id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-hphp-f4qw-8f76
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[] | null | null | 6.5 | null | null |
|
GHSA-6gc5-r24c-783h
|
Improper resolution of path equivalence in Windows MapUrlToZone allows an unauthorized attacker to bypass a security feature over a network.
|
[] | null | 4.3 | null | null | null |
|
CVE-2023-7204
|
WP STAGING WordPress Backup Plugin < 3.2.0 - Unauthorized Sensitive Data Exposure
|
The WP STAGING WordPress Backup plugin before 3.2.0 allows access to cache files during the cloning process which provides
|
[
"cpe:2.3:a:wp-staging:wp_staging:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
GHSA-7hvp-684m-pr7g
|
The BadgeOS WordPress plugin before 3.7.1.3 does not sanitise and escape parameters before using them in SQL statements via AJAX actions available to any authenticated users, leading to SQL Injections
|
[] | null | 8.8 | null | null | null |
|
GHSA-r9w6-rhh9-7v53
|
Incorrect Authorization in HashiCorp Consul
|
HashiCorp Consul and Consul Enterprise 1.4.1 through 1.6.2 did not uniformly enforce ACLs across all API endpoints, resulting in potential unintended information disclosure. Fixed in 1.6.3.
|
[] | null | 5.3 | null | null | null |
CVE-2007-4037
|
Guidance Software EnCase allows user-assisted attackers to trigger a buffer over-read and application crash via a malformed NTFS filesystem containing a modified FILE record with a certain large offset. NOTE: the vendor disputes the significance of this issue, asserting that relevant attackers typically do not corrupt a filesystem, and indicating that the relevant read operation can be disabled
|
[
"cpe:2.3:a:guidance_software:encase:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-4j8p-ghvp-qjv7
|
A vulnerability was found in SourceCodester Lost and Found Information System 1.0. It has been classified as problematic. This affects an unknown part of the file admin/?page=user/manage_user of the component Manage User Page. The manipulation of the argument First Name/Middle Name/Last Name leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-230361 was assigned to this vulnerability.
|
[] | null | null | 2.4 | null | null |
|
GHSA-x588-2pxr-8rpq
|
Buffer overflow in Bugbear Entertainment FlatOut 2005 allows user-assisted remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long string in the title field in a bed file.
|
[] | null | null | null | null | null |
|
GHSA-wqcc-7crj-3p76
|
D-LINK DI-8200 16.07.26A1 is vulnerable to Buffer Overflow in the yyxz_dlink_asp function via the id parameter.
|
[] | null | 3.5 | null | null | null |
|
CVE-2018-15852
|
Technicolor TC7200.20 devices allow remote attackers to cause a denial of service (networking outage) via a flood of random MAC addresses, as demonstrated by macof. NOTE: Technicolor denies that the described behavior is a vulnerability and states that Wi-Fi traffic is slowed or stopped only while the devices are exposed to a MAC flooding attack. This has been confirmed through testing against official up-to-date versions
|
[
"cpe:2.3:o:technicolor:tc7200.20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:technicolor:tc7200.20:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 6.1 | null |
|
CVE-2019-10563
|
Buffer over-read can occur in fast message handler due to improper input validation while processing a message from firmware in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in APQ8053, APQ8096AU, MSM8996AU, MSM8998, QCN7605, QCS405, QCS605, SDA660, SDM636, SDM660, SDX20, SDX24
|
[
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 | null |
|
CVE-2022-1183
|
Destroying a TLS session early causes assertion failure
|
On vulnerable configurations, the named daemon may, in some circumstances, terminate with an assertion failure. Vulnerable configurations are those that include a reference to http within the listen-on statements in their named.conf. TLS is used by both DNS over TLS (DoT) and DNS over HTTPS (DoH), but configurations using DoT alone are unaffected. Affects BIND 9.18.0 -> 9.18.2 and version 9.19.0 of the BIND 9.19 development branch.
|
[
"cpe:2.3:a:isc:bind:*:*:*:*:-:*:*:*",
"cpe:2.3:a:isc:bind:9.19.0:*:*:*:-:*:*:*",
"cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null | null |
GHSA-cvm9-664r-fv44
|
Multiple vulnerabilities in the web-based user interface of certain Cisco Small Business Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges on an affected device. These vulnerabilities are due to improper validation of requests that are sent to the web interface. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | 8.6 | null | null |
|
CVE-2005-3163
|
Unspecified vulnerability in Polipo 0.9.8 and earlier allows attackers to read files outside of the web root.
|
[
"cpe:2.3:a:polipo:polipo:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:polipo:polipo:0.9.8:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-c2jr-j6q7-w7p7
|
Multiple SQL injection vulnerabilities in ASPSiteWare RealtyListings 1.0 and 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) iType parameter to type.asp and the (2) iPro parameter to detail.asp.
