id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
GHSA-9vxp-27jj-ffpm
Cross-site scripting (XSS) vulnerability in forum.php in PhpWebThings 1.4.4 allows remote attackers to inject arbitrary web script or HTML via the forum parameter.
[]
null
null
null
null
CVE-2024-30964
Insecure Permissions vulnerability in Open Robotics Robotic Operating System 2 (ROS2) navigation2- ROS2-humble and navigation 2-humble allows a local attacker to execute arbitrary code via the initial_pose_sub thread created by nav2_bt_navigator
[ "cpe:2.3:o:open_robotics:ros2_navigation2:*:*:*:*:*:*:*:*", "cpe:2.3:o:open_robotics:ros2_humble:*:*:*:*:*:*:*:*", "cpe:2.3:o:open_robotics:nav2_humble:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2022-48687
ipv6: sr: fix out-of-bounds read when setting HMAC data.
In the Linux kernel, the following vulnerability has been resolved: ipv6: sr: fix out-of-bounds read when setting HMAC data. The SRv6 layer allows defining HMAC data that can later be used to sign IPv6 Segment Routing Headers. This configuration is realised via netlink through four attributes: SEG6_ATTR_HMACKEYID, SEG6_ATTR_SECRET, SEG6_ATTR_SECRETLEN and SEG6_ATTR_ALGID. Because the SECRETLEN attribute is decoupled from the actual length of the SECRET attribute, it is possible to provide invalid combinations (e.g., secret = "", secretlen = 64). This case is not checked in the code and with an appropriately crafted netlink message, an out-of-bounds read of up to 64 bytes (max secret length) can occur past the skb end pointer and into skb_shared_info: Breakpoint 1, seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208 208 memcpy(hinfo->secret, secret, slen); (gdb) bt #0 seg6_genl_sethmac (skb=<optimized out>, info=<optimized out>) at net/ipv6/seg6.c:208 #1 0xffffffff81e012e9 in genl_family_rcv_msg_doit (skb=skb@entry=0xffff88800b1f9f00, nlh=nlh@entry=0xffff88800b1b7600, extack=extack@entry=0xffffc90000ba7af0, ops=ops@entry=0xffffc90000ba7a80, hdrlen=4, net=0xffffffff84237580 <init_net>, family=<optimized out>, family=<optimized out>) at net/netlink/genetlink.c:731 #2 0xffffffff81e01435 in genl_family_rcv_msg (extack=0xffffc90000ba7af0, nlh=0xffff88800b1b7600, skb=0xffff88800b1f9f00, family=0xffffffff82fef6c0 <seg6_genl_family>) at net/netlink/genetlink.c:775 #3 genl_rcv_msg (skb=0xffff88800b1f9f00, nlh=0xffff88800b1b7600, extack=0xffffc90000ba7af0) at net/netlink/genetlink.c:792 #4 0xffffffff81dfffc3 in netlink_rcv_skb (skb=skb@entry=0xffff88800b1f9f00, cb=cb@entry=0xffffffff81e01350 <genl_rcv_msg>) at net/netlink/af_netlink.c:2501 #5 0xffffffff81e00919 in genl_rcv (skb=0xffff88800b1f9f00) at net/netlink/genetlink.c:803 #6 0xffffffff81dff6ae in netlink_unicast_kernel (ssk=0xffff888010eec800, skb=0xffff88800b1f9f00, sk=0xffff888004aed000) at net/netlink/af_netlink.c:1319 #7 netlink_unicast (ssk=ssk@entry=0xffff888010eec800, skb=skb@entry=0xffff88800b1f9f00, portid=portid@entry=0, nonblock=<optimized out>) at net/netlink/af_netlink.c:1345 #8 0xffffffff81dff9a4 in netlink_sendmsg (sock=<optimized out>, msg=0xffffc90000ba7e48, len=<optimized out>) at net/netlink/af_netlink.c:1921 ... (gdb) p/x ((struct sk_buff *)0xffff88800b1f9f00)->head + ((struct sk_buff *)0xffff88800b1f9f00)->end $1 = 0xffff88800b1b76c0 (gdb) p/x secret $2 = 0xffff88800b1b76c0 (gdb) p slen $3 = 64 '@' The OOB data can then be read back from userspace by dumping HMAC state. This commit fixes this by ensuring SECRETLEN cannot exceed the actual length of SECRET.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2020-16943
Dynamics 365 Commerce Elevation of Privilege Vulnerability
<p>An elevation of privilege vulnerability exists in Microsoft Dynamics 365 Commerce. An unauthenticated attacker who successfully exploited this vulnerability could update data without proper authorization.</p> <p>To exploit the vulnerability, an attacker would need to send a specially crafted request to an affected server.</p> <p>The security update addresses the vulnerability by correcting how Microsoft Dynamics 365 Commerce performs authorization checks.</p>
[ "cpe:2.3:a:microsoft:dynamics_365:-:*:*:*:commerce:*:*:*" ]
null
6.5
null
null
CVE-2024-50158
RDMA/bnxt_re: Fix out of bound check
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix out of bound check Driver exports pacing stats only on GenP5 and P7 adapters. But while parsing the pacing stats, driver has a check for "rdev->dbr_pacing". This caused a trace when KASAN is enabled. BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re] Write of size 8 at addr ffff8885942a6340 by task modprobe/4809
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2016-3000
The help service in IBM Connections 4.x through 4.5 CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to cause a denial of service (service degradation) via a crafted URL.
