id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
4.89k
GHSA-f9fv-pv8g-g96g
An issue was discovered in JerryScript 1.0. There is a heap-based buffer over-read in the lit_read_code_unit_from_utf8 function via a RegExp("[\\u0020") payload, related to re_parse_char_class in parser/regexp/re-parser.c.
[]
CVE-2007-3409
Net::DNS before 0.60, a Perl module, allows remote attackers to cause a denial of service (stack consumption) via a malformed compressed DNS packet with self-referencing pointers, which triggers an infinite loop.
[ "cpe:2.3:a:net-dns:net\\:\\:dns:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:6.10:*:*:*:*:*:*:*" ]
CVE-2025-1757
WordPress Portfolio Builder – Portfolio Gallery <= 1.1.7 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
GHSA-2mw8-v4w5-29m4
Rejected reason: Not used
[]
CVE-2019-13332
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 9.6.0.25114. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of templates in XFA forms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9149.
[ "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-6g3h-98q3-6fwf
The application OpenEMR version 5.0.0, 5.0.1-dev and prior is affected by vertical privilege escalation vulnerability. This vulnerability can allow an authenticated non-administrator users to view and modify information only accessible to administrators.
[]
GHSA-5423-jcjm-2gpv
Traefik affected by Go HTTP Request Smuggling Vulnerability
Summarynet/http: request smuggling through invalid chunked data: The net/http package accepts data in the chunked transfer encoding containing an invalid chunk-size line terminated by a bare LF. When used in conjunction with a server or proxy which incorrectly interprets a bare LF in a chunk extension as part of the extension, this could permit request smuggling. [CVE-2025-22871] Vendor Affected Components: Go: 1.23.x < 1.23.8More Details: [CVE-2025-22871](https://nvd.nist.gov/vuln/detail/CVE-2025-22871)Patcheshttps://github.com/traefik/traefik/releases/tag/v2.11.24https://github.com/traefik/traefik/releases/tag/v3.3.6https://github.com/traefik/traefik/releases/tag/v3.4.0-rc2
[]
CVE-2011-1783
The mod_dav_svn module for the Apache HTTP Server, as distributed in Apache Subversion 1.5.x and 1.6.x before 1.6.17, when the SVNPathAuthz short_circuit option is enabled, allows remote attackers to cause a denial of service (infinite loop and memory consumption) in opportunistic circumstances by requesting data.
[ "cpe:2.3:a:apache:subversion:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:14:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:15:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*" ]
GHSA-59gh-4pp9-3287
An issue in BoltWire v.6.03 allows a remote attacker to obtain sensitive information via a crafted payload to the view and change admin password function.
[]
GHSA-4fc7-mvrr-wv2c
Issue summary: Calling the OpenSSL API function SSL_select_next_proto with an empty supported client protocols buffer may cause a crash or memory contents to be sent to the peer.Impact summary: A buffer overread can have a range of potential consequences such as unexpected application beahviour or a crash. In particular this issue could result in up to 255 bytes of arbitrary private data from memory being sent to the peer leading to a loss of confidentiality. However, only applications that directly call the SSL_select_next_proto function with a 0 length list of supported client protocols are affected by this issue. This would normally never be a valid scenario and is typically not under attacker control but may occur by accident in the case of a configuration or programming error in the calling application.The OpenSSL API function SSL_select_next_proto is typically used by TLS applications that support ALPN (Application Layer Protocol Negotiation) or NPN (Next Protocol Negotiation). NPN is older, was never standardised and is deprecated in favour of ALPN. We believe that ALPN is significantly more widely deployed than NPN. The SSL_select_next_proto function accepts a list of protocols from the server and a list of protocols from the client and returns the first protocol that appears in the server list that also appears in the client list. In the case of no overlap between the two lists it returns the first item in the client list. In either case it will signal whether an overlap between the two lists was found. In the case where SSL_select_next_proto is called with a zero length client list it fails to notice this condition and returns the memory immediately following the client list pointer (and reports that there was no overlap in the lists).This function is typically called from a server side application callback for ALPN or a client side application callback for NPN. In the case of ALPN the list of protocols supplied by the client is guaranteed by libssl to never be zero in length. The list of server protocols comes from the application and should never normally be expected to be of zero length. In this case if the SSL_select_next_proto function has been called as expected (with the list supplied by the client passed in the client/client_len parameters), then the application will not be vulnerable to this issue. If the application has accidentally been configured with a zero length server list, and has accidentally passed that zero length server list in the client/client_len parameters, and has additionally failed to correctly handle a "no overlap" response (which would normally result in a handshake failure in ALPN) then it will be vulnerable to this problem.In the case of NPN, the protocol permits the client to opportunistically select a protocol when there is no overlap. OpenSSL returns the first client protocol in the no overlap case in support of this. The list of client protocols comes from the application and should never normally be expected to be of zero length. However if the SSL_select_next_proto function is accidentally called with a client_len of 0 then an invalid memory pointer will be returned instead. If the application uses this output as the opportunistic protocol then the loss of confidentiality will occur.This issue has been assessed as Low severity because applications are most likely to be vulnerable if they are using NPN instead of ALPN - but NPN is not widely used. It also requires an application configuration or programming error. Finally, this issue would not typically be under attacker control making active exploitation unlikely.The FIPS modules in 3.3, 3.2, 3.1 and 3.0 are not affected by this issue.Due to the low severity of this issue we are not issuing new releases of OpenSSL at this time. The fix will be included in the next releases when they become available.