|
[] | null | null | null | null | null |
|
GHSA-3v78-x6p4-8r93
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in MarketingFire Widget Options allows OS Command Injection.This issue affects Widget Options: from n/a through 4.1.0.
|
[] | null | 9.9 | null | null | null |
|
GHSA-fgv5-wppj-fjxh
|
D-Link DIR-822+ V1.0.5 was found to contain a command injection in ChgSambaUserSettings function of prog.cgi, which allows remote attackers to execute arbitrary commands via shell.
|
[] | null | 8.8 | null | null | null |
|
GHSA-65pv-gqpg-397f
|
The WP-DBManager WordPress plugin before 2.80.8 does not prevent administrators from running arbitrary commands on the server in multisite installations, where only super-administrators should.
|
[] | null | 7.2 | null | null | null |
|
GHSA-7j36-gc4r-9x3r
|
Out of bounds access in compact_arena
|
Affected versions of this crate did not properly implement the generativity, because the invariant lifetimes were not necessarily dropped.This allows an attacker to mix up two arenas, using indices created from one arena with another one. This might lead to an out-of-bounds read or write access into the memory reserved for the arena.The flaw was corrected by implementing generativity correctly in version 0.4.0.
|
[] | null | 9.8 | null | null | null |
CVE-2024-35755
|
WordPress Weather Widget Pro plugin <= 1.1.40 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in El tiempo Weather Widget Pro allows Stored XSS.This issue affects Weather Widget Pro: from n/a through 1.1.40.
|
[
"cpe:2.3:a:eltiempoen:weather_widget_pro:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null | null |
GHSA-94p9-j5rq-pr5c
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Table Builder WP Table Builder allows Stored XSS. This issue affects WP Table Builder: from n/a through 2.0.12.
|
[] | null | 6.5 | null | null | null |
|
CVE-2022-35460
|
OTFCC v0.10.4 was discovered to contain a heap-buffer overflow via /release-x64/otfccdump+0x61731f.
|
[
"cpe:2.3:a:otfcc_project:otfcc:0.10.4:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
|
CVE-2025-46889
|
Adobe Experience Manager | Improper Access Control (CWE-284)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by an Improper Access Control vulnerability that could result in privilege escalation. A low privileged attacker could leverage this vulnerability to bypass security measures and gain limited unauthorized elevated access. Exploitation of this issue does not require user interaction.
|
[] | null | 5.4 | null | null | null |
CVE-2025-39407
|
WordPress Memberpress plugin < 1.12.0 - Reflected Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Caseproof, LLC Memberpress allows Reflected XSS.This issue affects Memberpress: from n/a before 1.12.0.
|
[] | null | 7.1 | null | null | null |
GHSA-m429-fhmv-c6q2
|
Improper Verification of Cryptographic Signature in ansible
|
A flaw was found in the Ansible Engine, in ansible-engine 2.8.x before 2.8.15 and ansible-engine 2.9.x before 2.9.13, when installing packages using the dnf module. GPG signatures are ignored during installation even when `disable_gpg_check` is set to `False`, which is the default behavior. This flaw leads to malicious packages being installed on the system and arbitrary code executed via package installation scripts. The highest threat from this vulnerability is to integrity and system availability.
|
[] | 6.9 | 7.1 | null | null | null |
CVE-2017-15705
|
A denial of service vulnerability was identified that exists in Apache SpamAssassin before 3.4.2. The vulnerability arises with certain unclosed tags in emails that cause markup to be handled incorrectly leading to scan timeouts. In Apache SpamAssassin, using HTML::Parser, we setup an object and hook into the begin and end tag event handlers In both cases, the "open" event is immediately followed by a "close" event - even if the tag *does not* close in the HTML being parsed. Because of this, we are missing the "text" event to deal with the object normally. This can cause carefully crafted emails that might take more scan time than expected leading to a Denial of Service. The issue is possibly a bug or design decision in HTML::Parser that specifically impacts the way Apache SpamAssassin uses the module with poorly formed html. The exploit has been seen in the wild but not believed to have been purposefully part of a Denial of Service attempt. We are concerned that there may be attempts to abuse the vulnerability in the future.
|
[
"cpe:2.3:a:apache:spamassassin:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2013-5554
|
Directory traversal vulnerability in the web-management interface in the server in Cisco Wide Area Application Services (WAAS) Mobile before 3.5.5 allows remote attackers to upload and execute arbitrary files via a crafted POST request, aka Bug ID CSCuh69773.
|
[
"cpe:2.3:a:cisco:wide_area_application_services_mobile:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wide_area_application_services_mobile:3.5.3:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2007-1960
|
SQL injection vulnerability in visit.php in the Rha7 Downloads (rha7downloads) 1.0 module for XOOPS, and possibly other versions up to 1.10, allows remote attackers to execute arbitrary SQL commands via the lid parameter.
|
[
"cpe:2.3:a:xoops:rha7_downloads_module:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xoops:rha7_downloads_module:1.10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2022-2854
|
Use after free in SwiftShader in Google Chrome prior to 104.0.5112.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-22975
|
A cross-site scripting (XSS) vulnerability in JFinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the email parameter under /front/person/profile.html.
|
[
"cpe:2.3:a:jflyfox:jfinal_cms:5.1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2019-0635
|
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Information Disclosure Vulnerability'.
