
"cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] |
CVE-2024-28559 | SQL injection vulnerability in Niushop B2B2C v.5.3.3 and before allows an attacker to escalate privileges via the setPrice() function of the Goodsbatchset.php component. | [
"cpe:2.3:a:niushop:b2b2c_multi-business:*:*:*:*:*:*:*:*"
] |
|
GHSA-76p6-gpvf-6wmv | Directory Traversal in hftp | Affected versions of `hftp` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead. | [] |
CVE-2022-1092 | myCred < 2.4.4 - Subscriber+ Import/Export to Email Address Disclosure | The myCred WordPress plugin before 2.4.3.1 does not have authorisation and CSRF checks in its mycred-tools-import-export AJAX action, allowing any authenticated user to call and and retrieve the list of email address present in the blog | [
"cpe:2.3:a:mycred:mycred:*:*:*:*:*:wordpress:*:*"
] |
GHSA-3w38-w685-6793 | Stunnel 5.00 through 5.13, when using the redirect option, does not redirect client connections to the expected server after the initial connection, which allows remote attackers to bypass authentication. | [] |
|
GHSA-hfgr-j7ww-95r7 | The Transparent Inter-Process Communication (TIPC) functionality in Linux kernel 2.6.16-rc1 through 2.6.33, and possibly other versions, allows local users to cause a denial of service (kernel OOPS) by sending datagrams through AF_TIPC before entering network mode, which triggers a NULL pointer dereference. | [] |
|
GHSA-56qf-rm6g-9hvq | In JetBrains TeamCity before 2023.05.4 stored XSS was possible during nodes configuration | [] |
|
CVE-2025-32068 | Revoking authorization of OAuth2 consumer does not invalidate refresh tokens | Incorrect Authorization vulnerability in The Wikimedia Foundation Mediawiki - OAuth Extension allows Authentication Bypass.This issue affects Mediawiki - OAuth Extension: from 1.39 through 1.43. | [] |
GHSA-x22r-xgr5-23hh | URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Microchip TimeProvider 4100 allows XSS Through HTTP Headers.This issue affects TimeProvider 4100: from 1.0. | [] |
|
CVE-2017-18083 | The editinword resource in Atlassian Confluence Server before version 6.4.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability through the contents of an uploaded file. | [
"cpe:2.3:a:atlassian:confluence:*:*:*:*:*:*:*:*"
] |
|
GHSA-88gp-83c5-44hg | A file disclosure and inclusion vulnerability exists in web/views/file.php in ZoneMinder 1.x through v1.30.0 because of unfiltered user-input being passed to readfile(), which allows an authenticated attacker to read local system files (e.g., /etc/passwd) in the context of the web server user (www-data). The attack vector is a .. (dot dot) in the path parameter within a zm/index.php?view=file&path= request. | [] |
|
CVE-2014-4225 | Unspecified vulnerability in Oracle Sun Solaris 10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Patch installation scripts. | [
"cpe:2.3:o:sun:sunos:5.10:*:*:*:*:*:*:*"
] |
|
CVE-2006-2174 | Multiple cross-site scripting (XSS) vulnerabilities in admin/server_day_stats.php in Virtual Hosting Control System (VHCS) allow remote attackers to inject arbitrary web script or HTML via the (1) day, (2) month, or (3) year parameter. | [
"cpe:2.3:a:virtual_hosting_control_system:virtual_hosting_control_system:2.4.7.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-23162 | Art Gallery Management System Project v1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at product.php. | [
"cpe:2.3:a:phpgurukul:art_gallery_management_system:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2000-0576 | Oracle Web Listener for AIX versions 4.0.7.0.0 and 4.0.8.1.0 allows remote attackers to cause a denial of service via a malformed URL. | [
"cpe:2.3:a:oracle:web_listener:4.0.7:*:aix:*:*:*:*:*",
"cpe:2.3:a:oracle:web_listener:4.0.8:*:aix:*:*:*:*:*"
] |
|
CVE-2024-44192 | The issue was addressed with improved checks. This issue is fixed in watchOS 11, macOS Sequoia 15, Safari 18, visionOS 2, iOS 18 and iPadOS 18, tvOS 18. Processing maliciously crafted web content may lead to an unexpected process crash. | [] |
|
GHSA-ph43-q49h-r73x | Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the 'no icmp check link WORD destination WORD interval <1-255> retries <1-255> description (WORD|null)' command template. | [] |
|
GHSA-4vcq-r7hf-36w7 | coders/wpg.c in GraphicsMagick 1.3.26 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the AcquireCacheNexus function in magick/pixel_cache.c. | [] |
|
GHSA-7mgj-p9v3-3vxr | Heap buffer overflow in Skia in Google Chrome prior to 121.0.6167.160 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] |
|
CVE-2019-1925 | Cisco Webex Network Recording Player and Cisco Webex Player Arbitrary Code Execution Vulnerabilities | Multiple vulnerabilities in Cisco Webex Network Recording Player for Microsoft Windows and Cisco Webex Player for Microsoft Windows could allow an attacker to execute arbitrary code on an affected system. The vulnerabilities exist because the affected software improperly validates Advanced Recording Format (ARF) and Webex Recording Format (WRF) files. An attacker could exploit these vulnerabilities by sending a user a malicious ARF or WRF file through a link or email attachment and persuading the user to open the file with the affected software on the local system. A successful exploit could allow the attacker to execute arbitrary code on the affected system with the privileges of the targeted user. | [
