id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
CVE-2020-5622 | Shadankun Server Security Type (excluding normal blocking method types) Ver.1.5.3 and earlier allows remote attackers to cause a denial of service which may result in not being able to add newly detected attack source IP addresses as blocking targets for about 10 minutes via a specially crafted request. | [
"cpe:2.3:a:shadan-kun:server_security_type:*:*:*:*:*:*:*:*"
] |
|
GHSA-6fjx-3c25-3qrc | Microsoft Bluetooth Driver Spoofing Vulnerability | [] |
|
CVE-2018-15520 | Various Lexmark devices have a Buffer Overflow (issue 2 of 2). | [
"cpe:2.3:o:lexmark:cx82x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx82x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx860_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx860:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc6152_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc6152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8155_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc8160_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc8160:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx72x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx72x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc41x0_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc41x0:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx92x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx92x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc92x5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc92x5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2338_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx42x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx42x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx52x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx52x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx622_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2442_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2546_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2650_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm124x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm124x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm3250_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx72x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx72x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mx82x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx82x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mb2770_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm5370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm7355_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xm7370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx421_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2425_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx522_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cx62x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx62x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2535_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mc2640_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc2235_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:xc4240_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*"
] |
|
GHSA-rjmr-3p2x-vr92 | In the Linux kernel, the following vulnerability has been resolved:crypto: qat - fix memory leak in RSAWhen an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is
used, some components of the private key persist even after the TFM is
released.
Replace the explicit calls to free the buffers in qat_rsa_exit_tfm()
with a call to qat_rsa_clear_ctx() which frees all buffers referenced in
the TFM context. | [] |
|
CVE-2023-40106 | In sanitizeSbn of NotificationManagerService.java, there is a possible way to launch an activity from the background due to BAL Bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0l:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*"
] |
|
GHSA-99gg-qpxg-g262 | Improper verification of intent by broadcast receiver vulnerability in GalaxyStore prior to version 4.5.81.0 allows local attackers to launch unexported activities of GalaxyStore. | [] |
|
GHSA-g82v-5g65-c6g7 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WC Lovers WCFM Marketplace allows Reflected XSS.This issue affects WCFM Marketplace: from n/a through 3.6.10. | [] |
|
GHSA-9qqc-r43h-9vjq | Format string vulnerability in Check Point VPN-1/FireWall-1 4.1 allows a remote authenticated firewall administrator to execute arbitrary code via format strings in the control connection. | [] |
|
GHSA-2wp7-73q4-52p8 | IBM QRadar 7.3, 7.4, and 7.5 could allow a malicious actor to impersonate an actor due to key exchange without entity authentication. IBM X-Force ID: 208756. | [] |
|
GHSA-cc3p-6vjw-w26p | A security misconfiguration exists in Combodo iTop, which can expose sensitive information. | [] |
|
CVE-2008-3145 | The fragment_add_work function in epan/reassemble.c in Wireshark 0.8.19 through 1.0.1 allows remote attackers to cause a denial of service (crash) via a series of fragmented packets with non-sequential fragmentation offset values, which lead to a buffer over-read. | [
"cpe:2.3:a:wireshark:wireshark:0.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.6a:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.0.1:*:*:*:*:*:*:*"
] |
|
GHSA-92h8-xrqx-3w9v | GlowWorm FW before 1.5.3b4 allows remote attackers to cause a denial of service (kernel panic) via certain DNS responses that trigger infinite recursion in TrueDNS packet parsing, as originally observed with certain login.yahoo.com responses. | [] |
|
CVE-2018-0393 | A Read-Only User Effect Change vulnerability in the Policy Builder interface of Cisco Policy Suite could allow an authenticated, remote attacker to make policy changes in the Policy Builder interface. The vulnerability is due to insufficient authorization controls. An attacker could exploit this vulnerability by accessing the Policy Builder interface and modifying an HTTP request. A successful exploit could allow the attacker to make changes to existing policies. Cisco Bug IDs: CSCvi35007. | [