[]
GHSA-4fgh-2vxj-rhg5
Philips IntelliSpace Portal all versions of 8.0.x, and 7.0.x have an SSL incorrect hostname certificate vulnerability this could allow an attacker to gain unauthorized access to resources and information.
[]
CVE-2023-2418
Konga Login API random values
A vulnerability was found in Konga 2.8.3 on Kong. It has been classified as problematic. This affects an unknown part of the component Login API. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The associated identifier of this vulnerability is VDB-227715.
[ "cpe:2.3:a:konghq:kong:2.8.3:*:*:*:*:*:*:*" ]
CVE-2025-30535
WordPress External image replace plugin <= 1.0.8 - Cross Site Request Forgery (CSRF) to Settings Change vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in muro External image replace allows Cross Site Request Forgery. This issue affects External image replace: from n/a through 1.0.8.
[]
CVE-2022-4631
WP-Ban ban-options.php cross site scripting
A vulnerability, which was classified as problematic, was found in WP-Ban. Affected is an unknown function of the file ban-options.php. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The name of the patch is 22b925449c84faa9b7496abe4f8f5661cb5eb3bf. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-216480.
[ "cpe:2.3:a:wp-ban_project:wp-ban:-:*:*:*:*:wordpress:*:*" ]
CVE-2020-21523
A Server-Side Freemarker template injection vulnerability in halo CMS v1.1.3 In the Edit Theme File function. The ftl file can be edited. This is the Freemarker template file. This file can cause arbitrary code execution when it is rendered in the background. exp: <#assign test="freemarker.template.utility.Execute"?new()> ${test("touch /tmp/freemarkerPwned")}
[ "cpe:2.3:a:halo:halo:1.1.3:*:*:*:*:*:*:*" ]
GHSA-99cg-fq8g-hrc9
HP Virtual Connect Enterprise Manager (VCEM) SDK before 7.5.0, as used in HP Matrix Operating Environment before 7.5.0 and other products, allows remote authenticated users to obtain sensitive information via unspecified vectors.
[]
CVE-2024-9896
BBP Core – Expand bbPress powered forums with useful features <= 1.2.5 - Reflected Cross-Site Scripting via add_query_arg Parameter
The BBP Core – Expand bbPress powered forums with useful features plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.2.5. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[ "cpe:2.3:a:spider-themes:bbp_core:*:*:*:*:*:wordpress:*:*" ]
GHSA-gv23-mcr7-vrqf
PTC Codebeamer is vulnerable to a cross site scripting vulnerability that could allow an attacker to inject and execute malicious code.
[]
GHSA-6mpm-xvfm-qh84
Sysax Multi Server 6.99 is vulnerable to a denial of service (DoS) condition when processing specially crafted SSH packets.
[]
CVE-2011-4347
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel before 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of service (host OS crash) via a KVM_ASSIGN_PCI_DEVICE operation.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.2:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.3:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.4:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.6:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.7:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:3.1.8:*:*:*:*:*:*:*" ]
CVE-2022-35777
Visual Studio Remote Code Execution Vulnerability
Visual Studio Remote Code Execution Vulnerability
[ "cpe:2.3:a:microsoft:visual_studio:2012:update_5:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio:2013:update_5:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio:2015:update3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:17.0:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visual_studio_2022:17.2:*:*:*:*:*:*:*" ]
CVE-2014-4688
pfSense before 2.1.4 allows remote authenticated users to execute arbitrary commands via (1) the hostname value to diag_dns.php in a Create Alias action, (2) the smartmonemail value to diag_smart.php, or (3) the database value to status_rrd_graph_img.php.
[ "cpe:2.3:a:netgate:pfsense:*:*:*:*:*:*:*:*" ]
CVE-2023-1666
SourceCodester Automatic Question Paper Generator System GET Parameter view_class.php sql injection
A vulnerability has been found in SourceCodester Automatic Question Paper Generator System 1.0 and classified as critical. This vulnerability affects unknown code of the file users/classes/view_class.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-224104.
[ "cpe:2.3:a:automatic_question_paper_generator_system_project:automatic_question_paper_generator_system:1.0:*:*:*:*:*:*:*" ]
CVE-2024-45406
Craft CMS stored XSS in breadcrumb list and title fields
Craft is a content management system (CMS). Craft CMS 5 stored XSS can be triggered by the breadcrumb list and title fields with user input.
