id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
CVE-2022-22329
|
IBM Control Desk 7.6.1 does not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic. IBM X-Force ID: 219124.
|
[
"cpe:2.3:a:ibm:control_desk:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:control_desk:7.6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 4.3 | null | null |
|
GHSA-4gp7-wgqw-q868
|
SQL injection vulnerability in the is_god function in includes/nukesentinel.php in NukeSentinel 2.5.11 allows remote attackers to execute arbitrary SQL commands via base64-encoded data in an admin cookie, a different vector than CVE-2007-5125.
|
[] | null | null | null | null | null |
|
GHSA-qx3w-cg62-mx4g
|
Unrestricted file upload vulnerability in admin/galeria.php in ThePortal2 2.2 allows remote attackers to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in galeria/.
|
[] | null | null | null | null | null |
|
CVE-2024-44146
|
A logic issue was addressed with improved file handling. This issue is fixed in macOS Sequoia 15. An app may be able to break out of its sandbox.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
|
GHSA-62rc-79c5-9jv7
|
Multiple integer overflows in the (1) createwbmp and (2) readwbmp functions in wbmp.c in the GD library (libgd) in PHP 4.0.0 through 4.4.6 and 5.0.0 through 5.2.1 allow context-dependent attackers to execute arbitrary code via Wireless Bitmap (WBMP) images with large width or height values.
|
[] | null | null | null | null | null |
|
GHSA-x5f4-7cp5-vmcf
|
IBM ClearQuest (CQ) 9.1 through 9.1.0.6 is vulnerable to stored cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 286833.
|
[] | null | 6.4 | null | null | null |
|
RHSA-2017:2931
|
Red Hat Security Advisory: kernel-rt security and bug fix update
|
kernel: net: Out of bounds stack read in memcpy_fromiovec kernel: Out-of-bounds heap access in xfrm kernel: Possible heap buffer overflow in brcmf_cfg80211_mgmt_tx() kernel: Integer overflow in ip6_find_1stfragopt() causes infinite loop kernel: Out of bounds read in inet_diag_msg_sctp{,l}addr_fill() and sctp_get_sctp_info() in SCTP stack kernel: Use-after-free in sys_mq_notify() kernel: Divide-by-zero in __tcp_select_window kernel: Heap out-of-bounds read in AF_PACKET sockets kernel: Exploitable memory corruption due to UFO to non-UFO path switch
|
[
"cpe:/a:redhat:rhel_extras_rt:7"
] | null | null | 7 | null | null |
GHSA-w5cc-jw53-c2fj
|
A vulnerability has been found in SourceCodester Simple Task Allocation System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file manage_user.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-224743.
|
[] | null | 9.8 | null | null | null |
|
RHSA-2020:1138
|
Red Hat Security Advisory: gettext security and bug fix update
|
gettext: double free in default_add_message in read-catalog.c
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 4 | null | null |
GHSA-44vx-q8jj-wcwm
|
Cross-site scripting (XSS) vulnerability in Vanilla Forums before 2.0.17.6 allows remote attackers to inject arbitrary web script or HTML via the p parameter to an unspecified component, a different vulnerability than CVE-2011-0526.
|
[] | null | null | null | null | null |
|
GHSA-84xc-hmvp-jp6q
|
Tenda AX1806 v1.0.0.1 was discovered to contain a stack overflow via the list parameter in the function fromSetRouteStatic.
|
[] | null | 7.5 | null | null | null |
|
CVE-2014-7216
|
Multiple stack-based buffer overflows in Yahoo! Messenger 11.5.0.228 and earlier allow remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via the (1) shortcut or (2) title keys in an emoticons.xml file.
|
[
"cpe:2.3:a:yahoo:messenger:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
CVE-2018-17662
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the beep method of a Host object. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6514.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
CVE-2019-5311
|
An issue was discovered in YUNUCMS V1.1.8. app/index/controller/Show.php has an XSS vulnerability via the index.php/index/show/index cw parameter.
|
[
"cpe:2.3:a:yunucms:yunucms:1.1.8:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
CVE-2019-20832
|
An issue was discovered in Foxit PhantomPDF before 8.3.10. It has homograph mishandling.
|
[
"cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
GHSA-p76w-qwr6-94rm
|
In JetBrains TeamCity before 2021.2.3, environment variables of the "password" type could be logged in some cases.
|
[] | null | 7.5 | null | null | null |
|
CVE-2024-57386
|
Cross Site Scripting vulnerability in Wallos v.2.41.0 allows a remote attacker to execute arbitrary code via the profile picture function.