"cpe:2.3:o:cisco:mobility_services_engine_3365_firmware:18.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mobility_services_engine_3365:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:mobility_services_engine_3355_firmware:18.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mobility_services_engine_3355:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:mobility_services_engine_3310_firmware:18.0.0:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:mobility_services_engine_3310:-:*:*:*:*:*:*:*"
] |
|
GHSA-qhhw-mfx6-cmwx | Server Side Request Forgery (SSRF) exists in Zoho ManageEngine AssetExplorer 6.2.0 and before for the ClientUtilServlet servlet via a URL in a parameter. | [] |
|
CVE-2019-8457 | SQLite3 from 3.6.0 to and including 3.27.2 is vulnerable to heap out-of-bound read in the rtreenode() function when handling invalid rtree tables. | [
"cpe:2.3:a:sqlite:sqlite:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] |
|
CVE-2020-18428 | tinyexr commit 0.9.5 was discovered to contain an array index error in the tinyexr::SaveEXR component, which can lead to a denial of service (DOS). | [
"cpe:2.3:a:tinyexr_project:tinyexr:0.9.5:*:*:*:*:*:*:*"
] |
|
GHSA-c6mm-2g84-v4m7 | Mage-ai missing user authentication | ImpactYou may be impacted if you're using Mage with user authentication enabled. The terminal could be accessed by users who are not signed in or do not have editor permissions.PatchesThe vulnerability has been resolved in Mage version 0.8.72. | [] |
GHSA-jgjq-f424-4qvp | Memory corruption while power-up or power-down sequence of the camera sensor. | [] |
|
CVE-2020-13486 | The Knock Knock plugin before 1.2.8 for Craft CMS allows malicious redirection. | [
"cpe:2.3:a:verbb:knock_knock:*:*:*:*:*:craft_cms:*:*"
] |
|
GHSA-q7jq-85jx-h8fw | Adobe Bridge version 12.0.1 (and earlier versions) is affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-2f39-5mgp-fmmr | Missing Authorization vulnerability in quomodosoft QS Dark Mode allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects QS Dark Mode: from n/a through 3.0. | [] |
|
GHSA-xw78-pcr6-wrg8 | Issue summary: A bug has been identified in the processing of key and
initialisation vector (IV) lengths. This can lead to potential truncation
or overruns during the initialisation of some symmetric ciphers.Impact summary: A truncation in the IV can result in non-uniqueness,
which could result in loss of confidentiality for some cipher modes.When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or
EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after
the key and IV have been established. Any alterations to the key length,
via the "keylen" parameter or the IV length, via the "ivlen" parameter,
within the OSSL_PARAM array will not take effect as intended, potentially
causing truncation or overreading of these values. The following ciphers
and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.For the CCM, GCM and OCB cipher modes, truncation of the IV can result in
loss of confidentiality. For example, when following NIST's SP 800-38D
section 8.2.1 guidance for constructing a deterministic IV for AES in
GCM mode, truncation of the counter portion could lead to IV reuse.Both truncations and overruns of the key and overruns of the IV will
produce incorrect results and could, in some cases, trigger a memory
exception. However, these issues are not currently assessed as security
critical.Changing the key and/or IV lengths is not considered to be a common operation
and the vulnerable API was recently introduced. Furthermore it is likely that
application developers will have spotted this problem during testing since
decryption would fail unless both peers in the communication were similarly
vulnerable. For these reasons we expect the probability of an application being
vulnerable to this to be quite low. However if an application is vulnerable then
this issue is considered very serious. For these reasons we have assessed this
issue as Moderate severity overall.The OpenSSL SSL/TLS implementation is not affected by this issue.The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because
the issue lies outside of the FIPS provider boundary.OpenSSL 3.1 and 3.0 are vulnerable to this issue. | [] |
|
CVE-2023-7089 | Easy SVG Allow <= 1.0 - Author+ Stored XSS via SVG | The Easy SVG Allow WordPress plugin through 1.0 does not sanitize uploaded SVG files, which could allow users with a role as low as Author to upload a malicious SVG containing XSS payloads. | [
"cpe:2.3:a:benjaminzekavica:easy_svg_support:*:*:*:*:*:wordpress:*:*"
] |
GHSA-23qf-p445-3vhr | An inclusion of sensitive information in log files vulnerability is present in Hickory Smart for Android mobile devices from Belwith Products, LLC. Communications to the internet API services and direct connections to the lock via Bluetooth Low Energy (BLE) from the mobile application are logged in a debug log on the Android device at HickorySmartLog/Logs/SRDeviceLog.txt. This information was found stored in the Android device's default USB or SDcard storage paths and is accessible without rooting the device. This issue affects Hickory Smart for Android, version 01.01.43 and prior versions. | [] |
|
GHSA-r5pp-f768-qw9g | Tenda F1203 V2.0.1.6 was discovered to contain a buffer overflow via the deviceId parameter at /goform/saveParentControlInfo. | [] |
|
CVE-2020-3528 | Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software OSPFv2 Link-Local Signaling Denial of Service Vulnerability | A vulnerability in the OSPF Version 2 (OSPFv2) implementation of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation when the affected software processes certain OSPFv2 packets with Link-Local Signaling (LLS) data. An attacker could exploit this vulnerability by sending a malformed OSPFv2 packet to an affected device. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. | [
"cpe:2.3:a:cisco:adaptive_security_appliance:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:firepower_threat_defense:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*"
] |
CVE-2020-14311 | There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow. | [
"cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] |
|
CVE-2023-4104 | An invalid Polkit Authentication check and missing authentication requirements for D-Bus methods allowed any local user to configure arbitrary VPN setups.