[ "cpe:2.3:a:craftcms:craft_cms:*:*:*:*:*:*:*:*" ]
CVE-2024-39482
bcache: fix variable length array abuse in btree_iter
In the Linux kernel, the following vulnerability has been resolved: bcache: fix variable length array abuse in btree_iter btree_iter is used in two ways: either allocated on the stack with a fixed size MAX_BSETS, or from a mempool with a dynamic size based on the specific cache set. Previously, the struct had a fixed-length array of size MAX_BSETS which was indexed out-of-bounds for the dynamically-sized iterators, which causes UBSAN to complain. This patch uses the same approach as in bcachefs's sort_iter and splits the iterator into a btree_iter with a flexible array member and a btree_iter_stack which embeds a btree_iter as well as a fixed-length data array.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
CVE-2023-0071
WP Tabs < 2.1.17 - Contributor+ Stored XSS
The WP Tabs WordPress plugin before 2.1.17 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
[ "cpe:2.3:a:shapedplugin:wp_tabs:*:*:*:*:*:wordpress:*:*" ]
CVE-2002-0469
Ecartis (formerly Listar) 1.0.0 in snapshot 20020125 and earlier does not properly drop privileges when Ecartis is installed setuid-root, "lock-to-user" is not set, and ecartis is called by certain MTA's, which could allow local users to gain privileges.
[ "cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-21:*:*:*:*:*:*:*", "cpe:2.3:a:ecartis:ecartis:1.0.0_snapshot_2002-01-25:*:*:*:*:*:*:*", "cpe:2.3:a:listar:listar:0.126a:*:*:*:*:*:*:*", "cpe:2.3:a:listar:listar:0.127a:*:*:*:*:*:*:*", "cpe:2.3:a:listar:listar:0.129a:*:*:*:*:*:*:*" ]
GHSA-pwcw-6f5g-gxf8
Helm vulnerable to information disclosure via getHostByName Function
A Helm contributor discovered an information disclosure vulnerability using the `getHostByName` template function.Impact`getHostByName` is a Helm template function introduced in Helm v3. The function is able to accept a hostname and return an IP address for that hostname. To get the IP address the function performs a DNS lookup. The DNS lookup happens when used with `helm install|upgrade|template` or when the Helm SDK is used to render a chart.Information passed into the chart can be disclosed to the DNS servers used to lookup the IP address. For example, a malicious chart could inject `getHostByName` into a chart in order to disclose values to a malicious DNS server.PatchesThe issue has been fixed in Helm 3.11.1.WorkaroundsPrior to using a chart with Helm verify the `getHostByName` function is not being used in a template to disclose any information you do not want passed to DNS servers.For more informationHelm's security policy is spelled out in detail in our [SECURITY](https://github.com/helm/community/blob/master/SECURITY.md) document.CreditsDisclosed by Philipp Stehle at SAP.
[]
CVE-2018-15481
Improper input sanitization within the restricted administration shell on UCOPIA Wireless Appliance devices using firmware version 5.1.x before 5.1.13 allows authenticated remote attackers to escape the shell and escalate their privileges by adding a LocalCommand to the SSH configuration file in the user home folder.
[ "cpe:2.3:o:ucopia:wireless_appliance_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:ucopia:wireless_appliance:-:*:*:*:*:*:*:*" ]
GHSA-p9wv-xg3r-33r2
Adobe Shockwave Player before 11.5.8.612 does not properly validate offset values in the rcsL RIFF chunks of (1) .DIR and (2) .DCR Director movies, which allows remote attackers to cause a denial of service (heap memory corruption) or execute arbitrary code via a crafted movie.
[]
CVE-2004-0231
Multiple vulnerabilities in Midnight Commander (mc) before 4.6.0, with unknown impact, related to "Insecure temporary file and directory creations."
[ "cpe:2.3:a:midnight_commander:midnight_commander:4.5.40:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.41:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.42:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.43:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.44:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.45:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.46:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.47:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.48:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.49:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.50:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.51:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.52:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.5.55:*:*:*:*:*:*:*", "cpe:2.3:a:midnight_commander:midnight_commander:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.3:*:*:*:*:*:*:*", "cpe:2.3:a:sgi:propack:2.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:slackware:slackware_linux:9.1:*:*:*:*:*:*:*" ]
CVE-2024-30211
Improper access control in some Intel(R) ME driver pack installer engines before version 2422.6.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2024-3758
Hmdfs has a heap buffer overflow vulnerability
in OpenHarmony v4.0.0 and prior versions allow a local attacker arbitrary code execution in TCB through heap buffer overflow.
[ "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*" ]
CVE-2007-5963
Unspecified vulnerability in kdebase allows local users to cause a denial of service (KDM login inaccessible, or resource consumption) via unknown vectors.