|
[] | null | 6.1 | null | null | null |
|
GHSA-vhfp-9wvj-gwvg
|
XML External Entity vulnerability in MODX CMS
|
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
|
[] | null | 9.1 | null | null | null |
CVE-2007-1005
|
Heap-based buffer overflow in SW3eng.exe in the eID Engine service in CA (formerly Computer Associates) eTrust Intrusion Detection 3.0.5.57 and earlier allows remote attackers to cause a denial of service (application crash) via a long key length value to the remote administration port (9191/tcp).
|
[
"cpe:2.3:a:broadcom:etrust_intrusion_detection:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ca:etrust_intrusion_detection:2.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:ca:etrust_intrusion_detection:3.0:sp1:*:*:*:*:*:*"
] | null | null | null | 7.8 | null |
|
GHSA-w2xx-p535-mqhm
|
In readArgumentList of zygote.java in Android 10, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | null | null | null | null |
|
CVE-2025-3737
|
Google Maps: Store Locator - Critical - Unsupported - SA-CONTRIB-2025-038
|
Vulnerability in Drupal Google Maps: Store Locator.This issue affects Google Maps: Store Locator: *.*.
|
[] | null | 5.9 | null | null | null |
RHSA-2018:2571
|
Red Hat Security Advisory: bind security update
|
bind: processing of certain records when "deny-answer-aliases" is in use may trigger an assert leading to a denial of service
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 7.5 | null | null |
CVE-2024-30570
|
An information leak in debuginfo.htm of Netgear R6850 v1.1.0.88 allows attackers to obtain sensitive information without any authentication required.
|
[
"cpe:2.3:o:netgear:r6850_firmware:1.1.0.88:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-h6hm-v4gg-9cgp
|
This issue was addressed by restricting options offered on a locked device. This issue is fixed in iOS 18.4 and iPadOS 18.4. An attacker may be able to use Siri to enable Auto-Answer Calls.
|
[] | null | 9.1 | null | null | null |
|
RHSA-2017:0250
|
Red Hat Security Advisory: jboss-ec2-eap security, bug fix, and enhancement update
|
tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests EAP: Sensitive data can be exposed at the server level in domain mode admin-cli: Potential EAP resource starvation DOS attack via GET requests for server log files jboss: jbossas: unsafe chown of server.log in jboss init script allows privilege escalation
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:6::el6"
] | null | null | 7 | null | null |
CVE-2020-14489
|
OpenClinic GA
|
OpenClinic GA 5.09.02 and 5.89.05b stores passwords using inadequate hashing complexity, which may allow an attacker to recover passwords using known password cracking techniques.
|
[
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.09.02:*:*:*:*:*:*:*",
"cpe:2.3:a:openclinic_ga_project:openclinic_ga:5.89.05b:*:*:*:*:*:*:*"
] | null | 6.2 | null | null | null |
CVE-2021-2253
|
Vulnerability in the Oracle Advanced Supply Chain Planning product of Oracle Supply Chain (component: Core). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Supply Chain Planning. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Advanced Supply Chain Planning accessible data as well as unauthorized access to critical data or complete access to all Oracle Advanced Supply Chain Planning accessible data. CVSS 3.1 Base Score 9.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
|
[
"cpe:2.3:a:oracle:advanced_supply_chain_planning:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:advanced_supply_chain_planning:12.2:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
|
GHSA-f8rj-4v7g-p5rj
|
Directory Traversal in jansenstuffpleasework
|
Affected versions of `jansenstuffpleasework` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | 7.5 | null | null |
GHSA-vhhg-73hp-mrc2
|
Microsoft Edge (Chromium-based) Spoofing Vulnerability
|
[] | null | 4.3 | null | null | null |
|
RHSA-2011:1160
|
Red Hat Security Advisory: dhcp security update
|
dhcp: denial of service flaws dhcp: denial of service flaws
|
[
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null | null |
CVE-2009-0080
|
The ThreadPool class in Windows Vista Gold and SP1, and Server 2008, does not properly implement isolation among a set of distinct processes that (1) all run under the NetworkService account or (2) all run under the LocalService account, which allows local users to gain privileges by leveraging incorrect thread ACLs to access the resources of one of the processes, aka "Windows Thread Pool ACL Weakness Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp1:*:*:*:*:x64:*"
] | null | null | null | 6.9 | null |
|
GHSA-23wv-w3v2-hcrj
|
Multiple Cross Site Scripting (XSS) vulnerabilities exist in PHPGurukul Hospital Management System 4.0 via the docname parameter in /admin/add-doctor.php and /admin/edit-doctor.php
|
[] | null | 5.9 | null | null | null |
|
GHSA-vwv2-9wcj-64vx
|
Firefly III allows webhooks HTML Injection.
|
Firefly III (aka firefly-iii) before 6.1.1 allows webhooks HTML Injection.