"cpe:2.3:a:cisco:webex_business_suite:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_online:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:3.0mr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_meetings_server:4.0:*:*:*:*:*:*:*"
] |
CVE-2023-0915 | SourceCodester Auto Dealer Management System sql injection | A vulnerability classified as critical has been found in SourceCodester Auto Dealer Management System 1.0. Affected is an unknown function of the file /adms/admin/?page=user/manage_user. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-221490 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:auto_dealer_management_system_project:auto_dealer_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2023-31355 | Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest. | [
"cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7313_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7313:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7313p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7313p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7413_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7413:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7443_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7443:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7443p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7443p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7543_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7543:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7543p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7543p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7643_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7643:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7713_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7713:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_7713p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_7713p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9124_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9124:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9254_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9254:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9354_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9354:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9354p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9354p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9454_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9454:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9454p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9454p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9534_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9534:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9554_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9554:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9554p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9554p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9654_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9654:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amd:epyc_embedded_9654p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amd:epyc_embedded_9654p:-:*:*:*:*:*:*:*"
] |
|
GHSA-wxhv-g8vm-4j32 | coders/psd.c in ImageMagick allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted PSD file. | [] |
|
CVE-2015-4550 | The Cavium cryptographic-module firmware on Cisco Adaptive Security Appliance (ASA) devices with software 9.3(3) and 9.4(1.1) does not verify the AES-GCM Integrity Check Value (ICV) octets, which makes it easier for man-in-the-middle attackers to spoof IPSec and IKEv2 traffic by modifying packet data, aka Bug ID CSCuu66218. | [
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:9.4\\(1.1\\):*:*:*:*:*:*:*"
] |
|
GHSA-c5c5-mvqf-5f35 | Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. These vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. | [] |
|
CVE-2023-28700 | ITPison OMICARD EDM - Arbitrary File Upload | OMICARD EDM backend system’s file uploading function does not restrict upload of file with dangerous type. A local area network attacker with administrator privileges can exploit this vulnerability to upload and run arbitrary executable files to perform arbitrary system commands or disrupt service. | [
"cpe:2.3:a:itpison:omicard_edm:-:*:*:*:*:*:*:*"
] |
CVE-2024-3753 | Hostel < 1.1.5.3 - Reflected XSS | The Hostel WordPress plugin before 1.1.5.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [
"cpe:2.3:a:kibokolabs:hostel:*:*:*:*:*:wordpress:*:*"
] |
GHSA-rw3m-9ff4-qmp2 | Syslifters SysReptor before 2024.40 has a CSRF vulnerability for WebSocket connections. | [] |
|
CVE-2022-23479 | Buffer Overflow occurs in xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP).
xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade. | [
"cpe:2.3:a:neutrinolabs:xrdp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] |
GHSA-vc8h-g97p-fh5j | The psf_fwrite function in file_io.c in libsndfile allows attackers to cause a denial of service (divide-by-zero error and application crash) via unspecified vectors related to the headindex variable. | [] |
|
GHSA-wfr7-6ghr-5g47 | An improper input validation before calling java readLine() method may impact IBM Curam Social Program Management 7.0.9 and 7.0.10, which could result in a denial of service. IBM X-Force ID: 189159. | [] |
|
CVE-2007-3726 | Integer signedness error in the SET_VALUE function in rarvm.cpp in unrar 3.70 beta 3, as used in products including WinRAR and RAR for OS X, allows user-assisted remote attackers to cause a denial of service (crash) via a crafted RAR archive that causes a negative signed number to be cast to a large unsigned number. | [
"cpe:2.3:a:rarlab:unrar:3.70_beta_3:*:*:*:*:*:*:*"
] |
|
GHSA-vc5p-hw28-hrg3 | Inappropriate implementation in Extensions API in Google Chrome prior to 104.0.5112.79 allowed an attacker who convinced a user to install a malicious extension to spoof the contents of the Omnibox (URL bar) via a crafted Chrome Extension. | [] |
|
CVE-2012-3214 | Unspecified vulnerability in the Oracle Outside In Technology component in Oracle Fusion Middleware 8.3.7.0 allows context-dependent attackers to affect availability via unknown vectors related to Outside In Filters. | [
"cpe:2.3:a:oracle:fusion_middleware:8.3.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-3r3f-956m-rpvm | Cross-Site Request Forgery (CSRF) vulnerability in bbodine1 cTabs allows Stored XSS. This issue affects cTabs: from n/a through 1.3. | [] |
|
GHSA-wp4r-62fw-w7wj | A vulnerability, which was classified as critical, has been found in SourceCodester Young Entrepreneur E-Negosyo System 1.0. Affected by this issue is some unknown functionality of the file cart/controller.php?action=add. The manipulation of the argument PROID leads to sql injection. The identifier of this vulnerability is VDB-224624. | [] |
|
GHSA-w965-rvwp-8jc9 | A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151. | [] |
|
CVE-2009-0043 | The smmsnmpd service in CA Service Metric Analysis r11.0 through r11.1 SP1 and Service Level Management 3.5 does not properly restrict access, which allows remote attackers to execute arbitrary commands via unspecified vectors. | [
"cpe:2.3:a:ca:service_level_management:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:service_metric_analysis:r11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:service_metric_analysis:r11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:service_metric_analysis:r11.1:sp1:*:*:*:*:*:*"
] |
|
GHSA-x7cw-79fv-35qf | In the Linux kernel, the following vulnerability has been resolved:scsi: storvsc: Ratelimit warning logs to prevent VM denial of serviceIf there's a persistent error in the hypervisor, the SCSI warning for
failed I/O can flood the kernel log and max out CPU utilization,
preventing troubleshooting from the VM side. Ratelimit the warning so
it doesn't DoS the VM. | [] |
|
CVE-2021-35061 | Multiple cross-site scripting (XSS) vulnerabilities in DRK Odenwaldkreis Testerfassung March-2021 allow remote attackers to inject arbitrary web script or HTML via all parameters to HTML form fields in all components. | [
"cpe:2.3:a:drk-odenwaldkreis:testerfassung:2021-03-31:*:*:*:*:*:*:*"
] |
|
CVE-2022-44634 | WordPress S2W – Import Shopify to WooCommerce plugin <= 1.1.12 - Auth. Arbitrary File Read vulnerability | Auth. (admin+) Arbitrary File Read vulnerability in S2W – Import Shopify to WooCommerce plugin <= 1.1.12 on WordPress. | [
"cpe:2.3:a:villatheme:s2w_-_import_shopify_to_woocommerce:*:*:*:*:*:wordpress:*:*"
] |
CVE-2024-6394 | Local File Inclusion in parisneo/lollms-webui | A Local File Inclusion vulnerability exists in parisneo/lollms-webui versions below v9.8. The vulnerability is due to unverified path concatenation in the `serve_js` function in `app.py`, which allows attackers to perform path traversal attacks. This can lead to unauthorized access to arbitrary files on the server, potentially exposing sensitive information such as private SSH keys, configuration files, and source code. | [
"cpe:2.3:a:parisneo:lollms-webui:*:*:*:*:*:*:*:*"
] |
CVE-2008-0763 | Stack-based buffer overflow in NPSpcSVR.exe in Larson Network Print Server (LstNPS) 9.4.2 build 105 and earlier allows remote attackers to execute arbitrary code via a long argument in a LICENSE command on TCP port 3114. | [
"cpe:2.3:a:larson_software_technology:network_print_server:*:build_105:*:*:*:*:*:*"
] |
|
GHSA-xxwm-xq6m-jwjx | Buffer overflow in dtprintinfo on HP-UX 11.00, and possibly other operating systems, allows local users to gain root privileges via a long DISPLAY environment variable. | [] |
|
CVE-2022-48858 | net/mlx5: Fix a race on command flush flow | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix a race on command flush flow
Fix a refcount use after free warning due to a race on command entry.