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 6.2 | 5.5 | null |
|
PYSEC-2021-155
| null |
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (default in TF 2.0 and later), session operations are invalid. However, users could still call the raw ops associated with them and trigger a null pointer dereference. The implementation(https://github.com/tensorflow/tensorflow/blob/eebb96c2830d48597d055d247c0e9aebaea94cd5/tensorflow/core/kernels/session_ops.cc#L104) dereferences the session state pointer without checking if it is valid. Thus, in eager mode, `ctx->session_state()` is nullptr and the call of the member function is undefined behavior. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
CVE-2011-1893
|
Cross-site scripting (XSS) vulnerability in Microsoft Office SharePoint Server 2010, Windows SharePoint Services 2.0 and 3.0 SP2, and SharePoint Foundation 2010 allows remote attackers to inject arbitrary web script or HTML via the URI, aka "SharePoint XSS Vulnerability."
|
[
"cpe:2.3:a:microsoft:sharepoint_foundation:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_services:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_services:3.0:sp2:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_services:3.0:sp2:x64:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2025-46918
|
Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
GHSA-p468-m6gq-36cp
|
The web framework in Cisco UCS Central Software 1.3(0.99) allows remote attackers to read arbitrary files via a crafted HTTP request, aka Bug ID CSCuu41377.
|
[] | null | null | null | null | null |
|
CVE-2021-39931
|
An issue has been discovered in GitLab CE/EE affecting all versions starting from 8.11 before 14.3.6, all versions starting from 14.4 before 14.4.4, all versions starting from 14.5 before 14.5.2. Under specific condition an unauthorised project member was allowed to delete a protected branches due to a business logic error.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*"
] | null | 3.1 | null | null | null |
|
GHSA-6qvq-5969-5wrp
|
The LevelOne WBR-6012 router firmware R0.40e6 suffers from an input validation vulnerability within its FTP functionality, enabling attackers to cause a denial of service through a series of malformed FTP commands. This can lead to device reboots and service disruption.
|
[] | null | 7.5 | null | null | null |
|
GHSA-fhv8-3g95-wgrc
|
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system, aka 'Windows Print Spooler Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1048.
|
[] | null | null | null | null | null |
|
RHSA-2024:4982
|
Red Hat Security Advisory: OpenShift API for Data Protection (OADP) 1.3.3 security and bug fix update
|
golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS golang: net: malformed DNS message can cause infinite loop golang: archive/zip: Incorrect handling of certain ZIP files golang: net/netip: Unexpected behavior from Is methods for IPv4-mapped IPv6 addresses
|
[
"cpe:/a:redhat:openshift_api_data_protection:1.3::el9"
] | null | 6.7 | null | null | null |
CVE-2001-1076
|
Buffer overflow in whodo in Solaris SunOS 5.5.1 through 5.8 allows local users to execute arbitrary code via a long (1) SOR or (2) CFIME environment variable.
|
[
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
GHSA-hcm2-338g-vfjg
|
NetApp FAS 8300/8700 and AFF A400 Baseboard Management Controller (BMC) firmware versions 13.x prior to 13.1P1 were shipped with a default account enabled that could allow unauthorized arbitrary command execution via local access.
|
[] | null | null | null | null | null |
|
GHSA-fr72-9665-w3gr
|
Duplicate Advisory: Unrestricted file upload of user avatar images
|
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-xrvh-rvc4-5m43. This link is maintained to preserve external references.Original DescriptionAn arbitrary file upload vulnerability in the Profile Image module of Kirby CMS v4.1.0 allows attackers to execute arbitrary code via a crafted PDF file.
|
[] | null | null | null | null | null |
CVE-2025-6328
|
D-Link DIR-815 hedwig.cgi sub_403794 stack-based overflow
|
A vulnerability was found in D-Link DIR-815 1.01. It has been declared as critical. This vulnerability affects the function sub_403794 of the file hedwig.cgi. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
CVE-2011-1602
|
The su utility on Cisco Unified IP Phones 7900 devices (aka TNP phones) with software before 9.0.3 allows local users to gain privileges via unspecified vectors, aka Bug ID CSCtf07426.