|
[] | null | 6.5 | null | null | null |
GHSA-4rq4-8r9h-8884
|
NLnet Labs Krill supports direct access to the RRDP repository content through its built-in web server at the "/rrdp" endpoint. Prior to 0.12.1 a direct query for any existing directory under "/rrdp/", rather than an RRDP file such as "/rrdp/notification.xml" as would be expected, causes Krill to crash. If the built-in "/rrdp" endpoint is exposed directly to the internet, then malicious remote parties can cause the publication server to crash. The repository content is not affected by this, but the availability of the server and repository can cause issues if this attack is persistent and is not mitigated.
|
[] | null | 7.5 | null | null | null |
|
CVE-2022-36350
|
Stored cross-site scripting vulnerability in PukiWiki versions 1.3.1 to 1.5.3 allows a remote attacker to inject an arbitrary script via unspecified vectors.
|
[
"cpe:2.3:a:pukiwiki:pukiwiki:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-7g7g-82fp-hpxx
|
CSRF vulnerability in Jenkins SCP publisher Plugin
|
SCP publisher Plugin 1.8 and earlier does not perform a permission check in a method implementing form validation.This allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials.Additionally, this form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
|
[] | null | 8.8 | null | null | null |
GHSA-39fp-mw43-8h5q
|
mod_digest for Apache before 1.3.31 does not properly verify the nonce of a client response by using a AuthNonce secret.
|
[] | null | null | null | null | null |
|
CVE-2025-24215
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, iPadOS 17.7.6, macOS Sequoia 15.4, macOS Sonoma 14.7.5. A malicious app may be able to access private information.
|
[] | null | 5.5 | null | null | null |
|
CVE-2025-48487
|
FreeScout Vulnerable to Stored XSS
|
FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.180, when creating a translation of a phrase that appears in a flash-message after a completed action, it is possible to inject a payload to exploit XSS vulnerability. This issue has been patched in version 1.8.180.
|
[] | 6 | null | null | null | null |
RHSA-2018:3644
|
Red Hat Security Advisory: flash-plugin security update
|
flash-plugin: Arbitrary code execution vulnerability (APSB18-44)
|
[
"cpe:/a:redhat:rhel_extras:6"
] | null | null | 8.8 | null | null |
CVE-2022-45176
|
An issue was discovered in LIVEBOX Collaboration vDesk through v018. Stored Cross-site Scripting (XSS) can occur under the /api/v1/getbodyfile endpoint via the uri parameter. The web application (through its vShare functionality section) doesn't properly check parameters, sent in HTTP requests as input, before saving them on the server. In addition, crafted JavaScript content can then be reflected back to the end user and executed by the web browser.
|
[
"cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-84qg-hv4f-j8w8
|
Mozilla Firefox before 41.0, when reader mode is enabled, allows remote attackers to spoof the relationship between address-bar URLs and web content via a crafted web site.
|
[] | null | null | null | null | null |
|
CVE-2022-28109
|
Selenium Selenium Grid (formerly Selenium Standalone Server) Fixed in 4.0.0-alpha-7 is affected by: DNS rebinding. The impact is: execute arbitrary code (remote). The component is: WebDriver endpoint of Selenium Grid / Selenium Standalone Server. The attack vector is: Triggered by browsing to to a malicious remote web server. The WebDriver endpoint of Selenium Server (Grid) is vulnerable to DNS rebinding. This can be used to execute arbitrary code on the machine.
|
[
"cpe:2.3:a:selenium:selenium_grid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha1:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha2:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha3:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha5:*:*:*:*:*:*",
"cpe:2.3:a:selenium:selenium_grid:4.0.0:alpha6:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
CVE-2025-41686
|
Improper File Permissions Allow Local Privilege Escalation
|
A low-privileged local attacker can exploit improper permissions on nssm.exe to escalate their privileges and gain administrative access.
|
[] | null | 7.8 | null | null | null |
CVE-2014-6692
|
The Kingsoft Clip (Office Tool) (aka cn.wps.clip) application 1.5.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:wps:kingsoft_clip_\\(office_tool\\):1.5.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 | null |
|
GHSA-68wj-ffg5-qg8c
|
** DISPUTED ** A Missing Authentication for Critical Function issue affecting the HTTP service running on the DJI Mavic Mini 3 Pro on the standard port 80 could allow an attacker to enumerate and download videos and pictures saved on the drone internal or external memory without requiring any kind of authentication.
|
[] | null | 5.2 | null | null | null |
|
CVE-2008-4432
|
Cross-site scripting (XSS) vulnerability in search.php in the RMSOFT MiniShop module 1.0 for Xoops allows remote attackers to inject arbitrary web script or HTML via the itemsxpag parameter.
|
[
"cpe:2.3:a:rmsoft:minishop_module:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:xoops:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-gr26-qx48-q4hh
|
In the Linux kernel, the following vulnerability has been resolved:RDMA/core: Fix ib block iterator counter overflowWhen registering a new DMA MR after selecting the best aligned page size
for it, we iterate over the given sglist to split each entry to smaller,
aligned to the selected page size, DMA blocks.In given circumstances where the sg entry and page size fit certain
sizes and the sg entry is not aligned to the selected page size, the
total size of the aligned pages we need to cover the sg entry is >= 4GB.