[ "cpe:2.3:o:kde:kde:*:*:*:*:*:*:*:*" ]
CVE-2021-39861
Adobe Acrobat Reader DC Catalog Plugin Out-of-Bounds Read Bug
Acrobat Reader DC versions 2021.005.20060 (and earlier), 2020.004.30006 (and earlier) and 2017.011.30199 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of arbitrary memory information in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_2017:*:*:*:*:classic_2017:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_2017:*:*:*:*:classic_2017:*:*:*", "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*" ]
CVE-2008-0914
Multiple cross-site scripting (XSS) vulnerabilities in the Mediation server in IPdiva SSL VPN Server 2.2 before 2.2.8.84 and 2.3 before 2.3.2.14 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:ipdiva:ipdiva:2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ipdiva:ipdiva:2.3:*:*:*:*:*:*:*" ]
CVE-2023-22048
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Pluggable Auth). Supported versions that are affected are 8.0.33 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.1 Base Score 3.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N).
[ "cpe:2.3:a:oracle:mysql_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*" ]
GHSA-gc7p-h58r-x4mr
Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(4) and earlier allow remote attackers to cause a denial of service via a flood of packets, aka Bug ID CSCtg06316.
[]
GHSA-w7j8-5xhg-jwrw
TRITON AP-EMAIL 8.2 before 8.2 IB does not properly restrict file access in an unspecified directory.
[]
GHSA-4fqg-89cc-5pv5
Malicious Package in sj-labc
All versions of `sj-labc` contain malicious code. The package downloads and runs a script that opens a reverse shell in the system.RecommendationAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer.The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.
[]
CVE-2020-8916
Memory leak in wpanctl can lead to DoS
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to restrict access in your debug environments.
[ "cpe:2.3:a:openthread:wpantund:*:*:*:*:*:*:*:*" ]
GHSA-jrp9-wjr5-77p4
A vulnerability in the REST API of Cisco Firepower Device Manager (FDM) On-Box Software could allow an authenticated, remote attacker to execute arbitrary code on the underlying operating system of an affected device. This vulnerability is due to insufficient sanitization of user input on specific REST API commands. An attacker could exploit this vulnerability by sending a crafted HTTP request to the API subsystem of an affected device. A successful exploit could allow the attacker to execute arbitrary code on the underlying operating system. To exploit this vulnerability, an attacker would need valid low-privileged user credentials.
[]
GHSA-mcm3-pfm7-4jqc
Cross Site Scripting vulnerability in CMSmadesimple v.2.2.18 allows a local attacker to execute arbitrary code via a crafted script to the password and password again parameters in the My Preferences - Add user component.
[]
GHSA-xrxc-cv69-f3fp
Arbitrary file upload to web root in the IDAttend’s IDWeb application 3.1.013 allows authenticated attackers to upload dangerous files to web root such as ASP or ASPX, gaining command execution on the affected server.
[]
GHSA-6vq9-c7rm-r447
In the Linux kernel, the following vulnerability has been resolved:wifi: rtw88: usb: schedule rx work after everything is set upRight now it's possible to hit NULL pointer dereference in rtw_rx_fill_rx_status on hw object and/or its fields because initialization routine can start getting USB replies before rtw_dev is fully setup.The stack trace looks like this:rtw_rx_fill_rx_status rtw8821c_query_rx_desc rtw_usb_rx_handler ... queue_work rtw_usb_read_port_complete ... usb_submit_urb rtw_usb_rx_resubmit rtw_usb_init_rx rtw_usb_probeSo while we do the async stuff rtw_usb_probe continues and calls rtw_register_hw, which does all kinds of initialization (e.g. via ieee80211_register_hw) that rtw_rx_fill_rx_status relies on.Fix this by moving the first usb_submit_urb after everything is set up.For me, this bug manifested as: [ 8.893177] rtw_8821cu 1-1:1.2: band wrong, packet dropped [ 8.910904] rtw_8821cu 1-1:1.2: hw->conf.chandef.chan NULL in rtw_rx_fill_rx_status because I'm using Larry's backport of rtw88 driver with the NULL checks in rtw_rx_fill_rx_status.
[]
CVE-2019-5867
Out of bounds read in JavaScript in Google Chrome prior to 76.0.3809.100 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-q966-x4v8-whfm
Missing Authorization vulnerability in Mateusz Czardybon Justified Gallery allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Justified Gallery: from n/a through 1.7.3.
[]
GHSA-x9wg-fm6f-f8w7
Nessus versions 8.2.1 and earlier were found to contain a stored XSS vulnerability due to improper validation of user-supplied input. An authenticated, remote attacker could potentially exploit this vulnerability via a specially crafted request to execute arbitrary script code in a user's browser session. Tenable has released Nessus 8.2.2 to address this issue.
[]
CVE-2021-4357
The uListing plugin for WordPress is vulnerable to authorization bypass due to missing capability checks, and a missing security nonce, on the UlistingUserRole::save_role_api function in versions up to, and including, 1.6.6. This makes it possible for unauthenticated attackers to arbitrarily delete site posts and pages.