|
[
"cpe:2.3:h:cisco:unified_ip_phone_7906:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7911g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7931g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7941g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7941g-ge:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7942g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7945g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7961g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7961g-ge:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7962g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7965g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7970g:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7971g-ge:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:unified_ip_phone_7975g:*:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:*:sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(2\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.0\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.3\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:1.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:2.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.1\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(6a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.2\\(15\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(11\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(12\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(13\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(14\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(15\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:3.3\\(20\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:4.1\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:5.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(2\\):sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(3\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:6.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(2\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:7.2\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(4\\):sr3a:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(6\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(7\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(8\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(9\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.0\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr3:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.2\\(2\\):sr4:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(2\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(3\\):sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(1\\):sr2:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.4\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(2\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(3\\):sr1:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.5\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:8.70:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:skinny_client_control_protocol_software:9.0\\(2\\):sr1:*:*:*:*:*:*"
] | null | null | null | 6.6 | null |
|
GHSA-6gvj-8vc5-8v3j
|
org.xwiki.platform:xwiki-platform-oldcore Open Redirect vulnerability
|
ImpactIt's possible to exploit well known parameters in XWiki URLs to perform redirection to untrusted site. This vulnerability was partially fixed in the past for XWiki 12.10.7 and 13.3RC1 but there is still the possibility to force specific URLs to skip some checks, e.g. using URLs like `http:example.com` in the parameter would allow the redirect.PatchesThe issue has now been patched against all patterns that we know about for performing redirect. It also performs a real URI parsing that should protect in most cases. This has been patched in XWiki 14.10.4 and 15.0.WorkaroundsThe only workaround is to upgrade XWiki.ReferencesJIRA ticket: https://jira.xwiki.org/browse/XWIKI-20096JIRA ticket about the improvment actually fixing the vulnerability: https://jira.xwiki.org/browse/XWIKI-20549Previous advisory about open redirect: https://github.com/advisories/GHSA-jp55-vvmf-63mvFor more informationIf you have any questions or comments about this advisory:Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)Email us at [Security Mailing List](mailto:[email protected])AttributionThanks to Paulos Mesfin who originally reported the vulnerability.
|
[] | null | 4.7 | null | null | null |
CVE-2024-45279
|
Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver Application Server for ABAP (CRM Blueprint Application Builder Panel)
|
Due to insufficient input validation, CRM Blueprint Application Builder Panel of SAP NetWeaver Application Server for ABAP allows an unauthenticated attacker to craft a URL link which could embed a malicious JavaScript. When a victim clicks on this link, the script will be executed in the victim's browser giving the attacker the ability to access and/or modify information with no effect on availability of the application.
|
[] | null | 6.1 | null | null | null |
GHSA-j6hw-jr7w-8c5m
|
In the Linux kernel, the following vulnerability has been resolved:wifi: mac80211: fix initialization of rx->link and rx->link_staThere are some codepaths that do not initialize rx->link_sta properly. This
causes a crash in places which assume that rx->link_sta is valid if rx->sta
is valid.
One known instance is triggered by __ieee80211_rx_h_amsdu being called from
fast-rx. It results in a crash like this one:BUG: kernel NULL pointer dereference, address: 00000000000000a8
#PF: supervisor write access in kernel mode
#PF: error_code(0x0002) - not-present page PGD 0 P4D 0
Oops: 0002 [#1] PREEMPT SMP PTI
CPU: 1 PID: 506 Comm: mt76-usb-rx phy Tainted: G E 6.1.0-debian64x+1.7 #3
Hardware name: ZOTAC ZBOX-ID92/ZBOX-IQ01/ZBOX-ID92/ZBOX-IQ01, BIOS B220P007 05/21/2014