Under this circumstances, while iterating page aligned blocks, the
counter responsible for counting how much we advanced from the start of
the sg entry is overflowed because its type is u32 and we pass 4GB in
size. This can lead to an infinite loop inside the iterator function
because the overflow prevents the counter to be larger
than the size of the sg entry.Fix the presented problem by changing the advancement condition to
eliminate overflow.Backtrace:
[ 192.374329] efa_reg_user_mr_dmabuf
[ 192.376783] efa_register_mr
[ 192.382579] pgsz_bitmap 0xfffff000 rounddown 0x80000000
[ 192.386423] pg_sz [0x80000000] umem_length[0xc0000000]
[ 192.392657] start 0x0 length 0xc0000000 params.page_shift 31 params.page_num 3
[ 192.399559] hp_cnt[3], pages_in_hp[524288]
[ 192.403690] umem->sgt_append.sgt.nents[1]
[ 192.407905] number entries: [1], pg_bit: [31]
[ 192.411397] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8]
[ 192.415601] biter->__sg_advance [665837568] sg_dma_len[3221225472]
[ 192.419823] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8]
[ 192.423976] biter->__sg_advance [2813321216] sg_dma_len[3221225472]
[ 192.428243] biter->__sg_nents [1] biter->__sg [0000000008b0c5d8]
[ 192.432397] biter->__sg_advance [665837568] sg_dma_len[3221225472]
|
[] | null | 5.5 | null | null | null |
|
GHSA-cwpj-jqfc-p782
|
Buffer Overflow vulnerability in function C_IStream::read in PluginEXR.cpp in FreeImage 3.18.0 allows remote attackers to run arbitrary code and cause other impacts via crafted image file.
|
[] | null | 7.8 | null | null | null |
|
CVE-2020-2778
|
Vulnerability in the Java SE product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 11.0.6 and 14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:jdk:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:11.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update251:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update55:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update67:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update76:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update80:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update85:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update97:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:7:update99:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:-:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update101:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update102:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update112:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update121:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update131:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update141:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update151:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update152:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update161:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update162:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update171:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update172:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update181:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update191:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update192:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update20:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update201:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update202:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update211:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update212:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update221:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update231:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update241:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update65:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update66:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update73:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update74:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update77:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update91:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:8:update92:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:14:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:7-mode_transition_tool:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:cloud_secure_agent:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_performance_analyzer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:e-series_santricity_web_services:-:*:*:*:*:web_services_proxy:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:plug-in_for_symantec_netbackup:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:santricity_unified_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:*:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:storagegrid:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | null | 3.7 | null | null |
|
CVE-2021-20998
|
WAGO: Managed Switches: Unauthorized creation of user accounts
|
In multiple managed switches by WAGO in different versions without authorization and with specially crafted packets it is possible to create users.
|
[
"cpe:2.3:o:wago:0852-0303_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:0852-0303:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:0852-1305_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:0852-1305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:0852-1505_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:0852-1505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:0852-1305\\/000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:0852-1305\\/000-001:-:*:*:*:*:*:*:*",
"cpe:2.3:o:wago:0852-1505\\/000-001_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:wago:0852-1505\\/000-001:-:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
CVE-2007-4069
|
SQL injection vulnerability in show_cat.php in IndexScript 2.8 and earlier allows remote attackers to execute arbitrary SQL commands via the cat_id parameter.
|
[
"cpe:2.3:a:index_script:index_script:2.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-26364
|
x86 pv: Insufficient care with non-coherent mappings T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, Xen's safety logic doesn't account for CPU-induced cache non-coherency; cases where the CPU can cause the content of the cache to be different to the content in main memory. In such cases, Xen's safety logic can incorrectly conclude that the contents of a page is safe.
|
[
"cpe:2.3:o:xen:xen:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 6.7 | null | 7.2 | null |
|
CVE-2014-0338
|
Multiple cross-site scripting (XSS) vulnerabilities in the firewall policy management pages in WatchGuard Fireware XTM before 11.8.3 allow remote attackers to inject arbitrary web script or HTML via the pol_name parameter.
|
[
"cpe:2.3:o:watchguard:fireware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.6:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.7:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:watchguard:fireware:11.8:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-9gh2-p9fc-q3cr
|
In the Linux kernel, the following vulnerability has been resolved:rxrpc: Fix delayed ACKs to not set the reference serial numberFix the construction of delayed ACKs to not set the reference serial number
as they can't be used as an RTT reference.