[ "cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*" ]
GHSA-qgjq-qw4q-mfpv
A vulnerability has been found in OpenBMB XAgent up to 1.0.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /conv/community. The manipulation leads to path traversal. The exploit has been disclosed to the public and may be used.
[]
CVE-2025-52474
WeGIA SQL Injection Vulnerability in id Parameter on control.php Endpoint
WeGIA is a web manager for charitable institutions. Prior to version 3.4.2, a SQL Injection vulnerability was identified in the id parameter of the /WeGIA/controle/control.php endpoint. This vulnerability allows attacker to manipulate SQL queries and access sensitive database information, such as table names and sensitive data. This issue has been patched in version 3.4.2.
[]
GHSA-m256-5rj4-75c4
The Tiempo.com WordPress plugin through 0.1.2 does not have CSRF check when creating and editing its shortcode, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack
[]
CVE-2008-1390
The AsteriskGUI HTTP server in Asterisk Open Source 1.4.x before 1.4.19-rc3 and 1.6.x before 1.6.0-beta6, Business Edition C.x.x before C.1.6, AsteriskNOW before 1.0.2, Appliance Developer Kit before revision 104704, and s800i 1.0.x before 1.1.0.2 generates insufficiently random manager ID values, which makes it easier for remote attackers to hijack a manager session via a series of ID guesses.
[ "cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.8:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.9:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.10:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.11:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.12:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.13:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.14:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.15:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.16:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.17:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4.18.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.4_revision_95946:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisk_business_edition:c.1.0-beta8:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisknow:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:asterisknow:beta_7:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:s800i:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:s800i:1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:s800i:1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:s800i:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:asterisk:s800i:1.1.0:*:*:*:*:*:*:*" ]
CVE-2023-29121
Exposed TCF agent service in Enel X Juicebox
Waybox Enel TCF Agent service could be used to get administrator’s privileges over the Waybox system.
[ "cpe:2.3:a:enel_x:juicebox_pro3.0_22kw_cellular:*:*:*:*:*:*:*:*", "cpe:2.3:o:enelx:waybox_pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:enelx:waybox_pro:3.0:*:*:*:*:*:*:*" ]
CVE-2022-36008
Message length overflow in frontier
Frontier is Substrate's Ethereum compatibility layer. A security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you have a bridge node that needs to distinguish different reversion exit reasons and you used RPC for this. There are currently no known workarounds.
[ "cpe:2.3:a:parity:frontier:-:*:*:*:*:*:*:*" ]
GHSA-h598-h2hg-rch5
LCDS Laquis SCADA prior to version 4.1.0.4150 allows an attacker using a specially crafted project file to supply a pointer for a controlled memory address, which may allow remote code execution, data exfiltration, or cause a system crash.
[]
CVE-2023-3774
Vault Enterprise Namespace Creation May Lead to Denial of Service
An unhandled error in Vault Enterprise's namespace creation may cause the Vault process to crash, potentially resulting in denial of service. Fixed in 1.14.1, 1.13.5, and 1.12.9.
[ "cpe:2.3:a:hashicorp:vault:1.12.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:hashicorp:vault:1.13.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:hashicorp:vault:1.14.0:*:*:*:enterprise:*:*:*" ]
GHSA-838x-prqr-qg3c
Insecure inherited permissions in the NVM Update Utility for some Intel(R) Ethernet Network Adapter E810 Series before version 4.60 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
CVE-2020-6960
The following versions of MAXPRO VMS and NVR, MAXPRO VMS:HNMSWVMS prior to Version VMS560 Build 595 T2-Patch, HNMSWVMSLT prior to Version VMS560 Build 595 T2-Patch, MAXPRO NVR: MAXPRO NVR XE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR SE prior to Version NVR 5.6 Build 595 T2-Patch, MAXPRO NVR PE prior to Version NVR 5.6 Build 595 T2-Patch, and MPNVRSWXX prior to Version NVR 5.6 Build 595 T2-Patch contain an SQL injection vulnerability that could give an attacker remote unauthenticated access to the web user interface with administrator-level privileges.
[ "cpe:2.3:o:honeywell:maxpro_nvr_xe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:maxpro_nvr_xe:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:maxpro_nvr_se_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:maxpro_nvr_se:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:maxpro_nvr_pe_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:maxpro_nvr_pe:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:mpnvrswxx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:mpnvrswxx:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hnmswvms_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hnmswvms:-:*:*:*:*:*:*:*", "cpe:2.3:o:honeywell:hnmswvmslt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:honeywell:hnmswvmslt:-:*:*:*:*:*:*:*" ]
CVE-2019-20643
NETGEAR RAX40 devices before 1.0.3.64 are affected by disclosure of sensitive information.