*This bug only affects Mozilla VPN on Linux. Other operating systems are unaffected.* This vulnerability affects Mozilla VPN client for Linux < v2.16.1. | [
"cpe:2.3:a:mozilla:vpn:*:*:*:*:*:linux:*:*"
] |
|
GHSA-qgmj-rw56-xh9r | Memory corruption occurs when handling client calls to EnableTestMode through an Escape call. | [] |
|
CVE-2018-20363 | LibRaw::raw2image in libraw_cxx.cpp in LibRaw 0.19.1 has a NULL pointer dereference. | [
"cpe:2.3:a:libraw:libraw:*:*:*:*:*:*:*:*"
] |
|
GHSA-65wj-75vm-6g3g | BEA WebLogic Server and WebLogic Express 8.1 SP3 and earlier (1) stores the private key passphrase (CustomTrustKeyStorePassPhrase) in cleartext in nodemanager.config; or, during domain creation with the Configuration Wizard, renders an SSL private key passphrase in cleartext (2) on a terminal or (3) in a log file, which might allow local users to obtain cryptographic keys. | [] |
|
GHSA-pcwp-p8jm-7xc7 | A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.0.1, watchOS 7.1, iOS 12.4.9, watchOS 6.2.9, Security Update 2020-006 High Sierra, Security Update 2020-006 Mojave, iOS 14.2 and iPadOS 14.2, watchOS 5.3.9, macOS Catalina 10.15.7 Supplemental Update, macOS Catalina 10.15.7 Update. Processing a maliciously crafted font may lead to arbitrary code execution. | [] |
|
CVE-2018-18712 | An issue was discovered in WUZHI CMS 4.1.0. There is a CSRF vulnerability that can change the super administrator's username via index.php?m=member&f=index&v=edit&uid=1. | [
"cpe:2.3:a:wuzhicms:wuzhi_cms:4.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-533p-xf32-32p2 | The Ignite portal in Mitel MiContact Center Business before 9.3.0.0 could allow a local attacker to view system information due to insufficient output sanitization. | [] |
|
CVE-2022-49207 | bpf, sockmap: Fix memleak in sk_psock_queue_msg | In the Linux kernel, the following vulnerability has been resolved:
bpf, sockmap: Fix memleak in sk_psock_queue_msg
If tcp_bpf_sendmsg is running during a tear down operation we may enqueue
data on the ingress msg queue while tear down is trying to free it.
sk1 (redirect sk2) sk2
------------------- ---------------
tcp_bpf_sendmsg()
tcp_bpf_send_verdict()
tcp_bpf_sendmsg_redir()
bpf_tcp_ingress()
sock_map_close()
lock_sock()
lock_sock() ... blocking
sk_psock_stop
sk_psock_clear_state(psock, SK_PSOCK_TX_ENABLED);
release_sock(sk);
lock_sock()
sk_mem_charge()
get_page()
sk_psock_queue_msg()
sk_psock_test_state(psock, SK_PSOCK_TX_ENABLED);
drop_sk_msg()
release_sock()
While drop_sk_msg(), the msg has charged memory form sk by sk_mem_charge
and has sg pages need to put. To fix we use sk_msg_free() and then kfee()
msg.