[ "cpe:2.3:a:ibm:connections:4.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:4.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:5.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:connections:5.5.0.0:*:*:*:*:*:*:*" ]
null
null
4.3
4
CVE-2008-2524
BlogPHP 2.0 allows remote attackers to bypass authentication, and post (1) messages or (2) comments as an arbitrary user, via a modified blogphp_username field in a cookie.
[ "cpe:2.3:a:blogphp:blogphp:2.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2011-1798
rendering/svg/RenderSVGText.cpp in WebCore in WebKit in Google Chrome before 11.0.696.65 does not properly perform a cast of an unspecified variable during an attempt to handle a block child, which allows remote attackers to cause a denial of service (application crash) or possibly have unknown other impact via a crafted text element in an SVG document.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-0491
Fanli2012 native-php-cms cat_dodel.php sql injection
A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
GHSA-7xx3-m584-x994
A poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack
Keepalive thread overload/DoSImpactA poorly-behaved client could use keepalive requests to monopolize Puma's reactor and create a denial of service attack.If more keepalive connections to Puma are opened than there are threads available, additional connections will wait permanently if the attacker sends requests frequently enough.PatchesThis vulnerability is patched in Puma 4.3.1 and 3.12.2.WorkaroundsReverse proxies in front of Puma could be configured to always allow less than X keepalive connections to a Puma cluster or process, where X is the number of threads configured in Puma's thread pool.For more informationIf you have any questions or comments about this advisory:Open an issue at [puma](github.com/puma/puma).
[]
null
5.3
null
null
CVE-2008-3936
The web interface in Dreambox DM500C allows remote attackers to cause a denial of service (application hang) via a long URI.
[ "cpe:2.3:h:dreambox:dm500c:*:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2019-12807
Alzip 10.83 and earlier version contains a stack-based buffer overflow vulnerability, caused by improper bounds checking during the parsing of crafted ISO archive file format. By persuading a victim to open a specially-crafted ISO archive file, an attacker could execution arbitrary code.
[ "cpe:2.3:a:estsoft:alzip:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
7.8
null
6.8
GHSA-w945-7mfq-g3p5
In Android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, there is a possible double free/use after free in the SPS driver when debugfs logging is used.
[]
null
null
7.8
null
CVE-2008-1934
SQL injection vulnerability in commentaires.php in Crazy Goomba 1.2.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:crazy_goomba:crazy_goomba:1.2.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2023-0883
SourceCodester Online Pizza Ordering System index.php sql injection
A vulnerability has been found in SourceCodester Online Pizza Ordering System 1.0 and classified as critical. This vulnerability affects unknown code of the file /php-opos/index.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-221350 is the identifier assigned to this vulnerability.
[ "cpe:2.3:a:online_pizza_ordering_system_project:online_pizza_ordering_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
CVE-2024-10019
Path Traversal and OS Command Injection in parisneo/lollms-webui
A vulnerability in the `start_app_server` function of parisneo/lollms-webui V12 (Strawberry) allows for path traversal and OS command injection. The function does not properly sanitize the `app_name` parameter, enabling an attacker to upload a malicious `server.py` file and execute arbitrary code by exploiting the path traversal vulnerability.
[]
null
null
6.3
null
GHSA-4xg2-vjm8-8r9m
A CWE-1390 "Weak Authentication" in the PIN authentication mechanism in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to brute-force user PINs via multiple crafted HTTP requests.
[]
null
8.1
null
null
GHSA-67pv-pw2w-f788
Buffer overflow in format descriptor parsing in the uvc_parse_format function in drivers/media/video/uvc/uvc_driver.c in uvcvideo in the video4linux (V4L) implementation in the Linux kernel before 2.6.26.1 has unknown impact and attack vectors.
[]
null
null
null
null
CVE-2000-1238
BEA Systems WebLogic Express and WebLogic Server 5.1 SP1-SP6 allows remote attackers to bypass access controls for restricted JSP or servlet pages via a URL with multiple / (forward slash) characters before the restricted pages.
[ "cpe:2.3:a:bea:weblogic_server:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:*:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp1:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp1:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp2:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp2:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp3:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp3:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp4:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp4:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp5:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp5:express:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp6:*:*:*:*:*:*", "cpe:2.3:a:bea:weblogic_server:5.1:sp6:express:*:*:*:*:*" ]
null
null
null
7.5
CVE-2006-0963
Multiple buffer overflows in STLport 5.0.2 might allow local users to execute arbitrary code via (1) long locale environment variables to a strcpy function call in c_locale_glibc2.c and (2) long arguments to unspecified functions in num_put_float.cpp.
[ "cpe:2.3:a:stlport_project:stlport:5.0.2:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-p7jh-2rjx-qwfr
Incorrect default permissions in the software installer for Intel(R) Unite(R) Client software for Windows before version 4.2.34870 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
null
6.7
null
null
GHSA-5fp2-p67m-grx9
Remote Manager in Open Enterprise Server (OES) allows unauthenticated remote attackers to read any arbitrary file, via a specially crafted URL, that allows complete directory traversal and total information disclosure. This vulnerability is present on all versions of OES for linux, it applies to OES2015 SP1 before Maintenance Update 11080, OES2015 before Maintenance Update 11079, OES11 SP3 before Maintenance Update 11078, OES11 SP2 before Maintenance Update 11077).