RIP: 0010:ieee80211_deliver_skb+0x62/0x1f0 [mac80211]
Code: 00 48 89 04 24 e8 9e a7 c3 df 89 c0 48 03 1c c5 a0 ea 39 a1 4c 01 6b 08 48 ff 03 48
83 7d 28 00 74 11 48 8b 45 30 48 63 55 44 <48> 83 84 d0 a8 00 00 00 01 41 8b 86 c0
11 00 00 8d 50 fd 83 fa 01
RSP: 0018:ffff999040803b10 EFLAGS: 00010286
RAX: 0000000000000000 RBX: ffffb9903f496480 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffff999040803ce0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8d21828ac900
R13: 000000000000004a R14: ffff8d2198ed89c0 R15: ffff8d2198ed8000
FS: 0000000000000000(0000) GS:ffff8d24afe80000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000000000a8 CR3: 0000000429810002 CR4: 00000000001706e0
Call Trace:
<TASK>
__ieee80211_rx_h_amsdu+0x1b5/0x240 [mac80211]
? ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]
? __local_bh_enable_ip+0x3b/0xa0
ieee80211_prepare_and_rx_handle+0xcdd/0x1320 [mac80211]
? prepare_transfer+0x109/0x1a0 [xhci_hcd]
ieee80211_rx_list+0xa80/0xda0 [mac80211]
mt76_rx_complete+0x207/0x2e0 [mt76]
mt76_rx_poll_complete+0x357/0x5a0 [mt76]
mt76u_rx_worker+0x4f5/0x600 [mt76_usb]
? mt76_get_min_avg_rssi+0x140/0x140 [mt76]
__mt76_worker_fn+0x50/0x80 [mt76]
kthread+0xed/0x120
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x22/0x30Since the initialization of rx->link and rx->link_sta is rather convoluted
and duplicated in many places, clean it up by using a helper function to
set it.[remove unnecessary rx->sta->sta.mlo check]
|
[] | null | 5.5 | null | null | null |
|
RHSA-2003:098
|
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability
|
security flaw
|
[
"cpe:/o:redhat:linux:7.1",
"cpe:/o:redhat:linux:7.2",
"cpe:/o:redhat:linux:7.3",
"cpe:/o:redhat:linux:8.0"
] | null | null | null | null | null |
GHSA-62vf-2f7p-wwr4
|
In the /HNAP1/SetQoSSettings message, the uplink parameter is vulnerable, and the vulnerability affects D-Link DIR-822 Rev.B 202KRb06 and DIR-822 Rev.C 3.10B06 devices. In the SetQoSSettings.php source code, the uplink parameter is saved in the /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth internal configuration memory without any regex checking. And in the bwc_tc_spq_start, bwc_tc_wfq_start, and bwc_tc_adb_start functions of the bwcsvcs.php source code, the data in /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth is used with the tc command without any regex checking. A vulnerable /HNAP1/SetQoSSettings XML message could have shell metacharacters in the uplink element such as the `telnetd` string.
|
[] | null | null | 9.8 | null | null |
|
GHSA-4g9q-c75g-jq7q
|
An Untrusted Pointer Dereference was discovered in function mrb_vm_exec in mruby before 3.1.0-rc. The vulnerability causes a segmentation fault and application crash.
|
[] | null | 7.5 | null | null | null |
|
CVE-2018-20911
|
cPanel before 70.0.23 allows code execution because "." is in @INC during a Perl syntax check of cpaddonsup (SEC-359).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
GHSA-wg8v-cggr-5vm6
|
RICOS in IBM Algo Credit Limits (aka ACLM) 4.5.0 through 4.7.0 before 4.7.0.03 FP5 in IBM Algorithmics relies on client-side input validation, which allows remote authenticated users to bypass intended dual-control restrictions and modify data via a crafted XML document, as demonstrated by manipulation of read-only limit data.
|
[] | null | null | null | null | null |
|
CVE-2025-5909
|
TOTOLINK EX1200T HTTP POST Request formReflashClientTbl buffer overflow
|
A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formReflashClientTbl of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
CVE-2018-1549
|
IBM Rational Quality Manager 5.0 through 5.0.2 and 6.0 through 6.0.5 are vulnerable to HTTP response splitting attacks. A remote attacker could exploit this vulnerability using specially-crafted URL to cause the server to return a split response, once the URL is clicked. This would allow the attacker to perform further attacks, such as Web cache poisoning, cross-site scripting, and possibly obtain sensitive information. IBM X-Force ID: 142658.
|
[
"cpe:2.3:a:ibm:rational_quality_manager:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | null | null |
|
CVE-2021-24428
|
RSS for Yandex Turbo <= 1.30 - Authenticated Stored XSS
|
The RSS for Yandex Turbo WordPress plugin through 1.30 does not sanitise or escape some of its settings before saving and outputing them in the admin dashboard, leading to an Authenticated Stored Cross-Site Scripting issue even when the unfiltered_html capability is disallowed.
|
[
"cpe:2.3:a:yandex:yandex_turbo:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | 3.5 | null |
CVE-2024-9375
|
WordPress Captcha Plugin by Captcha Bank <= 4.0.36 - Reflected Cross-Site Scripting
|
The WordPress Captcha Plugin by Captcha Bank plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.0.36. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[
"cpe:2.3:a:techbanker:captcha_bank:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | null | null |
CVE-2022-43902
|
IBM MQ denial of service
|
IBM MQ 9.2 CD, 9.2 LTS, 9.3 CD, and 9.3 LTS is vulnerable to a denial of service attack caused by specially crafted PCF or MQSC messages. IBM X-Force ID: 240832.
|
[
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.2.5:-:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.2.5:cumulative_security_update_01:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.2.5:cumulative_security_update_02:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.2.5:cumulative_security_update_03:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3.0.0:*:*:*:continuous_delivery:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3.0.0:*:*:*:lts:*:*:*",
"cpe:2.3:a:ibm:mq_appliance:9.3.1:*:*:*:continuous_delivery:*:*:*"
] | null | 6.5 | null | null | null |
CVE-2023-21420
|
Use of Externally-Controlled Format String vulnerabilities in STST TA prior to SMR Jan-2023 Release 1 allows arbitrary code execution.