This issue can cause the following info:
WARNING: CPU: 0 PID: 9202 at net/core/stream.c:205 sk_stream_kill_queues+0xc8/0xe0
Call Trace:
<IRQ>
inet_csk_destroy_sock+0x55/0x110
tcp_rcv_state_process+0xe5f/0xe90
? sk_filter_trim_cap+0x10d/0x230
? tcp_v4_do_rcv+0x161/0x250
tcp_v4_do_rcv+0x161/0x250
tcp_v4_rcv+0xc3a/0xce0
ip_protocol_deliver_rcu+0x3d/0x230
ip_local_deliver_finish+0x54/0x60
ip_local_deliver+0xfd/0x110
? ip_protocol_deliver_rcu+0x230/0x230
ip_rcv+0xd6/0x100
? ip_local_deliver+0x110/0x110
__netif_receive_skb_one_core+0x85/0xa0
process_backlog+0xa4/0x160
__napi_poll+0x29/0x1b0
net_rx_action+0x287/0x300
__do_softirq+0xff/0x2fc
do_softirq+0x79/0x90
</IRQ>
WARNING: CPU: 0 PID: 531 at net/ipv4/af_inet.c:154 inet_sock_destruct+0x175/0x1b0
Call Trace:
<TASK>
__sk_destruct+0x24/0x1f0
sk_psock_destroy+0x19b/0x1c0
process_one_work+0x1b3/0x3c0
? process_one_work+0x3c0/0x3c0
worker_thread+0x30/0x350
? process_one_work+0x3c0/0x3c0
kthread+0xe6/0x110
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x22/0x30
</TASK> | [] |
GHSA-pjmm-jqrg-3hmg | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). | [] |
|
GHSA-mmm3-6xp7-wx5x | The dccp_v6_request_recv_sock function in net/dccp/ipv6.c in the Linux kernel through 4.11.1 mishandles inheritance, which allows local users to cause a denial of service or possibly have unspecified other impact via crafted system calls, a related issue to CVE-2017-8890. | [] |
|
CVE-2023-5615 | The Skype Legacy Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'skype-status' shortcode in all versions up to, and including, 3.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [
"cpe:2.3:a:ravanh:skype_legacy_buttons:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-3rfr-67g3-3ffq | Multiple PHP remote file inclusion vulnerabilities in x10Media x10 Automatic MP3 Script 1.5.5 allow remote attackers to execute arbitrary PHP code via a URL in the web_root parameter to (1) includes/function_core.php and (2) templates/layout_lyrics.php. | [] |
|
CVE-2024-0405 | The Burst Statistics – Privacy-Friendly Analytics for WordPress plugin, version 1.5.3, is vulnerable to Post-Authenticated SQL Injection via multiple JSON parameters in the /wp-json/burst/v1/data/compare endpoint. Affected parameters include 'browser', 'device', 'page_id', 'page_url', 'platform', and 'referrer'. This vulnerability arises due to insufficient escaping of user-supplied parameters and the lack of adequate preparation in SQL queries. As a result, authenticated attackers with editor access or higher can append additional SQL queries into existing ones, potentially leading to unauthorized access to sensitive information from the database. | [
"cpe:2.3:a:burst-statistics:burst_statistics:*:*:*:*:*:wordpress:*:*"
] |
|
GHSA-x4jr-cxw4-2x5h | Luca through 1.7.4 on Android allows remote attackers to obtain sensitive information about COVID-19 tracking because the QR code of a Public Location can be intentionally confused with the QR code of a Private Meeting. | [] |
|
GHSA-fjcf-3j3r-78rp | LiteLLM Has an Improper Authorization Vulnerability | An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN. | [] |
GHSA-254q-r25r-fwm9 | A vulnerability in the web-based management interface of Cisco SPA100 Series Analog Telephone Adapters (ATAs) could allow an authenticated, remote attacker to conduct cross-site scripting attacks. The vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | [] |
|
GHSA-4cm7-26hr-cjq7 | Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts. | [] |
|
GHSA-hrx7-7gcr-7fmm | A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'VerifyUser' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25914) | [] |
|
GHSA-86rq-fj99-chhj | Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. | [] |
|
GHSA-5xpf-9vwg-2chq | Uscan in devscripts before 2.13.9 allows remote attackers to execute arbitrary code via a crafted tarball. | [] |
|
CVE-2018-14782 | NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. The device allows access to configuration files and profiles without authenticating the user. | [
"cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-38975 | * Buffer Overflow vulnerability in qdrant v.1.3.2 allows a remote attacker cause a denial of service via the chucnked_vectors.rs component. | [
"cpe:2.3:a:qdrant:qdrant:1.3.2:*:*:*:*:*:*:*"
] |
|
GHSA-j859-w9g7-8276 | A flaw was found in postgresql. A purpose-crafted query can read arbitrary bytes of server memory. In the default configuration, any authenticated database user can complete this attack at will. The attack does not require the ability to create objects. If server settings include max_worker_processes=0, the known versions of this attack are infeasible. However, undiscovered variants of the attack may be independent of that setting. | [] |
|
CVE-2018-15973 | Adobe Experience Manager versions 6.4, 6.3, 6.2, 6.1, and 6.0 have a stored cross-site scripting vulnerability. Successful exploitation could lead to sensitive information disclosure. | [
"cpe:2.3:a:adobe:experience_manager:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:6.4.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-50940 | IBM PowerSC cross-resource origin sharing | IBM PowerSC 1.3, 2.0, and 2.1 uses Cross-Origin Resource Sharing (CORS) which could allow an attacker to carry out privileged actions and retrieve sensitive information as the domain name is not being limited to only trusted domains. IBM X-Force ID: 275130.