[]
null
null
7.5
null
CVE-2024-28183
Anti Rollback bypass with physical access and TOCTOU attack
ESP-IDF is the development framework for Espressif SoCs supported on Windows, Linux and macOS. A Time-of-Check to Time-of-Use (TOCTOU) vulnerability was discovered in the implementation of the ESP-IDF bootloader which could allow an attacker with physical access to flash of the device to bypass anti-rollback protection. Anti-rollback prevents rollback to application with security version lower than one programmed in eFuse of chip. This attack can allow to boot past (passive) application partition having lower security version of the same device even in the presence of the flash encryption scheme. The attack requires carefully modifying the flash contents after the anti-rollback checks have been performed by the bootloader (before loading the application). The vulnerability is fixed in 4.4.7 and 5.2.1.
[]
null
6.1
null
null
GHSA-xg85-3q5w-8wff
The Advanced File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 5.2.4 via the 'fma_local_file_system' function. This makes it possible for unauthenticated attackers to extract sensitive data including backups or other sensitive information if the files have been moved to the built-in Trash folder.
[]
null
7.5
null
null
CVE-2023-39202
Untrusted search path in Zoom Rooms Client for Windows and Zoom VDI Client may allow a privileged user to conduct a denial of service via local access.
[ "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*", "cpe:2.3:a:zoom:virtual_desktop_infrastructure:*:*:*:*:*:*:*:*" ]
null
3.1
null
null
CVE-2006-1117
nCipher firmware before V10, as used by (1) nShield, (2) nForce, (3) netHSM, (4) payShield, (5) SecureDB, (6) DSE200 Document Sealing Engine, (7) Time Source Master Clock (TSMC), and possibly other products, contains certain options that were only intended for testing and not production, which might allow remote attackers to obtain information about encryption keys and crack those keys with less effort than brute force.
[ "cpe:2.3:a:ncipher:dse200_document_sealing_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:ncipher:ncore:*:*:*:*:*:*:*:*", "cpe:2.3:a:ncipher:nforce:*:*:*:*:*:*:*:*", "cpe:2.3:a:ncipher:securedb:*:*:*:*:*:*:*:*", "cpe:2.3:a:ncipher:time_source_master_clock:*:*:*:*:*:*:*:*", "cpe:2.3:h:ncipher:nethsm:2.0:*:*:*:*:*:*:*", "cpe:2.3:h:ncipher:nethsm:2.1:*:*:*:*:*:*:*", "cpe:2.3:h:ncipher:nethsm:2.1.12_cam5:*:*:*:*:*:*:*", "cpe:2.3:h:ncipher:nshield:*:*:*:*:*:*:*:*", "cpe:2.3:h:ncipher:payshield:*:*:*:*:*:*:*:*" ]
null
null
null
2.6
GHSA-5cw3-4xq7-74f8
IBM WebSphere Portal 7.0, 8.0, 8.5, and 9.0 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 136005.
[]
null
null
6.1
null
CVE-2002-2258
Moby NetSuite allows remote attackers to cause a denial of service (crash) via an HTTP POST request with a (1) large integer or (2) non-numeric value in the Content-Length header, which causes an access violation after a failed atoi function call.
[ "cpe:2.3:a:mobydisk:netsuite:*:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-16073
noderequest was a malicious module published with the intent to hijack environment variables. It has been unpublished by npm.
[ "cpe:2.3:a:noderequest_project:noderequest:*:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
GHSA-29gg-8679-22q3
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Availability Suite Service). Supported versions that are affected are 10 and 11.3. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Solaris executes to compromise Solaris. Successful attacks of this vulnerability can result in takeover of Solaris. CVSS 3.0 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).
[]
null
null
7.8
null
CVE-2006-2848
links.asp in aspWebLinks 2.0 allows remote attackers to change the administrative password, possibly via a direct request with a modified txtAdministrativePassword field.
[ "cpe:2.3:a:full_revolution:aspweblinks:2.0:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-17516
scripts/inspect_webbrowser.py in Reddit Terminal Viewer (RTV) 1.19.0 does not validate strings before launching the program specified by the BROWSER environment variable, which might allow remote attackers to conduct argument-injection attacks via a crafted URL.
[ "cpe:2.3:a:reddit_terminal_viewer_project:reddit_terminal_viewer:1.19.0:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-p9v4-5fvf-9qmw
H2O version 2.2.2 and earlier allows remote attackers to cause a denial of service in the server via specially crafted HTTP/1 header.
[]
null
7.5
null
null
GHSA-rrhg-rvvx-6575
In affected versions of Octopus Deploy it is possible to unmask sensitive variables by using variable preview.
[]
null
5.3
null
null
GHSA-rh5f-2w6r-q7vj
Podman Path Traversal Vulnerability leads to arbitrary file read/write
A path traversal vulnerability has been discovered in podman before version 1.4.0 in the way it handles symlinks inside containers. An attacker who has compromised an existing container can cause arbitrary files on the host filesystem to be read/written when an administrator tries to copy a file from/to the container.
[]
null
7.2
null
null
CVE-2022-0518
Heap-based Buffer Overflow in radareorg/radare2
Heap-based Buffer Overflow in GitHub repository radareorg/radare2 prior to 5.6.2.
[ "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*" ]
null
null
6.3
null
GHSA-5h35-qf38-2835
OvalEdge 5.2.8.0 and earlier is affected by an Account Takeover vulnerability via a POST request to /profile/updateProfile via the userId and email parameters. Authentication is required.
[]
null
9.8
null
null
CVE-2006-4350
SQL injection vulnerability in index.php in OneOrZero 1.6.4.1 allows remote attackers to execute arbitrary SQL commands via the id parameter.
[ "cpe:2.3:a:oneorzero:oneorzero:1.6.4.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-qcmf-37hx-74m3
The User Feedback – Create Interactive Feedback Form, User Surveys, and Polls in Seconds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the name parameter in all versions up to, and including, 1.0.15 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in feedback form responses that will execute whenever a high-privileged user tries to view them.