Such race occurs when one of the commands releases its last refcount and
frees its index and entry while another process running command flush
flow takes refcount to this command entry. The process which handles
commands flush may see this command as needed to be flushed if the other
process released its refcount but didn't release the index yet. Fix it
by adding the needed spin lock.
It fixes the following warning trace:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 11 PID: 540311 at lib/refcount.c:25 refcount_warn_saturate+0x80/0xe0
...
RIP: 0010:refcount_warn_saturate+0x80/0xe0
...
Call Trace:
<TASK>
mlx5_cmd_trigger_completions+0x293/0x340 [mlx5_core]
mlx5_cmd_flush+0x3a/0xf0 [mlx5_core]
enter_error_state+0x44/0x80 [mlx5_core]
mlx5_fw_fatal_reporter_err_work+0x37/0xe0 [mlx5_core]
process_one_work+0x1be/0x390
worker_thread+0x4d/0x3d0
? rescuer_thread+0x350/0x350
kthread+0x141/0x160
? set_kthread_struct+0x40/0x40
ret_from_fork+0x1f/0x30
</TASK> | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2024-47378 | WordPress WPCOM Member plugin <= 1.5.4 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WPCOM WPCOM Member allows Reflected XSS.This issue affects WPCOM Member: from n/a through 1.5.4. | [] |
GHSA-82f9-vf84-275x | SQL injection vulnerability in showcategory.php in PozScripts Business Directory Script allows remote attackers to execute arbitrary SQL commands via the cid parameter. | [] |
|
CVE-2022-3427 | The Corner Ad plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.56. This is due to missing or incorrect nonce validation on its corner_ad_settings_page function. This makes it possible for unauthenticated attackers to trigger the deletion of ads via forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:dwbooster:corner_ad:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-9v3h-c7cf-2vw8 | A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0904, CVE-2019-0905, CVE-2019-0906, CVE-2019-0907, CVE-2019-0908, CVE-2019-0909. | [] |
|
GHSA-7jrc-cqc8-pcqm | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in FuturioWP Futurio Extra allows Stored XSS.This issue affects Futurio Extra: from n/a through 2.0.14. | [] |
|
GHSA-jr3g-5m6v-p5rw | ovtopmd in HP OpenView Network Node Manager (OV NNM) 6.41, 7.01, and 7.51 allows remote attackers to cause a denial of service (crash) via a crafted TCP request that triggers an out-of-bounds memory access. | [] |
|
GHSA-jqx9-x6x8-85cw | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.40 and prior, 8.4.3 and prior and 9.1.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2023-0102 | CVE-2023-0102 | LS ELECTRIC XBC-DN32U with operating system version 01.80 is missing authentication for its deletion command. This could allow an attacker to delete arbitrary files.