| [
"cpe:2.3:a:ibm:powersc:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powersc:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:powersc:2.1:*:*:*:*:*:*:*"
] |
GHSA-25qr-x7j7-m2cj | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in biancardi Mixcloud Embed allows Stored XSS. This issue affects Mixcloud Embed: from n/a through 2.2.0. | [] |
|
CVE-2022-31108 | Arbitrary `CSS` injection into the generated graph affecting the container HTML in mermaid.js | Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors. The following example shows how an attacker can exfiltrate the contents of an input field by bruteforcing the `value` attribute one character at a time. Whenever there is an actual match, an `http` request will be made by the browser in order to "load" a background image that will let an attacker know what's the value of the character. This issue may lead to `Information Disclosure` via CSS selectors and functions able to generate HTTP requests. This also allows an attacker to change the document in ways which may lead a user to perform unintended actions, such as clicking on a link, etc. This issue has been resolved in version 9.1.3. Users are advised to upgrade. Users unable to upgrade should ensure that user input is adequately escaped before embedding it in CSS blocks. | [
"cpe:2.3:a:mermaid_project:mermaid:*:*:*:*:*:node.js:*:*"
] |
GHSA-6xj5-r9h7-wphq | In the Linux kernel, the following vulnerability has been resolved:scsi: qla1280: Fix kernel oops when debug level > 2A null dereference or oops exception will eventually occur when qla1280.c
driver is compiled with DEBUG_QLA1280 enabled and ql_debug_level > 2. I
think its clear from the code that the intention here is sg_dma_len(s) not
length of sg_next(s) when printing the debug info. | [] |
|
GHSA-gfm6-wg4x-3jvg | In versions 13.0.0, 12.0.0-12.1.3, or 11.6.0-11.6.2, an F5 BIG-IP virtual server using the URL categorization feature may cause the Traffic Management Microkernel (TMM) to produce a core file when it receives malformed URLs during categorization. | [] |
|
CVE-2024-23158 | Multiple ZDI Vulnerabilities in Autodesk AutoCAD and certain AutoCAD-based products | A maliciously crafted IGES file, when parsed in ASMImport229A.dll through Autodesk applications, can be used to cause a use-after-free vulnerability. A malicious actor can leverage this vulnerability to cause a crash or execute arbitrary code in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad_advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*"
] |
CVE-2019-7265 | Linear eMerge E3-Series devices allow Remote Code Execution (root access over SSH). | [
"cpe:2.3:o:nortekcontrol:linear_emerge_essential_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortekcontrol:linear_emerge_essential:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nortekcontrol:linear_emerge_elite_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:nortekcontrol:linear_emerge_elite:-:*:*:*:*:*:*:*"
] |
|
GHSA-j9wf-5v5m-g6r9 | Authenticated (subscriber or higher user role) Stored Cross-Site Scripting (XSS) vulnerability in Messages For WordPress <= 2.1.10 at WordPress. | [] |
|
CVE-2024-4286 | Improper Neutralization of Special Elements in mintplex-labs/anything-llm | Mintplex-Labs' anything-llm application is vulnerable to improper neutralization of special elements used in an expression language statement, identified in the commit id `57984fa85c31988b2eff429adfc654c46e0c342a`. The vulnerability arises from the application's handling of user modifications by managers or admins, allowing for the modification of all existing attributes of the `user` database entity without proper checks or sanitization. This flaw can be exploited to delete user threads, denying users access to their previously submitted data, or to inject fake threads and/or chat history for social engineering attacks. | [
"cpe:2.3:a:mintplexlabs:anythingllm:-:*:*:*:*:*:*:*"
] |
GHSA-ph2w-6fm5-ghpx | In multiple functions in AppInfoBase.java, there is a possible way to manipulate app permission settings belonging to another user on the device due to a missing permission check. This could lead to local escalation of privilege across user boundaries with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2011-5164 | Stack-based buffer overflow in VanDyke Software AbsoluteFTP 1.9.6 through 2.2.10 allows remote FTP servers to execute arbitrary code via a crafted file name in a LIST command response. | [