[]
null
7.2
null
null
CVE-2023-2346
SourceCodester Service Provider Management System view_inquiry.php sql injection
A vulnerability was found in SourceCodester Service Provider Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/inquiries/view_inquiry.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-227589 was assigned to this vulnerability.
[ "cpe:2.3:a:oretnom23:service_provider_management_system:1.0:*:*:*:*:*:*:*" ]
null
6.3
6.3
6.5
GHSA-p5xw-cvrw-p372
In the Linux kernel, the following vulnerability has been resolved:netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 versionArturo reported this backtrace:[709732.358791] WARNING: CPU: 3 PID: 456 at arch/x86/kernel/fpu/core.c:128 kernel_fpu_begin_mask+0xae/0xe0 [709732.358793] Modules linked in: binfmt_misc nft_nat nft_chain_nat nf_nat nft_counter nft_ct nf_tables nf_conntrack_netlink nfnetlink 8021q garp stp mrp llc vrf intel_rapl_msr intel_rapl_common skx_edac nfit libnvdimm ipmi_ssif x86_pkg_temp_thermal intel_powerclamp coretemp crc32_pclmul mgag200 ghash_clmulni_intel drm_kms_helper cec aesni_intel drm libaes crypto_simd cryptd glue_helper mei_me dell_smbios iTCO_wdt evdev intel_pmc_bxt iTCO_vendor_support dcdbas pcspkr rapl dell_wmi_descriptor wmi_bmof sg i2c_algo_bit watchdog mei acpi_ipmi ipmi_si button nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 ipmi_devintf ipmi_msghandler ip_tables x_tables autofs4 ext4 crc16 mbcache jbd2 dm_mod raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor sd_mod t10_pi crc_t10dif crct10dif_generic raid6_pq libcrc32c crc32c_generic raid1 raid0 multipath linear md_mod ahci libahci tg3 libata xhci_pci libphy xhci_hcd ptp usbcore crct10dif_pclmul crct10dif_common bnxt_en crc32c_intel scsi_mod [709732.358941] pps_core i2c_i801 lpc_ich i2c_smbus wmi usb_common [709732.358957] CPU: 3 PID: 456 Comm: jbd2/dm-0-8 Not tainted 5.10.0-0.bpo.5-amd64 #1 Debian 5.10.24-1~bpo10+1 [709732.358959] Hardware name: Dell Inc. PowerEdge R440/04JN2K, BIOS 2.9.3 09/23/2020 [709732.358964] RIP: 0010:kernel_fpu_begin_mask+0xae/0xe0 [709732.358969] Code: ae 54 24 04 83 e3 01 75 38 48 8b 44 24 08 65 48 33 04 25 28 00 00 00 75 33 48 83 c4 10 5b c3 65 8a 05 5e 21 5e 76 84 c0 74 92 <0f> 0b eb 8e f0 80 4f 01 40 48 81 c7 00 14 00 00 e8 dd fb ff ff eb [709732.358972] RSP: 0018:ffffbb9700304740 EFLAGS: 00010202 [709732.358976] RAX: 0000000000000001 RBX: 0000000000000003 RCX: 0000000000000001 [709732.358979] RDX: ffffbb9700304970 RSI: ffff922fe1952e00 RDI: 0000000000000003 [709732.358981] RBP: ffffbb9700304970 R08: ffff922fc868a600 R09: ffff922fc711e462 [709732.358984] R10: 000000000000005f R11: ffff922ff0b27180 R12: ffffbb9700304960 [709732.358987] R13: ffffbb9700304b08 R14: ffff922fc664b6c8 R15: ffff922fc664b660 [709732.358990] FS: 0000000000000000(0000) GS:ffff92371fec0000(0000) knlGS:0000000000000000 [709732.358993] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [709732.358996] CR2: 0000557a6655bdd0 CR3: 000000026020a001 CR4: 00000000007706e0 [709732.358999] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [709732.359001] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [709732.359003] PKRU: 55555554 [709732.359005] Call Trace: [709732.359009] <IRQ> [709732.359035] nft_pipapo_avx2_lookup+0x4c/0x1cba [nf_tables] [709732.359046] ? sched_clock+0x5/0x10 [709732.359054] ? sched_clock_cpu+0xc/0xb0 [709732.359061] ? record_times+0x16/0x80 [709732.359068] ? plist_add+0xc1/0x100 [709732.359073] ? psi_group_change+0x47/0x230 [709732.359079] ? skb_clone+0x4d/0xb0 [709732.359085] ? enqueue_task_rt+0x22b/0x310 [709732.359098] ? bnxt_start_xmit+0x1e8/0xaf0 [bnxt_en] [709732.359102] ? packet_rcv+0x40/0x4a0 [709732.359121] nft_lookup_eval+0x59/0x160 [nf_tables] [709732.359133] nft_do_chain+0x350/0x500 [nf_tables] [709732.359152] ? nft_lookup_eval+0x59/0x160 [nf_tables] [709732.359163] ? nft_do_chain+0x364/0x500 [nf_tables] [709732.359172] ? fib4_rule_action+0x6d/0x80 [709732.359178] ? fib_rules_lookup+0x107/0x250 [709732.359184] nft_nat_do_chain+0x8a/0xf2 [nft_chain_nat] [709732.359193] nf_nat_inet_fn+0xea/0x210 [nf_nat] [709732.359202] nf_nat_ipv4_out+0x14/0xa0 [nf_nat] [709732.359207] nf_hook_slow+0x44/0xc0 [709732.359214] ip_output+0xd2/0x100 [709732.359221] ? __ip_finish_output+0x210/0x210 [709732.359226] ip_forward+0x37d/0x4a0 [709732.359232] ? ip4_key_hashfn+0xb0/0xb0 [709732.359238] ip_subli ---truncated---
[]
null
5.5
null
null
GHSA-9253-932v-rphr
Stack-based buffer overflow in the Community Services Multiplexer (aka MUX or StMux.exe) in IBM Lotus Sametime 7.5.1 CF1 and earlier, and 8.x before 8.0.1, allows remote attackers to execute arbitrary code via a crafted URL.