| [
"cpe:2.3:o:ls-electric:xbc-dn32u_firmware:01.80:*:*:*:*:*:*:*",
"cpe:2.3:h:ls-electric:xbc-dn32u:-:*:*:*:*:*:*:*"
] |
GHSA-fjww-grc5-6wh6 | An Arm product family through 2022-01-03 has an Exposed Dangerous Method or Function. | [] |
|
GHSA-xvjw-g673-q26h | The QuickType feature in the Keyboards subsystem in Apple iOS before 8.3 allows physically proximate attackers to discover passcodes by reading the lock screen during use of a Bluetooth keyboard. | [] |
|
CVE-2021-29550 | Division by 0 in `FractionalAvgPool` | TensorFlow is an end-to-end open source platform for machine learning. An attacker can cause a runtime division by zero error and denial of service in `tf.raw_ops.FractionalAvgPool`. This is because the implementation(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L85-L89) computes a divisor quantity by dividing two user controlled values. The user controls the values of `input_size[i]` and `pooling_ratio_[i]` (via the `value.shape()` and `pooling_ratio` arguments). If the value in `input_size[i]` is smaller than the `pooling_ratio_[i]`, then the floor operation results in `output_size[i]` being 0. The `DCHECK_GT` line is a no-op outside of debug mode, so in released versions of TF this does not trigger. Later, these computed values are used as arguments(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_avg_pool_op.cc#L96-L99) to `GeneratePoolingSequence`(https://github.com/tensorflow/tensorflow/blob/acc8ee69f5f46f92a3f1f11230f49c6ac266f10c/tensorflow/core/kernels/fractional_pool_common.cc#L100-L108). There, the first computation is a division in a modulo operation. Since `output_length` can be 0, this results in runtime crashing. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*"
] |
GHSA-hg49-9432-gc83 | A vulnerability in the web-based management interface of Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf37392. | [] |
|
GHSA-6367-j8qr-9jv9 | Open redirect vulnerability in the Node basket module for Drupal allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. | [] |
|
CVE-2024-8557 | SourceCodester Food Ordering Management System cancel-order.php sql injection | A vulnerability classified as critical has been found in SourceCodester Food Ordering Management System 1.0. This affects an unknown part of the file /foms/routers/cancel-order.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:food_ordering_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:food_ordering_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2020-36225 | A flaw was discovered in OpenLDAP before 2.4.57 leading to a double free and slapd crash in the saslAuthzTo processing, resulting in denial of service. | [
"cpe:2.3:a:openldap:openldap:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2015-0001 | The Windows Error Reporting (WER) component in Microsoft Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to bypass the Protected Process Light protection mechanism and read the contents of arbitrary process-memory locations by leveraging administrative privileges, aka "Windows Error Reporting Security Feature Bypass Vulnerability." | [
"cpe:2.3:o:microsoft:windows_8:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt:-:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:x64:*:*"
] |
|
CVE-2002-1892 | NETGEAR FVS318 running firmware 1.1 stores the username and password in a readable format when a backup of the configuration file is made, which allows local users to obtain sensitive information. | [
"cpe:2.3:h:netgear:fvs318:1.1:*:*:*:*:*:*:*"
] |
|
CVE-2017-11799 | ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11792, CVE-2017-11793, CVE-2017-11796, CVE-2017-11797, CVE-2017-11798, CVE-2017-11800, CVE-2017-11801, CVE-2017-11802, CVE-2017-11804, CVE-2017-11805, CVE-2017-11806, CVE-2017-11807, CVE-2017-11808, CVE-2017-11809, CVE-2017-11810, CVE-2017-11811, CVE-2017-11812, and CVE-2017-11821. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
|
GHSA-8gxg-5254-fr47 | Integer overflow in ImageIO for Apple Mac OS X 10.4.7 allows user-assisted attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted Radiance image. | [] |
|
GHSA-fp8w-ccf9-rfr2 | The safe_path function in shttp before 0.0.5 allows remote attackers to conduct directory traversal attacks and read files via a combination of ".." and sub-directory specifiers that resolve to a pathname that is at or below the same level as the web document root, but in a different part of the directory tree. | [] |
|
GHSA-2f8f-mr6r-cvh9 | Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, dereference a heap object after this object's deletion, which allows attackers to execute arbitrary code via unspecified vectors. | [] |
|
CVE-2024-47130 | Missing Authentication for Critical Function in goTenna Pro | The goTenna Pro App allows unauthenticated attackers to remotely update
the local public keys used for P2P and group messages. It is advised to
update your app to the current release for enhanced encryption