|
[
"cpe:2.3:o:samsung:android:10.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-apr-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-aug-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-dec-2019-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-feb-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jan-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jul-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jun-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-mar-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-may-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-nov-2019-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-nov-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-oct-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-sep-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:10.0:smr-sep-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:-:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-apr-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-aug-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2020-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-dec-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-feb-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jan-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jul-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-jun-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-mar-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-may-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-nov-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-oct-2023-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2021-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2022-r1:*:*:*:*:*:*",
"cpe:2.3:o:samsung:android:11.0:smr-sep-2023-r1:*:*:*:*:*:*"
] | null | 7.3 | null | null | null |
|
GHSA-g9pj-9rx7-4mf8
|
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30139, CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30153, CVE-2022-30161.
|
[] | null | 7.5 | null | null | null |
|
GHSA-f88m-mw5f-cggv
|
Cross-site scripting (XSS) vulnerability in the Visitor Tracking (ws_stats) extension before 0.1.2 for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-qrhc-83j2-vphf
|
The Bitcoin / AltCoin Payment Gateway for WooCommerce & Multivendor store / shop WordPress plugin through 1.7.1 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by authenticated users
|
[] | null | 9.8 | null | null | null |
|
CVE-2022-1044
|
Sensitive Data Exposure Due To Insecure Storage Of Profile Image in polonel/trudesk
|
Sensitive Data Exposure Due To Insecure Storage Of Profile Image in GitHub repository polonel/trudesk prior to v1.2.1.
|
[
"cpe:2.3:a:trudesk_project:trudesk:*:*:*:*:*:*:*:*"
] | null | null | 8.2 | null | null |
GHSA-6rjq-282f-p3mr
|
Missing Authorization vulnerability in Surfer Surfer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Surfer: from n/a through 1.3.2.357.
|
[] | null | 7.6 | null | null | null |
|
GHSA-33jh-9x8q-p7j7
|
The Control and Provisioning functionality in Cisco Mobility Services Engine (MSE) 10.0(0.1) allows remote authenticated users to obtain sensitive information by reading log files, aka Bug ID CSCut36851.
|
[] | null | null | null | null | null |
|
CVE-2025-30452
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.5, macOS Sequoia 15.4, macOS Sonoma 14.7.5. An input validation issue was addressed.
|
[] | null | 9.8 | null | null | null |
|
CVE-2002-2100
|
Microsoft Outlook 2002 allows remote attackers to embed bypass the file download restrictions for attachments via an HTML email message that uses an IFRAME to reference malicious content.
|
[
"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
CVE-2011-2169
|
Google Chrome OS before R12 0.12.433.38 Beta allows local users to gain privileges by creating a /var/lib/chromeos-aliases.conf file and placing commands in it.
|
[
"cpe:2.3:o:google:chrome_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.9.126.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.142.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.146.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.18:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.20:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.30:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.34:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.36:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.46:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.50:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.10.156.54:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.227.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.14:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.18:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.32:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.39:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.44:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.11.257.91:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.12.362.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.12.397.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.12.433.9:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.12.433.14:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.12.433.22:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:0.12.433.28:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:8.0.552.342:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:8.0.552.343:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:8.0.552.344:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2022-4193
|
Insufficient policy enforcement in File System API in Google Chrome prior to 108.0.5359.71 allowed a remote attacker to bypass file system restrictions via a crafted HTML page. (Chromium security severity: Medium)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
GHSA-8x5c-jhv9-65x6
|
sshd in OpenSSH before 4.4, when using the version 1 SSH protocol, allows remote attackers to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
|
[] | null | null | null | null | null |
|
GHSA-59p2-v62x-gxj8
|
Ryu Infinite Loop vulnerability
|
`OFPHello` in parser.py in Faucet SDN Ryu 4.34 allows attackers to cause a denial of service (infinite loop) via `length=0`.
|
[] | null | 7.5 | null | null | null |
GHSA-rpmm-2h25-mg88
|
GPAC version 0.7.1 and earlier has a buffer overflow vulnerability in the cat_multiple_files function in applications/mp4box/fileimport.c when MP4Box is used for a local directory containing crafted filenames.
|
[] | null | null | 7.8 | null | null |
|
CVE-2025-36853
|
EOL .NET 6.0 Runtime Remote Code Execution Vulnerability
|
A vulnerability (CVE-2025-21172) exists in msdia140.dll due to integer overflow and heap-based overflow.
Per CWE-122: Heap-based Buffer Overflow, a heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().
Per CWE-190: Integer Overflow or Wraparound, is when a product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.