"cpe:2.3:a:vandyke:absoluteftp:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:vandyke:absoluteftp:2.2.10:*:*:*:*:*:*:*"
] |
|
GHSA-mh9j-g4g3-6xcv | A privilege escalation vulnerability exists in Kepware LinkMaster 3.0.94.0. In its default configuration, an attacker can globally overwrite service configuration to execute arbitrary code with NT SYSTEM privileges. | [] |
|
CVE-2021-30487 | In the topic moving API in Zulip Server 3.x before 3.4, organization administrators were able to move messages to streams in other organizations hosted by the same Zulip installation. | [
"cpe:2.3:a:zulip:zulip_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-rcg3-8xw4-4h9v | Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3649, CVE-2010-3650, and CVE-2010-3652. | [] |
|
CVE-2021-22405 | There is a Configuration defects in Huawei Smartphone.Successful exploitation of this vulnerability may affect service availability. | [
"cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-3276-fvr9-5ggh | In execTransact of Binder.java in Android 7.1.1, 7.1.2, 8.0, 8.1, and 9, there is a possible local execution of arbitrary code in a privileged process due to a memory overwrite. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [] |
|
CVE-2017-15691 | In Apache uimaj prior to 2.10.2, Apache uimaj 3.0.0-xxx prior to 3.0.0-beta, Apache uima-as prior to 2.10.2, Apache uimaFIT prior to 2.4.0, Apache uimaDUCC prior to 2.2.2, this vulnerability relates to an XML external entity expansion (XXE) capability of various XML parsers. UIMA as part of its configuration and operation may read XML from various sources, which could be tainted in ways to cause inadvertent disclosure of local files or other internal content. | [
"cpe:2.3:a:apache:uimaj:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:uimaj:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:uimaj:3.0.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:apache:uimaj:3.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:apache:uima-as:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:uimafit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:uimaducc:*:*:*:*:*:*:*:*"
] |
|
GHSA-368p-325h-g73p | Cross-Site Request Forgery (CSRF) vulnerability in Denishua Comment Reply Notification plugin <= 1.4 versions. | [] |
|
GHSA-wfjp-wqgq-35g7 | Android intent URLs given to Firefox for Android can be used to navigate from HTTP or HTTPS URLs to local "file:" URLs, allowing for the reading of local data through a violation of same-origin policy. Note: This attack only affects Firefox for Android. Other operating systems are not affected. This vulnerability affects Firefox < 54. | [] |
|
GHSA-p5cc-3vjx-gp25 | Vulnerability in the MySQL Cluster product of Oracle MySQL (component: Cluster: General). Supported versions that are affected are 7.4.33 and prior, 7.5.23 and prior, 7.6.19 and prior and 8.0.26 and prior. Difficult to exploit vulnerability allows high privileged attacker with access to the physical communication segment attached to the hardware where the MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in takeover of MySQL Cluster. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H). | [] |
|
GHSA-26x8-wc99-6x99 | read_header_tga in gd_tga.c in the GD Graphics Library (aka LibGD) through 2.3.2 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted TGA file. | [] |
|
GHSA-mmh6-m7v9-5956 | Regular expression denial of service in markdown-link-extractor | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function | [] |
CVE-2019-8589 | This issue was addressed with improved checks. This issue is fixed in macOS Mojave 10.14.5. A malicious application may bypass Gatekeeper checks. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-1030 | Microsoft Edge based on Edge HTML Information Disclosure Vulnerability | An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system.
To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website in an attempt to exploit the vulnerability. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no way to force a user to view the attacker-controlled content. Instead, an attacker would have to convince a user to take action. For example, an attacker could trick a user into clicking a link that takes the user to the attacker's site.