protocols. | [
"cpe:2.3:a:gotenna:pro_app:*:*:*:*:*:*:*:*",
"cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:a:gotenna:gotenna_pro:*:*:*:*:*:android:*:*"
] |
GHSA-2qjp-mp57-2fp8 | Vulnerability in the Oracle Application Object Library product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.2.6-12.2.13. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Application Object Library. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Application Object Library, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Application Object Library accessible data as well as unauthorized read access to a subset of Oracle Application Object Library accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | [] |
|
CVE-2018-5664 | An issue was discovered in the responsive-coming-soon-page plugin 1.1.18 for WordPress. XSS exists via the wp-admin/admin.php social_icon_1 parameter. | [
"cpe:2.3:a:responsive_coming_soon_page_project:responsive_coming_soon_page:1.1.18:*:*:*:*:wordpress:*:*"
] |
|
CVE-2020-9840 | In SwiftNIO Extras before 1.4.1, a logic issue was addressed with improved restrictions. | [
"cpe:2.3:a:apple:nioextras:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-2253 | Jenkins Email Extension Plugin 2.75 and earlier does not perform hostname validation when connecting to the configured SMTP server. | [
"cpe:2.3:a:jenkins:email_extension:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-hfm8-2q22-h7hv | Cross-site Scripting in pegasus/google-for-jobs | An XSS issue was discovered in the google_for_jobs (aka Google for Jobs) extension before 1.5.1 and 2.x before 2.1.1 for TYPO3. The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | [] |
GHSA-c72m-36q5-4cfc | Multiple SQL injection vulnerabilities in Plogger 3.0 and earlier allow remote attackers to execute arbitrary SQL commands via (1) the checked array parameter to plog-download.php in an album action and (2) unspecified parameters to plog-remote.php, and (3) allow remote authenticated administrators to execute arbitrary SQL commands via the activate parameter to admin/plog-themes.php, related to theme_dir settings. | [] |
|
GHSA-2cj5-9fm4-hqv6 | sHibby sHop 2.2 and earlier stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request to Db/urun.mdb. | [] |
|
GHSA-38m5-j785-6vrx | SAP Cloud Platform Integration for Data Services, version 1.0, allows user inputs to be reflected as error or warning massages. This could mislead the victim to follow malicious instructions inserted by external attackers, leading to Cross Site Request Forgery. | [] |
|
GHSA-gfmf-37px-c964 | The setup_server_realm function in main.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.10.7, when multiple realms are configured, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted request. | [] |
|
CVE-2014-4880 | Buffer overflow in Hikvision DVR DS-7204 Firmware 2.2.10 build 131009, and other models and versions, allows remote attackers to execute arbitrary code via an RTSP PLAY request with a long Authorization header. | [
"cpe:2.3:o:hikvision:dvr_ds-7204_firmware:2.2.10:build_131009:*:*:*:*:*:*",
"cpe:2.3:h:hikvision:dvr_ds-7204:-:*:*:*:*:*:*:*"
] |
|
CVE-2007-3362 | ageet AGEphone before 1.6.2, running on Windows Mobile 5 on the HTC HyTN Pocket PC device, allows remote attackers to (1) cause a denial of service (call disruption and device hang) via a SIP message with a malformed header and (2) cause a denial of service (call disruption, false ring indication, and device outage) via a SIP message with a malformed SDP delimiter. | [
"cpe:2.3:o:microsoft:windows_mobile:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:htc:hytn:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ageet:agephone:*:*:*:*:*:*:*:*"
] |
|
GHSA-7xr3-6fgq-rv6h | Electra Central AC unit – Hardcoded Credentials in unspecified code used by the unit. | [] |
|
CVE-2020-15606 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9720. | [
"cpe:2.3:a:control-webpanel:webpanel:0.9.8.923:*:*:*:*:*:*:*"
] |
|
GHSA-qqj6-jj3r-6r83 | Cross-site scripting (XSS) vulnerability in TaskFreak! before 0.5.7 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, possibly a variant of CVE-2007-0982. | [] |
|
CVE-2019-13238 | An issue was discovered in Bento4 1.5.1.0. A memory allocation failure is unhandled in Core/Ap4SdpAtom.cpp and leads to crashes. When parsing input video, the program allocates a new buffer to parse an atom in the stream. The unhandled memory allocation failure causes a direct copy to a NULL pointer. | [
"cpe:2.3:a:axiosys:bento4:1.5.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-fhp7-78j6-88pw | The wpa_supplicant system service in Samsung Galaxy Gear series allows an unprivileged process to fully control the Wi-Fi interface, due to the lack of its D-Bus security policy configurations. This affects Tizen-based firmwares including Samsung Galaxy Gear series before build RE2. | [] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.