[ "cpe:2.3:o:netgear:rax40_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:rax40:-:*:*:*:*:*:*:*" ]
GHSA-9q3v-827r-c9mw
The myCred WordPress plugin before 2.3 does not validate or escape the fields parameter before using it in a SQL statement, leading to an SQL injection exploitable by any authenticated user
[]
GHSA-22vq-wcg7-jq7r
The socket implementation in net/core/sock.c in the Linux kernel before 2.6.35 does not properly manage a backlog of received packets, which allows remote attackers to cause a denial of service by sending a large amount of network traffic, related to the sk_add_backlog function and the sk_rmem_alloc socket field. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4251.
[]
CVE-2020-7942
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run. This issue can be mitigated by setting `strict_hostname_checking = true` in `puppet.conf` on your Puppet master. Puppet 6.13.0 and 5.5.19 changes the default behavior for strict_hostname_checking from false to true. It is recommended that Puppet Open Source and Puppet Enterprise users that are not upgrading still set strict_hostname_checking to true to ensure secure behavior. Affected software versions: Puppet 6.x prior to 6.13.0 Puppet Agent 6.x prior to 6.13.0 Puppet 5.5.x prior to 5.5.19 Puppet Agent 5.5.x prior to 5.5.19 Resolved in: Puppet 6.13.0 Puppet Agent 6.13.0 Puppet 5.5.19 Puppet Agent 5.5.19
[ "cpe:2.3:a:puppet:puppet:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_agent:*:*:*:*:*:*:*:*" ]
GHSA-vm3m-gqc9-52ch
The Wildog/flask-file-server repository through 2020-02-20 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[]
CVE-2025-31843
WordPress OpenAI Tools for WordPress & WooCommerce plugin <= 2.1.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in Wilson OpenAI Tools for WordPress & WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects OpenAI Tools for WordPress & WooCommerce: from n/a through 2.1.5.
[]
CVE-2010-2505
Soft SaschArt SasCAM Webcam Server 2.6.5, 2.7, and earlier allows remote attackers to cause a denial of service (crash) via a large number of requests with a long line, as demonstrated using a long GET request.
[ "cpe:2.3:a:saschart:sascam_webcam_server:*:*:*:*:*:*:*:*", "cpe:2.3:a:saschart:sascam_webcam_server:2.6.5:*:*:*:*:*:*:*" ]
GHSA-x9vj-7v57-p27f
llcp_sock_create in net/nfc/llcp_sock.c in the AF_NFC network module in the Linux kernel through 5.3.2 does not enforce CAP_NET_RAW, which means that unprivileged users can create a raw socket, aka CID-3a359798b176.
[]
GHSA-9q5j-6j5r-qjfh
Cross-site request forgery (CSRF) vulnerability in the Administrative Console in IBM WebSphere Application Server (WAS) 6.x through 6.1.0.47, 7.0 before 7.0.0.35, 8.0 before 8.0.0.10, and 8.5 before 8.5.5.4 allows remote authenticated users to hijack the authentication of arbitrary users for requests that insert XSS sequences.
[]
CVE-2015-3872
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 23346388.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*" ]
CVE-2018-0770
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
[ "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*" ]
GHSA-8v6j-vg6w-6wwj
langgenius/dify version 0.9.1 contains a Server-Side Request Forgery (SSRF) vulnerability. The vulnerability exists due to improper handling of the api_endpoint parameter, allowing an attacker to make direct requests to internal network services. This can lead to unauthorized access to internal servers and potentially expose sensitive information, including access to the AWS metadata endpoint.
[]
GHSA-692g-rgm4-9v87
Insertion of sensitive information into log vulnerability in Locksettings prior to SMR Sep-2023 Release 1 allows a privileged local attacker to get lock screen match information from the log.
[]
GHSA-9qcx-32pg-7pqp
Integer overflow in the keycompare_mb function in sort.c in sort in GNU Coreutils through 8.23 might allow attackers to cause a denial of service (application crash) or possibly have unspecified other impact via long strings.
[]
GHSA-4jfp-x3q6-2vqx
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in NotFound XLSXviewer allows Path Traversal. This issue affects XLSXviewer: from n/a through 2.1.1.
[]
CVE-2021-46419
An unauthorized file deletion vulnerability in Telesquare TLR-2855KS6 via DELETE method can allow deletion of system files and scripts.
[ "cpe:2.3:o:telesquare:tlr-2855ks6_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:telesquare:tlr-2855ks6:-:*:*:*:*:*:*:*" ]
GHSA-3wxg-w96j-8hq9
CraftCMS stored XSS in Quick Post widget error message
SummaryThe platform does not filter input and encode output in Quick Post validation error message, which can deliver an XSS payload.DetailsOld CVE fixed the XSS in label HTML but didn’t fix it when clicking save.PoCLogin at adminGo to settingCreate a SectionOn Entry page, click Edit labelInject the XSS payload into the label and saveOn the admin dashboard choose new widget -> Quick PostIn Quick Post, click save with blank slug; The XSS will be executed"errors":{"title":["<script>alert('nono')</script> cannot be blank."],"slug":["Slug cannot be blank."]Fixed in https://github.com/craftcms/cms/commit/9d0cd0bda7c8a830a3373f8c0f06943e519ac888
[]
CVE-2021-20030
SonicWall GMS is vulnerable to file path manipulation resulting that an unauthenticated attacker can gain access to web directory containing application's binaries and configuration files.