[]
null
null
null
null
CVE-2014-7461
The A King Sperm by Dr. Seema Rao (aka com.wKingSperm) application 0.63.13384.23020 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:teknopoint:a_king_sperm_by_dr._seema_rao:0.63.13384.23020:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-mw5w-cf76-73m8
Magento 2 Community Edition RCE Vulnerability
A remote code execution vulnerability exists in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2. An authenticated user with admin privileges to layouts can execute arbitrary code through a crafted XML layout update.
[]
null
null
7.2
null
GHSA-7fv7-4v93-qhhq
Windows Standards-Based Storage Management Service Denial of Service Vulnerability
[]
null
6.5
null
null
GHSA-589x-gjwx-qhhc
An issue was discovered in Adobe Acrobat and Reader: 2017.012.20098 and earlier versions, 2017.011.30066 and earlier versions, 2015.006.30355 and earlier versions, and 11.0.22 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is in the part of the JavaScript engine that handles annotation abstraction. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
[]
null
null
8.8
null
GHSA-qmpj-6g27-gqf7
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.
[]
null
null
null
null
RHSA-2023:1584
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: stack overflow in do_proc_dointvec and proc_skip_spaces ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF kernel: FUSE filesystem low-privileged user privileges escalation
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7
null
null
CVE-2023-49247
Permission verification vulnerability in distributed scenarios. Successful exploitation of this vulnerability may affect service confidentiality.
[ "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-f63w-32jx-r3r8
Multiple cross-site scripting (XSS) vulnerabilities in WordPress before 3.0.5 allow remote authenticated users to inject arbitrary web script or HTML via vectors related to (1) the Quick/Bulk Edit title (aka post title or post_title), (2) post_status, (3) comment_status, (4) ping_status, and (5) escaping of tags within the tags meta box.
[]
null
null
null
null
GHSA-6fg4-36v7-xv32
Stored Cross-site Scripting vulnerability in Jenkins Dashboard View Plugin
Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views.Dashboard View Plugin 2.18.1 performs URL validation for the Iframe Portlet’s Iframe source URL. Additionally, Dashboard View Plugin 2.18.1 sets the sandbox attribute for the iframe to restrict the included page.In case of problems, the [Java system property](https://www.jenkins.io/doc/book/managing/system-properties/) `hudson.plugins.view.dashboard.core.IframePortlet.sandboxAttributeValue` can be used to customize the sandbox attribute value. The Java system property `hudson.plugins.view.dashboard.core.IframePortlet.doNotUseSandbox` can be used to disable the sandbox completely.
[]
null
5.4
null
null
CVE-2023-36641
A numeric truncation error in Fortinet FortiProxy version 7.2.0 through 7.2.4, FortiProxy version 7.0.0 through 7.0.10, FortiProxy 2.0 all versions, FortiProxy 1.2 all versions, FortiProxy 1.1, all versions, FortiProxy 1.0 all versions, FortiOS version 7.4.0, FortiOS version 7.2.0 through 7.2.5, FortiOS version 7.0.0 through 7.0.12, FortiOS 6.4 all versions, FortiOS 6.2 all versions, FortiOS 6.0 all versions allows attacker to denial of service via specifically crafted HTTP requests.
[ "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
CVE-2020-3379
Cisco SD-WAN Solution Software Privilege Escalation Vulnerability
A vulnerability in Cisco SD-WAN Solution Software could allow an authenticated, local attacker to elevate privileges to Administrator on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to an affected system. A successful exploit could allow the attacker to gain administrative privileges.
[ "cpe:2.3:o:cisco:sd-wan_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_1000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100b:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100m:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_100wm:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_2000:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:vedge_5000:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:vbond_orchestrator:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:vsmart_controller:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
GHSA-5579-vjr8-c2mq
Web Wiz Guestbook 6.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download the database and obtain sensitive information via a direct request for database/WWGguestbook.mdb. NOTE: it was later reported that 8.21 is also affected.
[]
null
null
null
null
GHSA-jc84-3g44-wf2q
Denial of Service in ecstatic
ecstatic have a denial of service vulnerability. Successful exploitation could lead to crash of an application.
[]
null
null
null
null
RHSA-2020:1396
Red Hat Security Advisory: OpenShift Container Platform 4.3.12 podman security update
proglottis/gpgme: Use-after-free in GPGME bindings during container image pull buildah: Crafted input tar file may lead to local file overwrite during image build process
[ "cpe:/a:redhat:openshift:4.3::el8" ]
null
8.8
null
null
CVE-2024-0191
RRJ Nueva Ecija Engineer Online Portal file information disclosure
A vulnerability was found in RRJ Nueva Ecija Engineer Online Portal 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/uploads/. The manipulation leads to file and directory information exposure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-249504.