|
[] | null | 5.5 | null | null | null |
|
CVE-2023-32493
|
Dell PowerScale OneFS, 9.5.0.x, contains a protection mechanism bypass vulnerability. An unprivileged, remote attacker could potentially exploit this vulnerability, leading to denial of service, information disclosure and remote execution.
|
[
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
CVE-2023-29584
|
mp4v2 v2.0.0 was discovered to contain a heap buffer overflow via the MP4GetVideoProfileLevel function at /src/mp4.cpp.
|
[
"cpe:2.3:a:mp4v2_project:mp4v2:2.0.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2024-42953
|
Tenda FH1201 v1.2.0.14 (408) was discovered to contain a stack overflow via the PPW parameter in the fromWizardHandle function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request.
|
[
"cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:tendacn:fh1201_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tendacn:fh1201:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
GHSA-5q3q-hvr5-mvrw
|
Race condition in pigz before 2.2.5 uses permissions derived from the umask when compressing a file before setting that file's permissions to match those of the original file, which might allow local users to bypass intended access permissions while compression is occurring.
|
[] | null | null | null | null | null |
|
CVE-2006-6529
|
The Chatroom Module before 4.7.x.-1.0 for Drupal displays private messages in a chatroom's last messages overview, which allows remote attackers to obtain sensitive information by reading the overview.
|
[
"cpe:2.3:a:drupal:chatroom_module:4.7:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2015-2754
|
FreeXL before 1.0.0i allows remote attackers to cause a denial of service (stack corruption) and possibly execute arbitrary code via a crafted workbook, related to a "premature EOF."
|
[
"cpe:2.3:a:gaia-gis:freexl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
GHSA-q7rj-wq2w-3q9j
|
x2gocleansessions in X2Go Server before 4.0.0.8 and 4.0.1.x before 4.0.1.10 allows remote authenticated users to gain privileges via unspecified vectors, possibly related to backticks.
|
[] | null | null | null | null | null |
|
GHSA-qcqm-fvf4-grpc
|
A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".
|
[] | 2.3 | 5 | null | null | null |
|
CVE-2023-25519
|
NVIDIA ConnectX Host Firmware for the BlueField Data Processing Unit contains a vulnerability where a restricted host may cause an incorrect user management error. A successful exploit of this vulnerability may lead to escalation of privileges.
|
[
"cpe:2.3:h:nvidia:bluefield_2_ga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_3_ga:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:bluefield_2_lts:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_2_lts_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_2_ga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nvidia:bluefield_3_ga_firmware:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
GHSA-66j8-27jm-c7ff
|
Windows Server Key Distribution Service Security Feature Bypass
|
[] | null | 6.1 | null | null | null |
|
CVE-2017-2610
|
jenkins before versions 2.44, 2.32.2 is vulnerable to a persisted cross-site scripting in search suggestions due to improperly escaping users with less-than and greater-than characters in their names (SECURITY-388).
|
[
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
CVE-2018-0353
|
A vulnerability in traffic-monitoring functions in Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to circumvent Layer 4 Traffic Monitor (L4TM) functionality and bypass security protections. The vulnerability is due to a change in the underlying operating system software that is responsible for monitoring affected traffic. An attacker could exploit this vulnerability by sending crafted IP packets to an affected device. A successful exploit could allow the attacker to pass traffic through the device, which the WSA was configured to deny. This vulnerability affects both IPv4 and IPv6 traffic. This vulnerability affects Cisco AsyncOS versions for WSA on both virtual and hardware appliances running any release of the 10.5.1, 10.5.2, or 11.0.0 WSA Software. The WSA is vulnerable if it is configured for L4TM. Cisco Bug IDs: CSCvg78875.
|
[
"cpe:2.3:a:cisco:web_security_appliance:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:10.5.1-296:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:11.5.0-fcs-442:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
PYSEC-2024-143
| null |
PaddlePaddle before 2.6.0 has a command injection in _wget_download. This resulted in the ability to execute arbitrary commands on the operating system.
|
[] | null | 9.8 | null | null | null |
GHSA-c73q-cj2f-pr35
|
In BlackCat CMS 1.2, remote authenticated users can upload any file via the media upload function in backend/media/ajax_upload.php, as demonstrated by a ZIP archive that contains a .php file.
|
[] | null | null | 6.5 | null | null |
|
CVE-2024-6598
|
Denial-of-service on KNIME Business Hub when certain jobs are executed
|
A denial-of-service attack is possible through the execution functionality of KNIME Business Hub 1.10.0 and 1.10.1. It allows an authenticated attacker with job execution privileges to execute a job that causes internal messages to pile up until there are no more resources available for processing new messages. This leads to an outage of most functionality of KNIME Business Hub. Recovery from the situation is only possible by manual administrator interaction. Please contact our support for instructions in case you have run into this situation.