[ "cpe:2.3:a:sonicwall:global_management_system:*:*:*:*:*:*:*:*" ]
CVE-2016-10634
scala-standalone-bin is a Binary wrapper for ScalaJS. scala-standalone-bin downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:scalajs-standalone-bin_project:scalajs-standalone-bin:*:*:*:*:*:node.js:*:*" ]
CVE-2023-4582
Due to large allocation checks in Angle for glsl shaders being too lenient a buffer overflow could have occured when allocating too much private shader memory on mac OS. *This bug only affects Firefox on macOS. Other operating systems are unaffected.* This vulnerability affects Firefox < 117, Firefox ESR < 115.2, and Thunderbird < 115.2.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ]
CVE-2008-5064
SQL injection vulnerability in liga.php in H&H WebSoccer 2.80 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:h\\&h:websoccer:2.80:*:*:*:*:*:*:*" ]
CVE-2022-49446
nvdimm: Fix firmware activation deadlock scenarios
In the Linux kernel, the following vulnerability has been resolved: nvdimm: Fix firmware activation deadlock scenarios Lockdep reports the following deadlock scenarios for CXL root device power-management, device_prepare(), operations, and device_shutdown() operations for 'nd_region' devices: Chain exists of: &nvdimm_region_key --> &nvdimm_bus->reconfig_mutex --> system_transition_mutex Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(system_transition_mutex); lock(&nvdimm_bus->reconfig_mutex); lock(system_transition_mutex); lock(&nvdimm_region_key); Chain exists of: &cxl_nvdimm_bridge_key --> acpi_scan_lock --> &cxl_root_key Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&cxl_root_key); lock(acpi_scan_lock); lock(&cxl_root_key); lock(&cxl_nvdimm_bridge_key); These stem from holding nvdimm_bus_lock() over hibernate_quiet_exec() which walks the entire system device topology taking device_lock() along the way. The nvdimm_bus_lock() is protecting against unregistration, multiple simultaneous ops callers, and preventing activate_show() from racing activate_store(). For the first 2, the lock is redundant. Unregistration already flushes all ops users, and sysfs already prevents multiple threads to be active in an ops handler at the same time. For the last userspace should already be waiting for its last activate_store() to complete, and does not need activate_show() to flush the write side, so this lock usage can be deleted in these attributes.
[]
CVE-2023-2117
Image Optimizer by 10web < 1.0.27 - Admin+ Path Traversal
The Image Optimizer by 10web WordPress plugin before 1.0.27 does not sanitize the dir parameter when handling the get_subdirs ajax action, allowing a high privileged users such as admins to inspect names of files and directories outside of the sites root.
[ "cpe:2.3:a:10web:image_optimizer:*:*:*:*:*:wordpress:*:*" ]
CVE-2024-28167
Missing Authorization check in SAP Group Reporting Data Collection (Enter Package Data)
SAP Group Reporting Data Collection does not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation, specific data can be changed via the Enter Package Data app although the user does not have sufficient authorization causing high impact on Integrity of the appliction.
[ "cpe:2.3:a:sap_se:sap_group_reporting_data_collection:*:*:*:*:*:*:*:*" ]
CVE-2008-7166
Buffer overflow in the web interface in BitTorrent 6.0.1 (build 7859) and earlier, and uTorrent 1.7.6 (build 7859) and earlier, allows remote attackers to cause a denial of service (memory consumption and crash) via a crafted Range header. NOTE: this is probably a different vulnerability than CVE-2008-0071 and CVE-2008-0364.
[ "cpe:2.3:a:bittorrent:bittorrent:*:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:3.9.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.1.8:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.3:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.3:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.6:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.7:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.8:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.20.9:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.22.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.22.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.22.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.24.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.24.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.26.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.27.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:4.27.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:bittorrent:bittorrent:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:*:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.5:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.6:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.7:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.7.1:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.7.2:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.7.3:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.7.4:*:*:*:*:*:*:*", "cpe:2.3:a:utorrent:utorrent:1.7.5:*:*:*:*:*:*:*" ]
GHSA-mjgf-fjmw-jf84
A vulnerability was found in Tenda AC23 16.03.07.45 and classified as critical. Affected by this issue is the function formSetSysToolDDNS/formGetSysToolDDNS of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-220640.
[]
GHSA-8m4w-439f-hw99
PHP remote file inclusion vulnerability in sinapis.php in Sinapis Forum 2.2 allows remote attackers to execute arbitrary PHP code via a URL in the fuss parameter.