NOTE: This CVE affects only End Of Life (EOL) software components. The vendor, Microsoft, has indicated there will be no future updates nor support provided upon inquiry.
|
[] | null | 7.5 | null | null | null |
CVE-2018-19841
|
The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
|
[
"cpe:2.3:a:wavpack:wavpack:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-r9hx-hmhj-28pf
|
winpm-32.exe in Pegasus Mail (aka Pmail) v4.72 build 572 allows code execution via a crafted ssgp.dll file that must be installed locally. For example, if ssgp.dll is on the desktop and executes arbitrary code in the DllMain function, then clicking on a mailto: link on a remote web page triggers the attack.
|
[] | null | null | 7.3 | null | null |
|
GHSA-2g88-x65c-wgcj
|
WG-C10 v3.0.79 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors.
|
[] | null | null | 7.2 | null | null |
|
CVE-2022-32961
|
HiCOS’ client-side citizen digital certificate - Stack Buffer Overflow
|
HICOS’ client-side citizen digital certificate component has a stack-based buffer overflow vulnerability when reading IC card due to insufficient parameter length validation for token information. An unauthenticated physical attacker can exploit this vulnerability to execute arbitrary code, manipulate system data or terminate service.
|
[
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30306:*:*:*:*:linux:*:*",
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.0.3.30404:*:*:*:*:macos:*:*",
"cpe:2.3:a:hinet:hicos_natural_person_credential_component_client:3.1.0.00002:*:*:*:*:windows:*:*"
] | null | 6.8 | null | null | null |
CVE-2020-13272
|
OAuth flow missing verification checks CE/EE 12.3 and later through 13.0.1 allows unverified user to use OAuth authorization code flow
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.0.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:13.0.0:*:*:*:enterprise:*:*:*"
] | null | 7.5 | null | null | null |
|
CVE-2022-35800
|
Azure Site Recovery Elevation of Privilege Vulnerability
|
Azure Site Recovery Elevation of Privilege Vulnerability
|
[
"cpe:2.3:a:microsoft:azure_site_recovery:*:*:*:*:vmware_to_azure:*:*:*"
] | null | 4.9 | null | null | null |
GHSA-qjj8-32p7-h289
|
Division by 0 in `ResourceGather`
|
ImpactAn attacker can trigger a crash via a floating point exception in `tf.raw_ops.ResourceGather`:The [implementation](https://github.com/tensorflow/tensorflow/blob/f24faa153ad31a4b51578f8181d3aaab77a1ddeb/tensorflow/core/kernels/resource_variable_ops.cc#L725-L731) computes the value of a value, `batch_size`, and then divides by it without checking that this value is not 0.PatchesWe have patched the issue in GitHub commit [ac117ee8a8ea57b73d34665cdf00ef3303bc0b11](https://github.com/tensorflow/tensorflow/commit/ac117ee8a8ea57b73d34665cdf00ef3303bc0b11).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by members of the Aivul Team from Qihoo 360.
|
[] | 6.8 | 5.5 | null | null | null |
GHSA-vq6x-f7vr-4w29
|
An OS command injection vulnerability exists in the httpd txt/restore.cgi functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network request can lead to arbitrary command execution. An attacker can send an HTTP request to trigger this vulnerability.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-40985
|
Several stack-based buffer overflow vulnerabilities exist in the DetranCLI command parsing functionality of Siretta QUARTZ-GOLD G5.0.1.5-210720-141020. A specially-crafted network packet can lead to arbitrary command execution. An attacker can send a sequence of requests to trigger these vulnerabilities.This buffer overflow is in the function that manages the '(ddns1|ddns2) hostname WORD' command template.
|
[
"cpe:2.3:o:siretta:quartz-gold_firmware:g5.0.1.5-210720-141020:*:*:*:*:*:*:*",
"cpe:2.3:h:siretta:quartz-gold:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | null | null |
|
CVE-2005-1040
|
Multiple unknown vulnerabilities in netapplet in Novell Linux Desktop 9 allow local users to gain root privileges, related to "User input [being] passed to network scripts without verification."
|
[
"cpe:2.3:o:novell:linux_desktop:9:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2010-3366
|
Mn_Fit 5.13 places a zero-length directory name in the LD_LIBRARY_PATH, which allows local users to gain privileges via a Trojan horse shared library in the current working directory.
|
[
"cpe:2.3:a:zeus.physik.uni-bonn:mn_fit:5.13:*:*:*:*:*:*:*"
] | null | null | null | 6.9 | null |
|
CVE-2025-53417
|
File Parsing Deserialization of Untrusted Data in DTM Soft
|
DIAView (v4.2.0 and prior) - Directory Traversal Information Disclosure Vulnerability
|
[] | 9.3 | null | null | null | null |
GHSA-r95c-3gx6-f23p
|
IBM Spectrum Protect Plus 10.1.0.0 through 10.1.8.x is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks. IBM X-Force ID: 214616.
|
[] | null | null | null | null | null |
|
GHSA-rmwv-r5xx-8jvp
|
Book Store Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability in /bsms_ci/index.php/history. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the history parameter.