Updating to KNIME Business Hub 1.10.2 or later solves the problem.
|
[] | 7.1 | null | null | null | null |
GHSA-pp72-j4xc-h27c
|
OpenOffice.org (aka StarOffice) 1.1.x up to 1.1.5 and 2.0.x before 2.0.3 allows user-assisted attackers to conduct unauthorized activities via an OpenOffice document with a malicious BASIC macro, which is executed without prompting the user.
|
[] | null | null | null | null | null |
|
GHSA-j2m5-w7qp-hqg7
|
An issue was discovered in Qt before 5.15.15, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. When a SVG file with an image inside it is rendered, a QTextLayout buffer overflow can be triggered.
|
[] | null | 7.5 | null | null | null |
|
CVE-2023-40725
|
A vulnerability has been identified in QMS Automotive (All versions < V12.39). The affected application returns inconsistent error messages in response to invalid user credentials during login session. This allows an attacker to enumerate usernames, and identify valid usernames.
|
[
"cpe:2.3:a:siemens:qms_automotive:*:*:*:*:*:*:*:*"
] | null | 4 | null | null | null |
|
GHSA-g245-9vvv-25rm
|
The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks.
|
[] | null | 6.1 | null | null | null |
|
GHSA-c6m3-55h6-cpq4
|
The alpha_vms_object_p function in bfd/vms-alpha.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.29 and earlier, allows remote attackers to cause an out of bounds heap write and possibly achieve code execution via a crafted vms alpha file.
|
[] | null | null | 7.8 | null | null |
|
CVE-2011-3324
|
The ospf6_lsa_is_changed function in ospf6_lsa.c in the OSPFv3 implementation in ospf6d in Quagga before 0.99.19 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via trailing zero values in the Link State Advertisement (LSA) header list of an IPv6 Database Description message.
|
[
"cpe:2.3:a:quagga:quagga:*:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.95:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.96.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.97.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.0:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.98.6:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.1:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.2:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.3:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.4:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.5:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.6:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.7:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.8:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.9:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.10:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.11:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.12:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.13:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.14:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.15:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.16:*:*:*:*:*:*:*",
"cpe:2.3:a:quagga:quagga:0.99.17:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-99gx-px59-2hww
|
EMC Documentum Content Server before 6.7SP1 P32, 6.7SP2 before P25, 7.0 before P19, 7.1 before P16, and 7.2 before P02 does not properly check authorization for subgroups of privileged groups, which allows remote authenticated sysadmins to gain super-user privileges, and bypass intended restrictions on data access and server actions, via unspecified vectors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4622.
|
[] | null | null | null | null | null |
|
GHSA-rg7v-v5mq-rpj8
|
A vulnerability has been identified in SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V10, V11, V12 (All versions), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V13 (All versions < V13 SP2 Update 2), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V14 (All versions < V14 SP1 Update 6), SIMATIC STEP 7 (TIA Portal) and WinCC (TIA Portal) V15 (All versions < V15 Update 2). Improper file permissions in the default installation of TIA Portal may allow an attacker with local file system access to insert specially crafted files which may prevent TIA Portal startup (Denial-of-Service) or lead to local code execution. No special privileges are required, but the victim needs to attempt to start TIA Portal after the manipulation.
|
[] | null | null | 7.8 | null | null |
|
CVE-2016-7136
|
z3c.form in Plone CMS 5.x through 5.0.6 and 4.x through 4.3.11 allows remote attackers to conduct cross-site scripting (XSS) attacks via a crafted GET request.
|
[
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.1a1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-7p7c-pvvx-2vx3
|
hyper-staticfile's improper validation of Windows paths could lead to directory traversal attack
|
Path resolution in `hyper-staticfile` didn't correctly validate Windows paths, meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem.This only impacts Windows. Linux and other unix likes are not impacted by this.
|
[] | null | null | null | null | null |
GHSA-rc6c-3j97-8gfm
|
SimplePHPscripts News Script PHP Pro 2.3 does not properly set the HttpOnly Flag from Session Cookies.
|
[] | null | null | null | null | null |
|
CVE-2018-13990
|
The WebUI of PHOENIX CONTACT FL SWITCH 3xxx, 4xxx, 48xx versions prior to 1.35 is vulnerable to brute-force attacks, because of Improper Restriction of Excessive Authentication Attempts.