[ "cpe:2.3:a:nia:rrj_nueva_ecija_engineer_online_portal:1.0:*:*:*:*:*:*:*" ]
null
5.3
5.3
5
CVE-2021-25323
The default setting of MISP 2.4.136 did not enable the requirements (aka require_password_confirmation) to provide the previous password when changing a password.
[ "cpe:2.3:a:misp:misp:2.4.136:*:*:*:*:*:*:*" ]
null
9.1
null
6.4
CVE-2025-30791
WordPress Cart tracking for WooCommerce plugin <= 1.0.16 - SQL Injection Vulnerability
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in wpdever Cart tracking for WooCommerce allows SQL Injection. This issue affects Cart tracking for WooCommerce: from n/a through 1.0.16.
[]
null
7.6
null
null
CVE-2013-7474
Windu CMS 2.2 allows XSS via the name parameter to admin/content/edit or admin/content/add, or the username parameter to admin/users.
[ "cpe:2.3:a:windu:windu_cms:2.2:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
RHSA-2024:2781
Red Hat Security Advisory: OpenShift Container Platform 4.12.57 security update
golang-protobuf: encoding/protojson, internal/encoding/json: infinite loop in protojson.Unmarshal when unmarshaling certain forms of invalid JSON
[ "cpe:/a:redhat:openshift:4.12::el8" ]
null
5.9
null
null
GHSA-33xj-4jh4-g344
A cross-site scripting (XSS) issue in FUDForum 3.1.0 allows remote attackers to inject JavaScript via index.php in the "author" parameter.
[]
null
null
null
null
CVE-2024-5013
WhatsUp Gold InstallController Denial-of-Service Vulnerability
In WhatsUp Gold versions released before 2023.1.3, an unauthenticated Denial of Service vulnerability was identified. An unauthenticated attacker can put the application into the SetAdminPassword installation step, which renders the application non-accessible.
[ "cpe:2.3:a:progress:whatsup_gold:2023.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*" ]
null
7.5
null
null
GHSA-wrhf-j4xw-2f82
The Meteor Slides WordPress plugin through 1.5.6 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins.
[]
null
5.4
null
null
CVE-2014-1528
The sse2_composite_src_x888_8888 function in Pixman, as used in Cairo in Mozilla Firefox 28.0 and SeaMonkey 2.25 on Windows, allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds write and application crash) by painting on a CANVAS element.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:13.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse_project:opensuse:12.3:*:*:*:*:*:*:*", "cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox:28.0:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:seamonkey:2.25:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2016-0466
Unspecified vulnerability in the Java SE, Java SE Embedded, and JRockit components in Oracle Java SE 6u105, 7u91, and 8u66; Java SE Embedded 8u65; and JRockit R28.3.8 allows remote attackers to affect availability via vectors related to JAXP.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.6.0:update105:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.7.0:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update66:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.6.0:update105:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.7.0:update91:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update66:*:*:*:*:*:*" ]
null
null
null
5
CVE-2017-3090
Adobe Digital Editions versions 4.5.4 and earlier contain an insecure library loading vulnerability. The vulnerability is due to unsafe library loading of browser related library extensions in the installer plugin. A successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*" ]
null
null
9.8
10
GHSA-74q4-qj6q-75qm
IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5, 11.1, and 11.5 is vulnerable to denial of service with a specially crafted query on certain tables. IBM X-Force ID: 253357.
[]
null
7.5
null
null
CVE-2021-1596
Cisco Video Surveillance 7000 Series IP Cameras Link Layer Discovery Protocol Memory Leak Vulnerabilities
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).
[ "cpe:2.3:o:cisco:video_surveillance_7530pd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:video_surveillance_7530pd:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:video_surveillance_7070_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:video_surveillance_7070:-:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2021-36721
Sysaid - Sysaid API User Enumeration
Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server.
[ "cpe:2.3:a:sysaid:application_programming_interface:*:*:*:*:*:*:*:*" ]
null
4.4
null
null
RHSA-2022:6551
Red Hat Security Advisory: Red Hat Virtualization security update
kernel: Small table perturb size in the TCP source port generation algorithm can lead to information leak dpdk: DoS when a Vhost header crosses more than two descriptors and exhausts all mbufs systemd-resolved: use-after-free when dealing with DnsStream in resolved-dns-stream.c kernel: a use-after-free in cls_route filter implementation may lead to privilege escalation rsync: remote arbitrary files write inside the directories of connecting peers kernel: a use-after-free write in the netfilter subsystem can lead to privilege escalation to root
[ "cpe:/o:redhat:rhev_hypervisor:4.4::el8" ]
null
7.8
null
null
CVE-2022-27547
HCL iNotes is susceptible to a link to non-existent domain vulnerability.
HCL iNotes is susceptible to a link to non-existent domain vulnerability. An attacker could use this vulnerability to trick a user into supplying sensitive information such as username, password, credit card number, etc.
[ "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_10:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_3:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_4:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_5:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_6:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_7:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_8:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:9.0.1:fixpack_9:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_1:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_2:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_3:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_4:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_5:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_6:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_7:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:10.0.1:fixpack_8:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_1:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_2:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_3:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_4:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:11.0.1:fixpack_5:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:12.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:hcl_inotes:12.0.1:fixpack_1:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_10:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_3:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_4:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_5:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_6:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_7:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_8:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:9.0.1:fixpack_9:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_1:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_2:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_3:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_4:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_5:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_6:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_7:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:10.0.1:fixpack_8:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_1:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_2:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_3:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_4:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:11.0.1:fixpack_5:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:12.0:*:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:12.0.1:-:*:*:*:*:*:*", "cpe:2.3:a:hcltech:domino:12.0.1:fixpack_1:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2021-34840
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14021.