|
[] | null | 6.1 | null | null | null |
|
GHSA-5r46-q4x7-6fx6
|
A flaw was found in Undertow. For an AJP 400 response, EAP 7 is improperly sending two response packets, and those packets have the reuse flag set even though JBoss EAP closes the connection. A failure occurs when the connection is reused after a 400 by CPING since it reads in the second SEND_HEADERS response packet instead of a CPONG.
|
[] | null | 7.5 | null | null | null |
|
PYSEC-2017-22
| null |
An exploitable vulnerability exists in the YAML loading functionality of util.py in OwlMixin before 2.0.0a12. A "Load YAML" string or file (aka load_yaml or load_yamlf) can execute arbitrary Python commands resulting in command execution because load is used where safe_load should have been used. An attacker can insert Python into loaded YAML to trigger this vulnerability.
|
[] | null | null | null | null | null |
GHSA-64r4-wv53-jp79
|
XSS exists in the Tribulant Slideshow Gallery plugin 1.6.8 for WordPress via the wp-admin/admin.php?page=slideshow-slides&method=save Slide[title], Slide[media_file], or Slide[image_url] parameter.
|
[] | null | null | 6.1 | null | null |
|
GHSA-h74j-999g-2xqf
|
HCL AppScan Standard is vulnerable to XML External Entity Injection (XXE) attack when processing XML data
|
[] | null | null | null | null | null |
|
CVE-2009-1258
|
SQL injection vulnerability in the RD-Autos (com_rdautos) component 1.5.7 for Joomla! allows remote attackers to execute arbitrary SQL commands via the makeid parameter in index.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:rd-media:com_rdautos:1.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8j32-qr7c-vxv8
|
A vulnerability was found in code-projects Online Appointment Booking System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cover.php. The manipulation of the argument uname/psw leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5 | 7.3 | null | null | null |
|
CVE-2015-4474
|
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-ch3r-fwq3-pp8f
|
Adobe Experience Manager versions 6.5, 6.4, 6.3 and 6.2 have a xml external entity injection vulnerability. Successful exploitation could lead to sensitive information disclosure.
|
[] | null | 7.5 | null | null | null |
|
CVE-2009-1034
|
SQL injection vulnerability in the Tasklist module 5.x-1.x before 5.x-1.3 and 5.x-2.x before 5.x-2.0-alpha1, a module for Drupal, allows remote attackers to execute arbitrary SQL commands via values in the URI.
|
[
"cpe:2.3:a:drupal:tasklist:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-9p46-p224-qhfw
|
A vulnerability classified as critical has been found in SourceCodester Online Tours & Travels Management 1.0. This affects an unknown part of the file sms_setting.php. The manipulation of the argument uname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-270279.
|
[] | 5.3 | 6.3 | null | null | null |
|
ICSMA-21-215-01
|
Swisslog Healthcare Translogic PTS
|
User and root accounts have hardcoded passwords that can be accessed remotely on the Nexus Control Panel. These accounts are enabled by default and cannot be turned off by native configuration of the system.CVE-2021-37163 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A user logged in using the default credentials can gain root access to the device, which allows permissions for all the functionalities of the device.CVE-2021-37167 has been assigned to this vulnerability. A CVSS v3 base score of 8.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). A buffer overflow allows an attacker to overwrite an internal queue data structure, which could allow remote code execution.CVE-2021-37161 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A buffer overflow allows an attacker to overwrite an internal queue data structure, which could allow remote code execution.CVE-2021-37162 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). A specially crafted message to the HMI may cause an overflow, which could allow remote code execution.CVE-2021-37165 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). Received data can be copied to a stack buffer, resulting in an overflow.CVE-2021-37164 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The method used to bind a local service to ports on device interfaces may allow the connection to be hijacked by an external attacker.CVE-2021-37166 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). There is no file validation during an upload for an update.CVE-2021-37160 has been assigned to this vulnerability. A CVSS v3 base score of 7.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
|
[] | null | null | 7.5 | null | null |
CVE-2015-9148
|
In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, SD 400, SD 425, SD 430, SD 450, SD 600, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, SD 850, and SDX20, in the Diag User-PD command registration function, a length variable used during buffer allocation is not checked, so if it is very large, an integer overflow followed by a buffer overflow occurs.
|
[
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-8r26-8h2g-fgjj
|
SQL Injection vulnerability found in Fighting Cock Information System v.1.0 allows a remote attacker to obtain sensitive information via the edit_breed.php parameter.
|
[] | null | 7.5 | null | null | null |
|
CVE-2025-23747
|
WordPress Awesome Timeline plugin <= 1.0.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nitesh Singh Awesome Timeline allows Stored XSS. This issue affects Awesome Timeline: from n/a through 1.0.1.
|
[] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.