|
[
"cpe:2.3:o:phoenixcontact:fl_switch_3005_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3005:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3005t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3005t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3004t-fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3004t-fx_st:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3008_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3008t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3008t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_st:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2sfx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2sfx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3016e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3016e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3016_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3016t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3016t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3006t-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3006t-2fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-4fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-4fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4008t-2gt-3fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4008t-2gt-3fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_lc-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_st-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_st-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_st-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4808e-16fx_sm_lc-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4012t_2gt_2fx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4012t_2gt_2fx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4012t-2gt-2fx_st_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4012t-2gt-2fx_st:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4824e-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4824e-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4800e-24fx_sm-4gc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4800e-24fx_sm-4gc:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_3012e-2fx_sm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_3012e-2fx_sm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:phoenixcontact:fl_switch_4000t-8poe-2sfp-r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:phoenixcontact:fl_switch_4000t-8poe-2sfp-r:-:*:*:*:*:*:*:*"
] | null | null | 8.6 | null | null |
|
GHSA-prm9-8h85-6m44
|
Inappropriate implementation in WebApp Installs in Google Chrome prior to 115.0.5790.98 allowed a remote attacker to potentially spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 4.3 | null | null | null |
|
GHSA-589w-p7g5-j9f7
|
In display, there is a possible memory corruption due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07671046; Issue ID: ALPS07671046.
|
[] | null | 6.4 | null | null | null |
|
GHSA-cqhr-j9fp-qjmw
|
The Shantz WordPress QOTD WordPress plugin through 1.2.2 is lacking any CSRF check when updating its settings, allowing attackers to make logged in administrators change them to arbitrary values.
|
[] | null | null | null | null | null |
|
GHSA-w2fh-2f5m-c69g
|
In Kanboard before 1.0.47, by altering form data, an authenticated user can add an internal link to a private project of another user.
|
[] | null | null | 4.3 | null | null |
|
GHSA-gxq7-4c87-6p6j
|
In numerous hand-crafted functions in libmpeg2, NEON registers are not preserved. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120644655.
|
[] | null | null | 8.8 | null | null |
|
GHSA-pmm3-gvq5-3cw3
|
iNovo Broadband IB-8120-W21 139.4410mp1.004200.002 and IB-8120-W21E1 139.4410mp1.3921132mp1.899.004404.004 devices allow remote attackers to discover credentials via iso.3.6.1.4.1.4491.2.4.1.1.6.1.1.0 and iso.3.6.1.4.1.4491.2.4.1.1.6.1.2.0 SNMP requests.
|
[] | null | null | 9.8 | null | null |
|
CVE-2024-40958
|
netns: Make get_net_ns() handle zero refcount net
|
In the Linux kernel, the following vulnerability has been resolved:
netns: Make get_net_ns() handle zero refcount net
Syzkaller hit a warning:
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 3 PID: 7890 at lib/refcount.c:25 refcount_warn_saturate+0xdf/0x1d0
Modules linked in:
CPU: 3 PID: 7890 Comm: tun Not tainted 6.10.0-rc3-00100-gcaa4f9578aba-dirty #310
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
RIP: 0010:refcount_warn_saturate+0xdf/0x1d0
Code: 41 49 04 31 ff 89 de e8 9f 1e cd fe 84 db 75 9c e8 76 26 cd fe c6 05 b6 41 49 04 01 90 48 c7 c7 b8 8e 25 86 e8 d2 05 b5 fe 90 <0f> 0b 90 90 e9 79 ff ff ff e8 53 26 cd fe 0f b6 1
RSP: 0018:ffff8881067b7da0 EFLAGS: 00010286
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff811c72ac
RDX: ffff8881026a2140 RSI: ffffffff811c72b5 RDI: 0000000000000001
RBP: ffff8881067b7db0 R08: 0000000000000000 R09: 205b5d3730353139
R10: 0000000000000000 R11: 205d303938375420 R12: ffff8881086500c4
R13: ffff8881086500c4 R14: ffff8881086500b0 R15: ffff888108650040
FS: 00007f5b2961a4c0(0000) GS:ffff88823bd00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055d7ed36fd18 CR3: 00000001482f6000 CR4: 00000000000006f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
<TASK>
? show_regs+0xa3/0xc0
? __warn+0xa5/0x1c0
? refcount_warn_saturate+0xdf/0x1d0
? report_bug+0x1fc/0x2d0
? refcount_warn_saturate+0xdf/0x1d0
? handle_bug+0xa1/0x110
? exc_invalid_op+0x3c/0xb0
? asm_exc_invalid_op+0x1f/0x30
? __warn_printk+0xcc/0x140
? __warn_printk+0xd5/0x140
? refcount_warn_saturate+0xdf/0x1d0
get_net_ns+0xa4/0xc0
? __pfx_get_net_ns+0x10/0x10
open_related_ns+0x5a/0x130
__tun_chr_ioctl+0x1616/0x2370
? __sanitizer_cov_trace_switch+0x58/0xa0
? __sanitizer_cov_trace_const_cmp2+0x1c/0x30
? __pfx_tun_chr_ioctl+0x10/0x10
tun_chr_ioctl+0x2f/0x40
__x64_sys_ioctl+0x11b/0x160
x64_sys_call+0x1211/0x20d0
do_syscall_64+0x9e/0x1d0
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5b28f165d7
Code: b3 66 90 48 8b 05 b1 48 2d 00 64 c7 00 26 00 00 00 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 81 48 2d 00 8
RSP: 002b:00007ffc2b59c5e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5b28f165d7
RDX: 0000000000000000 RSI: 00000000000054e3 RDI: 0000000000000003
RBP: 00007ffc2b59c650 R08: 00007f5b291ed8c0 R09: 00007f5b2961a4c0
R10: 0000000029690010 R11: 0000000000000246 R12: 0000000000400730
R13: 00007ffc2b59cf40 R14: 0000000000000000 R15: 0000000000000000
</TASK>
Kernel panic - not syncing: kernel: panic_on_warn set ...