[]
CVE-2016-10291
An elevation of privilege vulnerability in the Qualcomm Slimbus driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-34030871. References: QC-CR#986837.
[ "cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*" ]
GHSA-24cc-5mgg-6xch
SQL injection vulnerability in include/functions_trackbacks.inc.php in Serendipity 1.6.2 allows remote attackers to execute arbitrary SQL commands via the url parameter to comment.php.
[]
CVE-2022-4510
Path Traversal in binwalk
A path traversal vulnerability was identified in ReFirm Labs binwalk from version 2.1.2b through 2.3.3 included. By crafting a malicious PFS filesystem file, an attacker can get binwalk's PFS extractor to extract files at arbitrary locations when binwalk is run in extraction mode (-e option). Remote code execution can be achieved by building a PFS filesystem that, upon extraction, would extract a malicious binwalk module into the folder .config/binwalk/plugins. This vulnerability is associated with program files src/binwalk/plugins/unpfs.py. This issue affects binwalk from 2.1.2b through 2.3.3 included.
[ "cpe:2.3:a:microsoft:binwalk:*:*:*:*:*:*:*:*" ]
CVE-2017-15615
TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the lcpechointerval variable in the pptp_client.lua file.
[ "cpe:2.3:o:tp-link:er5110g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5110g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5120g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5120g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5510g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5510g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:er5520g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:er5520g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4149g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4149g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4239g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4239g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r4299g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r4299g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473gp-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473gp-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473p-ac_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473p-ac:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r473_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r473:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478g\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478g\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r478\\+_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r478\\+:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r483g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r483g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r483_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r483:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:r488_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:r488:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war1300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war1300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war1750l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war1750l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war2600l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war2600l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war302:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war450l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war450:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war458l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war458l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war458_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war458:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:war900l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:war900l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1300g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1300g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr1750l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr1750l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr2600l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr2600l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr300:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr302_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr302:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr4300l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr4300l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr450l_firmware:1.0161125:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr450l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr450_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr450:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr458l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr458l:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr900g_firmware:3.0_170306:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr900g:-:*:*:*:*:*:*:*", "cpe:2.3:o:tp-link:wvr900l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:tp-link:wvr900l:-:*:*:*:*:*:*:*" ]
GHSA-fjxh-77hg-36f8
Cross-site scripting (XSS) vulnerability in the Ubercart Webform Checkout Pane module 6.x-3.x before 6.x-3.10 and 7.x-3.x before 7.x-3.11 for Drupal allows remote authenticated users with certain permissions to inject arbitrary web script or HTML via unspecified vectors.
[]
CVE-2015-0469
Unspecified vulnerability in Oracle Java SE 5.0u81, 6u91, 7u76, and 8u40 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D.
[ "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update76:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update40:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.5.0:update81:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update76:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update40:*:*:*:*:*:*" ]
CVE-2016-7642
An issue was discovered in certain Apple products. iOS before 10.2 is affected. Safari before 10.0.2 is affected. iCloud before 6.1 is affected. iTunes before 12.5.4 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:icloud:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*" ]
GHSA-fp4w-r85f-ff69
Multiple PHP remote file inclusion vulnerabilities in SmartISoft phpListPro 2.01 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the returnpath parameter in (1) editsite.php, (2) addsite.php, and (3) in.php. NOTE: The config.php vector is already covered by CVE-2006-1749.
[]
CVE-2022-35041
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6b558f.
[ "cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*" ]
CVE-2004-0082
The mksmbpasswd shell script (mksmbpasswd.sh) in Samba 3.0.0 and 3.0.1, when creating an account but marking it as disabled, may overwrite the user password with an uninitialized buffer, which could enable the account with a more easily guessable password.
[ "cpe:2.3:a:samba:samba:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:samba:samba:3.0.1:*:*:*:*:*:*:*" ]
CVE-2022-3207
Simple File List < 4.4.12 - Admin+ Stored Cross-Site Scripting
The Simple File List WordPress plugin before 4.4.12 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
[ "cpe:2.3:a:simplefilelist:simple-file-list:*:*:*:*:*:wordpress:*:*" ]
GHSA-gg39-h2qq-j648
SQL injection vulnerabilities exist in the ID parameters of OS4Ed openSIS 7.3 pages. The id parameter in the page CourseMoreInfo.php is vulnerable to SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
[]
CVE-2016-10693
pm2-kafka is a PM2 module that installs and runs a kafka server pm2-kafka downloads binary resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested resources with an attacker controlled copy if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:pm2-kafka_project:pm2-kafka:1.0.0:*:*:*:*:node.js:*:*" ]
GHSA-ph35-xjxx-64r9
The RSA 1.5 algorithm implementation in the JOSE_JWE class in JWE.php in jose-php before 2.2.1 lacks the Random Filling protection mechanism, which makes it easier for remote attackers to obtain cleartext data via a Million Message Attack (MMA).
[]