[ "cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
cisco-sa-ucsc-bkpsky-TgJ5f73J
Cisco UCS Central Software Configuration Backup Information Disclosure Vulnerability
A vulnerability in the backup feature of Cisco UCS Central Software could allow an attacker with access to a backup file to learn sensitive information that is stored in the full state and configuration backup files. This vulnerability is due to a weakness in the encryption method that is used for the backup function. An attacker could exploit this vulnerability by accessing a backup file and leveraging a static key that is used for the backup configuration feature. A successful exploit could allow an attacker with access to a backup file to learn sensitive information that is stored in full state backup files and configuration backup files, such as local user credentials, authentication server passwords, Simple Network Management Protocol (SNMP) community names, and the device SSL server certificate and key. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
6.3
null
null
CVE-2024-8211
D-Link DNS-1550-04 hd_config.cgi cgi_FMT_Std2R1_DiskMGR command injection
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been declared as critical. This vulnerability affects the function cgi_FMT_Std2R1_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_newly_dev leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
[ "cpe:2.3:o:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-321_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-323_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-325_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-326_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-345_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-315l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-315l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-320lw_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-320lw:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-1550-04_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-1550-04:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-1200-05_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-1200-05:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-1100-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-1100-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-726-4_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-726-4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-345_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-345:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-343:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-340l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-340l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dnr-326_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dnr-326:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-327l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-327l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-326_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-326:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-325_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-325:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-323_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-323:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dnr-322l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dnr-322l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-321_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-321:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-320l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-320l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-320_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-320:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dnr-202l_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dnr-202l:-:*:*:*:*:*:*:*", "cpe:2.3:o:dlink:dns-120_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dns-120:-:*:*:*:*:*:*:*" ]
5.3
6.3
6.3
6.5
GHSA-8356-ccjq-rwhv
A logic issue was addressed with improved restrictions. This issue is fixed in macOS Monterey 12.6, iOS 15.7 and iPadOS 15.7, iOS 16, macOS Big Sur 11.7. An app may be able to read sensitive location information.
[]
null
5.5
null
null
RHSA-2015:0766
Red Hat Security Advisory: firefox security update
Mozilla: Same-origin bypass through anchor navigation (MFSA 2015-40) Mozilla: CORS requests should not follow 30x redirections after preflight (MFSA 2015-37) Mozilla: Use-after-free when using the Fluendo MP3 GStreamer plugin (MFSA 2015-31) Mozilla: Miscellaneous memory safety hazards (rv:31.6) (MFSA 2015-30) Mozilla: resource: // documents can load privileged pages (MFSA 2015-33)
[ "cpe:/o:redhat:enterprise_linux:5::client", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation", "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
null
null
null
CVE-2024-28943
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability
[]
null
8.8
null
null
GHSA-52j7-8765-3p92
In mtkpower, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Product: Android; Versions: Android-11; Patch ID: ALPS05437558.
[]
null
null
null
null
GHSA-hmf5-7mhf-fpjh
The web interface in CUPS before 1.4.2, as used on Apple Mac OS X before 10.6.2 and other platforms, does not properly handle (1) HTTP headers and (2) HTML templates, which allows remote attackers to conduct cross-site scripting (XSS) attacks and HTTP response splitting attacks via vectors related to (a) the product's web interface, (b) the configuration of the print system, and (c) the titles of printed jobs, as demonstrated by an XSS attack that uses the kerberos parameter to the admin program, and leverages attribute injection and HTTP Parameter Pollution (HPP) issues.
[]
null
null
null
null
CVE-2008-0128
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
[ "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*" ]
null
null
null
5
GHSA-mwpf-hrvf-537f
A vulnerability in Brocade SANnav before v2.3.1 and v2.3.0a prints the encryption key in the console when a privileged user executes the script to replace the Brocade SANnav Management Portal standby node. This could provide attackers an additional, less protected path to acquiring the encryption key.
[]
null
7.5
null
null
RHSA-2024:1747
Red Hat Security Advisory: kernel security update
kernel: net/sched: sch_hfsc UAF
[ "cpe:/o:redhat:rhel_aus:7.6::server" ]
null
7.8
null
null
GHSA-3ggx-f2mm-cg59
The usbnet_generic_cdc_bind function in drivers/net/usb/cdc_ether.c in the Linux kernel through 4.13.11 allows local users to cause a denial of service (divide-by-zero error and system crash) or possibly have unspecified other impact via a crafted USB device.
[]
null
null
6.6
null
GHSA-jx4f-2jgh-g5h9
Cisco Hosted Collaboration Mediation Fulfillment 10.6(3) does not use RBAC, which allows remote authenticated users to obtain sensitive credential information by leveraging admin access and making SOAP API requests, aka Bug ID CSCuw84374.
[]
null
null
null
null
CVE-2018-2605
Vulnerability in the PeopleSoft Enterprise PeopleTools component of Oracle PeopleSoft Products (subcomponent: Integration Broker). Supported versions that are affected are 8.54, 8.55 and 8.56. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise PeopleSoft Enterprise PeopleTools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all PeopleSoft Enterprise PeopleTools accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
[ "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.54:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*" ]
null
null
6.5
4
GHSA-4q94-m8w5-hxm3
Rejected reason: Not used
[]
null
null
null
null
CVE-2009-1356
Stack-based buffer overflow in Elecard AVC HD Player allows remote attackers to execute arbitrary code via a long MP3 filename in a playlist (.xpl) file.