This is trigger as below:
ns0 ns1
tun_set_iff() //dev is tun0
tun->dev = dev
//ip link set tun0 netns ns1
put_net() //ref is 0
__tun_chr_ioctl() //TUNGETDEVNETNS
net = dev_net(tun->dev);
open_related_ns(&net->ns, get_net_ns); //ns1
get_net_ns()
get_net() //addition on 0
Use maybe_get_net() in get_net_ns in case net's ref is zero to fix this
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc4:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
CVE-2010-1287
|
Adobe Shockwave Player before 11.5.7.609 allows attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2010-1284, CVE-2010-1286, CVE-2010-1289, CVE-2010-1290, and CVE-2010-1291.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-r9wv-87cr-24pw
|
Insufficient policy enforcement in storage in Google Chrome prior to 80.0.3987.87 allowed a remote attacker to bypass site isolation via a crafted HTML page.
|
[] | null | 8.8 | null | null | null |
|
CVE-2017-16098
|
charset 1.0.0 and below are vulnerable to regular expression denial of service. Input of around 50k characters is required for a slow down of around 2 seconds. Unless node was compiled using the -DHTTP_MAX_HEADER_SIZE= option the default header max length is 80kb, so the impact of the ReDoS is relatively low.
|
[
"cpe:2.3:a:charset_project:charset:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null |
|
CVE-2025-53337
|
WordPress LifePress Plugin <= 2.1.3 - Broken Access Control Vulnerability
|
Missing Authorization vulnerability in Ashan Perera LifePress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects LifePress: from n/a through 2.1.3.
|
[] | null | 5.4 | null | null | null |
CVE-2024-56621
|
scsi: ufs: core: Cancel RTC work during ufshcd_remove()
|
In the Linux kernel, the following vulnerability has been resolved:
scsi: ufs: core: Cancel RTC work during ufshcd_remove()
Currently, RTC work is only cancelled during __ufshcd_wl_suspend(). When
ufshcd is removed in ufshcd_remove(), RTC work is not cancelled. Due to
this, any further trigger of the RTC work after ufshcd_remove() would
result in a NULL pointer dereference as below:
Unable to handle kernel NULL pointer dereference at virtual address 00000000000002a4
Workqueue: events ufshcd_rtc_work
Call trace:
_raw_spin_lock_irqsave+0x34/0x8c
pm_runtime_get_if_active+0x24/0xb4
ufshcd_rtc_work+0x124/0x19c
process_scheduled_works+0x18c/0x2d8
worker_thread+0x144/0x280
kthread+0x11c/0x128
ret_from_fork+0x10/0x20
Since RTC work accesses the ufshcd internal structures, it should be cancelled
when ufshcd is removed. So do that in ufshcd_remove(), as per the order in
ufshcd_init().
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
CVE-2009-1056
|
IBM Rational AppScan Enterprise before 5.5 FP1 allows remote attackers to read arbitrary exported reports by "forcefully browsing."
|
[
"cpe:2.3:a:ibm:rational_appscan:*:*:enterprise:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-3c8f-rxxg-jrxm
|
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.
|
[] | null | 4.9 | null | null | null |
|
CVE-2016-9820
|
libavcodec/mpegvideo_motion.c in libav 11.8 allows remote attackers to cause a denial of service (crash) via vectors involving left shift of a negative value.
|
[
"cpe:2.3:a:libav:libav:11.8:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 | null |
|
GHSA-2phc-7cq6-m4fq
|
The Inetc plugin for Nullsoft Scriptable Install System (NSIS), as used in CERT/CC Failure Observation Engine (FOE) and other products, does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and possibly execute arbitrary code by sending a crafted certificate in a download session for Windows executable files.
|
[] | null | null | null | null | null |
|
CVE-2008-2325
|
QuickLook in Apple Mac OS X 10.4.11 and 10.5.4 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted Microsoft Office file, related to insufficient "bounds checking."
|
[
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicklook:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null |
|
GHSA-fp8m-q3h7-6ww8
|
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
|
[] | null | 4.2 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.