The update addresses the vulnerability by modifying how Microsoft Edge based on Edge HTML handles objects in memory.
| [
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
GHSA-6qqp-5r6j-fg74 | conceptcms 5.3.1, 5.3.3, and possibly other versions allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by sys_libs/umlib/um_authserver.inc.php and certain other files. | [] |
|
GHSA-722p-jr5h-rjqr | Mantis before 0.19.4 allows remote attackers to bypass the file upload size restriction by modifying the max_file_size parameter to (1) bug_file_add.php, (2) bug_report.php, (3) bug_report_advanced_page.php, and (4) proj_doc_add_page.php. | [] |
|
CVE-2024-11773 | SQL injection in the admin web console of Ivanti CSA before version 5.0.3 allows a remote authenticated attacker with admin privileges to run arbitrary SQL statements. | [] |
|
GHSA-ph3m-f8gv-chg7 | Cross-Site Request Forgery (CSRF) vulnerability in Yoohoo Plugins When Last Login plugin <= 1.2.1 versions. | [] |
|
CVE-2024-5774 | SourceCodester Stock Management System Login index.php sql injection | A vulnerability has been found in SourceCodester Stock Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file index.php of the component Login. The manipulation of the argument username/password leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-267457 was assigned to this vulnerability. | [
"cpe:2.3:a:sourcecodester:stock_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:warrendaloyan:stock_management_system:1.0:*:*:*:*:*:*:*"
] |
CVE-2004-0222 | Multiple memory leaks in isakmpd in OpenBSD 3.4 and earlier allow remote attackers to cause a denial of service (memory exhaustion) via certain ISAKMP packets, as demonstrated by the Striker ISAKMP Protocol Test Suite. | [
"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-14866 | Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs. | [
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:9.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:10.0:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:odoo:odoo:11.0:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:11.0:*:*:*:enterprise:*:*:*"
] |
|
GHSA-qvxv-pmq9-4q7g | High severity vulnerability that affects org.scala-lang:scala-compiler | The compilation daemon in Scala before 2.10.7, 2.11.x before 2.11.12, and 2.12.x before 2.12.4 uses weak permissions for private files in /tmp/scala-devel/${USER:shared}/scalac-compile-server-port, which allows local users to write to arbitrary class files and consequently gain privileges. | [] |
CVE-2017-12941 | libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function. | [
"cpe:2.3:a:rarlab:unrar:*:*:*:*:*:*:*:*"
] |
|
GHSA-5cjc-m7wp-q34w | WebKit in Apple iOS before 4 on the iPhone and iPod touch does not properly implement the history.replaceState method in certain situations involving IFRAME elements, which allows remote attackers to obtain sensitive information via a crafted HTML document. | [] |
|
CVE-2018-8989 | In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002006. | [
"cpe:2.3:a:windows_optimization_master_project:windows_optimization_master:7.99.13.604:*:*:*:*:*:*:*"
] |
|
CVE-2008-1291 | ViewVC before 1.0.5 stores sensitive information under the web root with insufficient access control, which allows remote attackers to read files and list folders under the hidden CVSROOT folder. | [
"cpe:2.3:o:gentoo:linux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora:7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora:8:*:*:*:*:*:*:*",
"cpe:2.3:a:viewvc:viewvc:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:viewvc:viewvc:1.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2005-1286 | Unquoted Windows search path vulnerability in BitDefender 8 allows local users to prevent BitDefender from starting by creating a malicious C:\program.exe, possibly due to the lack of quoting of the full pathname when executing a process. | [
"cpe:2.3:a:softwin:bitdefender_antivirus:professional_plus_8:*:*:*:*:*:*:*",
"cpe:2.3:a:softwin:bitdefender_antivirus:standard_8:*:*:*:*:*:*:*"
] |
|
CVE-2006-4986 | Grayscale BandSite CMS allows remote attackers to obtain sensitive information via a direct request for (1) certain files in the includes/content directory, (2) includes/shows_preview.php, and (3) adminpanel/configform.php; and files in adminpanel/includes/ including (4) mailinglist/disphtmltbl.php, (5) mailinglist/dispxls.php, (6) mailinglist/sendshows.php, (7) previews/preview_bio.php, (8) previews/preview_genmerch.php, (9) previews/preview_fliers.php, (10) previews/preview_gbook.php, (11) previews/preview_interviews.php, (12) previews/preview_links.php, (13) previews/preview_lyrics.php, (14) previews/preview_membio.php, (15) previews/preview_merchphotos.php, (16) previews/preview_mp3s.php, (17) previews/preview_news.php, (18) previews/preview_photos.php, (19) previews/preview_releases.php, (20) previews/preview_relmerch.php, (21) previews/preview_relphotos.php, (22) previews/preview_reviews.php, (23) previews/preview_shows.php, (24) previews/preview_wearmerch.php, (25) change_forms/change_bio.php, (26) change_forms/change_fliers.php, (27) change_forms/change_gbook.php, (28) change_forms/change_gen_merch.php, (29) change_forms/change_interview.php, (30) change_forms/change_links.php, (31) change_forms/change_lyrics.php, (32) change_forms/change_members.php, (33) change_forms/change_merch.php, (34) change_forms/change_merch_pic.php, (35) change_forms/change_mp3s.php, (36) change_forms/change_news.php, (37) change_forms/change_photos.php, (38) change_forms/change_rel_merch.php, (39) change_forms/change_rel_pic.php, (40) change_forms/change_releases.php, (41) change_forms/change_reviews.php, (42) change_forms/change_shows.php, and (43) change_forms/change_wear_merch.php, which reveals the path in various error messages. | [
"cpe:2.3:a:grayscale:bandsite_cms:1.1:*:*:*:*:*:*:*"
] |
|
GHSA-j3xj-pjxr-9p6c | The Tutor LMS plugin for WordPress is vulnerable to bypass to user registration in versions up to, and including, 2.7.6. This is due to a missing check for the 'users_can_register' option in the 'register_instructor' function. This makes it possible for unauthenticated attackers to register as the default role on the site, even if registration is disabled. | [] |
|
GHSA-8768-7prf-6f7g | Buffer overflow in Pragma Systems TelnetServer 2000 version 4.0 allows remote attackers to cause a denial of service via a long series of null characters to the rexec port. | [] |
|
CVE-2023-45559 | An issue in Tamaki_hamanoki Line v.13.6.1 allows attackers to send crafted notifications via leakage of the channel access token. | [
"cpe:2.3:a:linecorp:line:13.6.1:*:*:*:*:*:*:*"
] |
|
CVE-2007-5561 | Format string vulnerability in the logging function in the Oracle OPMN daemon, as used on Oracle Enterprise Grid Console server 10.2.0.1, allows remote attackers to execute arbitrary code via format string specifiers in the URI in an HTTP request to port 6003, aka Oracle reference number 6296175. NOTE: this might be the same issue as CVE-2007-0282 or CVE-2007-0280, but there are insufficient details to be sure. | [
"cpe:2.3:a:oracle:enterprise_grid_console_server:10.2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:opmn_daemon:*:*:*:*:*:*:*:*"
] |
|
GHSA-9cxr-7vrj-vpj8 | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin before 2.11.1.2 allow remote attackers to inject arbitrary web script or HTML via certain input available in (1) PHP_SELF in (a) server_status.php, and (b) grab_globals.lib.php, (c) display_change_password.lib.php, and (d) common.lib.php in libraries/; and certain input available in PHP_SELF and (2) PATH_INFO in libraries/common.inc.php. NOTE: there might also be other vectors related to (3) REQUEST_URI. | [] |
|
CVE-2020-27665 | In Strapi before 3.2.5, there is no admin::hasPermissions restriction for CTB (aka content-type-builder) routes. | [
"cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*"
] |
|
CVE-2012-4192 | Mozilla Firefox 16.0, Thunderbird 16.0, and SeaMonkey 2.13 allow remote attackers to bypass the Same Origin Policy and read the properties of a Location object via a crafted web site, a related issue to CVE-2012-4193. | [
"cpe:2.3:a:mozilla:firefox:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:16.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-36767 | Microsoft Office Security Feature Bypass Vulnerability | Microsoft Office Security Feature Bypass Vulnerability | [
"cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*",
"cpe:2.3:a:microsoft:office:2019:*:*:*:*:macos:*:*",
"cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*"
] |
CVE-2024-53014 | Improper Validation of Array Index in Audio | Memory corruption may occur while validating ports and channels in Audio driver. | [] |
GHSA-5v3p-pm54-6fxh | PrestaShop 1.6.x before 1.6.1.23 and 1.7.x before 1.7.4.4 allows remote attackers to execute arbitrary code via a file upload. | [] |
|
CVE-2017-10324 | Vulnerability in the Oracle Applications Technology Stack component of Oracle E-Business Suite (subcomponent: Oracle Forms). Supported versions that are affected are 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Applications Technology Stack. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Technology Stack accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [
"cpe:2.3:a:oracle:e-business_suite_technology_stack:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite_technology_stack:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite_technology_stack:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite_technology_stack:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite_technology_stack:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:e-business_suite_technology_stack:12.2.7:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.