[ "cpe:2.3:a:elecard:elecard_avc_hd_player:*:*:*:*:*:*:*:*" ]
null
null
null
9.3
CVE-2018-20105
yast2-rmt exposes CA private key passhrase in log-file
A Inclusion of Sensitive Information in Log Files vulnerability in yast2-rmt of SUSE Linux Enterprise Server 15; openSUSE Leap allows local attackers to learn the password if they can access the log file. This issue affects: SUSE Linux Enterprise Server 15 yast2-rmt versions prior to 1.2.2. openSUSE Leap yast2-rmt versions prior to 1.2.2.
[ "cpe:2.3:a:yast2-rmt_project:yast2-rmt:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:15:*:*:*:*:*:*:*" ]
null
4
null
null
GHSA-jg48-pfjv-c72h
The Coca-Cola FM Peru (aka com.enyetech.radio.coca_cola.fm_pe) application 2.0.41716 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
GHSA-h374-mm57-879c
Authenticated (user role) SQL injection in `OrderAndPaginate` (GHSL-2023-270)
SummaryThe [`OrderAndPaginate`](https://github.com/0xjacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/model/model.go#L99C4) function is used to order and paginate data. It is defined as follows:By using [`DefaultQuery`](https://github.com/0xjacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/model/model.go#L278-L287), the `"desc"` and `"id"` values are used as default values if the query parameters are not set. Thus, the `order` and `sort_by` query parameter are user-controlled and are being appended to the `order` variable without any sanitization. The same happens with [`SortOrder`](https://github.com/0xjacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/model/model.go#L91), but it doesn't seem to be used anywhere.This issue was found using CodeQL for Go: [Database query built from user-controlled sources](https://codeql.github.com/codeql-query-help/go/go-sql-injection/).Proof of ConceptBased on [this setup](https://github.com/0xJacky/nginx-ui/blob/04bf8ec487f06ab17a9fb7f34a28766e5f53885e/README.md?plain=1#L210) using `uozi/nginx-ui:v2.0.0-beta.7`. In order to exploit this issue, we need to find a place where the `OrderAndPaginate` function is used. We can find it in the `GET /api/dns_credentials` endpoint.The `PagingList` function is defined as follows:And the `PagingListData` function is defined as follows:Using the following request, an attacker can retrieve arbitrary values by checking the order used by the query. That is, the result of the comparison will make the response to be ordered in a specific way.You can notice the order change by changing `=1` to `=2`, and so the comparison will return `false` and the order will be `updated_at` instead of `id`.ImpactThis issue may lead to `Information Disclosure`
[]
null
7
null
null
GHSA-vc99-gqjv-x726
The install wizard in DotNetNuke 4.0 through 5.1.4 does not prevent anonymous users from accessing functionality related to determination of the need for an upgrade, which allows remote attackers to access version information and possibly other sensitive information.
[]
null
null
null
null
RHSA-2019:1543
Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.29 SP2 security update
ROHNP: Key Extraction Side Channel in Multiple Crypto Libraries openssl: Malicious server can send large prime to client during DH(E) TLS handshake causing the client to hang libxml2: NULL pointer dereference in xmlXPathCompOpEval() function in xpath.c curl: Integer overflow leading to heap-based buffer overflow in Curl_sasl_create_plain_message() curl: Use-after-free when closing "easy" handle in Curl_close() curl: Heap-based buffer over-read in the curl tool warning formatting curl: NTLM type-2 heap out-of-bounds buffer read curl: Out-of-bounds read in code handling HTTP/2 trailers curl: HTTP authentication leak in redirects curl: FTP path trickery leads to NIL byte out of bounds write curl: LDAP NULL pointer dereference curl: RTSP RTP buffer over-read httpd: privilege escalation from modules scripts curl: NTLMv2 type-3 header stack buffer overflow curl: SMTP end-of-response out-of-bounds read curl: TFTP receive heap buffer overflow in tftp_receive_packet() function
[ "cpe:/a:redhat:jboss_core_services:1" ]
null
7
4.3
null
CVE-2005-4237
Cross-site scripting (XSS) vulnerability in MySQL Auction 3.0 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified search module parameters, possibly the keyword parameter in the SearchZoom module.
[ "cpe:2.3:a:servers-r-us:mysqlauction:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2023-1726
XSS in Proliz OBS
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Proliz OBS allows Stored XSS for an authenticated user.This issue affects OBS: before 23.04.01.
[ "cpe:2.3:a:prolizyazilim:student_affairs_information_system:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-gv3f-qf88-98jx
Computer Associates eTrust Antivirus EE 6.0 through 7.0 allows remote attackers to bypass virus scanning by including a password-protected file in a ZIP file, which causes eTrust to scan only the password protected file and skip the other files.
[]
null
null
null
null
RHSA-2023:3350
Red Hat Security Advisory: kernel-rt security and bug fix update
kernel: netfilter: use-after-free in nf_tables when processing batch requests can lead to privilege escalation
[ "cpe:/a:redhat:enterprise_linux:8::nfv", "cpe:/a:redhat:enterprise_linux:8::realtime" ]
null
7.8
null
null
GHSA-r8rm-4hfj-2x87
Data Amplification in Play Framework
In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.
[]
null
7.5
null
null
GHSA-3qcf-hphp-2m63
In imgsys, there is a possible information disclosure due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation Patch ID: ALPS08518692; Issue ID: MSV-1012.
[]
null
6.3
null
null
CVE-2007-6018
IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) "purge" deleted emails via a crafted email message.
[ "cpe:2.3:a:horde:framework:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:horde:horde:3.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*" ]
null
null
null
5.8