id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2023-48590
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:cloud_service:*:*:*"
] |
CVE-2021-4311
|
Talend Open Studio for MDM XML xml external entity reference
|
A vulnerability classified as problematic was found in Talend Open Studio for MDM. This vulnerability affects unknown code of the component XML Handler. The manipulation leads to xml external entity reference. The patch is identified as 31d442b9fb1d518128fd18f6e4d54e06c3d67793. It is recommended to apply a patch to fix this issue. VDB-217666 is the identifier assigned to this vulnerability.
|
[
"cpe:2.3:a:talend:open_studio:*:*:*:*:*:mdm:*:*"
] |
GHSA-jhgp-x42x-cx6m
|
The overlayfs implementation in the linux (aka Linux kernel) package before 3.19.0-21.21 in Ubuntu through 15.04 does not properly check permissions for file creation in the upper filesystem directory, which allows local users to obtain root access by leveraging a configuration in which overlayfs is permitted in an arbitrary mount namespace.
|
[] |
|
GHSA-38r9-3j52-h92v
|
aimhubio/aim version 3.22.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the tracking server. The vulnerability is due to overly permissive CORS settings, allowing cross-origin requests from all origins. This enables CSRF attacks on all endpoints of the tracking server, which can be chained with other existing vulnerabilities such as remote code execution, denial of service, and arbitrary file read/write.
|
[] |
|
GHSA-v5fr-mh59-qcqr
|
Cross-Site Request Forgery (CSRF) vulnerability in Repute InfoSystems ARMember, Repute InfoSystems ARMember Premium allows Cross-Site Request Forgery.This issue affects ARMember: from n/a through 4.0.5; ARMember Premium: from n/a before 6.7.1.
|
[] |
|
CVE-2022-40720
|
This vulnerability allows network-adjacent attackers to execute arbitrary commands on affected installations of D-Link DIR-2150 4.0.1 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Dreambox plugin for the xupnpd service, which listens on TCP port 4044 by default. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the router. Was ZDI-CAN-15935.
|
[
"cpe:2.3:o:dlink:dir-2150_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-2150:-:*:*:*:*:*:*:*"
] |
|
GHSA-5vmm-3733-r89q
|
Insurance Management System 1.0 is vulnerable to SQL Injection via /insurance/editPayment.php?recipt_no=.
|
[] |
|
CVE-2021-1832
|
Copied files may not have the expected file permissions. This issue is fixed in Security Update 2021-002 Catalina, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. The issue was addressed with improved permissions logic.
|
[
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2020-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:security_update_2021-001:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-29349
|
Mahara 20.10 is affected by Cross Site Request Forgery (CSRF) that allows a remote attacker to remove inbox-mail on the server. The application fails to validate the CSRF token for a POST request. An attacker can craft a module/multirecipientnotification/inbox.php pieform_delete_all_notifications request, which leads to removing all messages from a mailbox.
|
[
"cpe:2.3:a:mahara:mahara:20.10:*:*:*:*:*:*:*"
] |
|
CVE-2018-1633
|
IBM Informix Dynamic Server Enterprise Edition 12.1 could allow a local user logged in with database administrator user to gain root privileges through a symbolic link vulnerability in onsrvapd. IBM X-Force ID: 144434.
|
[
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc1:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc10:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc11:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc12:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc2:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc3:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc4:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc5:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc6:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc7:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc8:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:informix_dynamic_server:12.10:fc9:*:*:enterprise:*:*:*"
] |
|
CVE-2006-2819
|
PHP remote file inclusion vulnerability in Wiki.php in Barnraiser Igloo 0.1.9 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the c_node[class_path] parameter.
|
[
"cpe:2.3:a:barnraiser:igloo:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-3284
|
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.23 and prior and 8.0.12 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:netapp:active_iq_unified_manager:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-48356
|
The facial recognition module has a vulnerability in input parameter verification. Successful exploitation of this vulnerability may cause failed facial recognition.
|
[
"cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-7849
|
D-Link DNS-1550-04 photocenter_mgr.cgi cgi_create_album buffer overflow
|
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This affects the function cgi_create_album of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument current_path leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
|
[
"cpe:2.3:o:dlink:dnr-202l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-322l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dnr-326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1100-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1200-05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-120_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-1550-04_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-315l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-320lw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-321_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-323_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-327l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-340l_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-343_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-345_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:dlink:dns-726-4_firmware:*:*:*:*:*:*:*:*"
] |
CVE-2019-20709
|
Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, and XR500 before 2.3.2.32.
|
[
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d3600_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d3600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:d6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d6000:-:*:*:*:*:*:*:*"
] |
|
GHSA-97rq-m5jx-vcxq
|
The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen.
|
[] |
|
GHSA-9cf6-x23r-2w69
|
K7Computing Pvt Ltd K7AntiVirus Premium 15.1.0.53 is affected by: Incorrect Access Control. The impact is: gain privileges (local). The component is: K7TSMngr.exe.
|
[] |
|
CVE-2018-10063
|
The Convert Forms extension before 2.0.4 for Joomla! is vulnerable to Remote Command Execution using CSV Injection that is mishandled when exporting a Leads file.
|
[
"cpe:2.3:a:convert_forms_project:convert_forms:*:*:*:*:*:joomla\\!:*:*"
] |
|
GHSA-288f-gh2h-9j8q
|
Mumble: murmur-server has DoS due to malformed client query
|
[] |
|
GHSA-7mqp-63m7-99v3
|
Multiple PHP remote file inclusion vulnerabilities in ClassWeb 2.03 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the BASE parameter to (1) language.php and (2) phpadmin/survey.php.
|
[] |
|
CVE-2008-4425
|
Directory traversal vulnerability in upload.php in Phlatline's Personal Information Manager (pPIM) 1.0 allows remote attackers to delete arbitrary files via directory traversal sequences in the file parameter within a delfile action.
|
[
"cpe:2.3:a:phlatline:personal_information_manager:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-p5g5-f63j-r685
|
A CWE-306 "Missing Authentication for Critical Function" in maxprofile/persistance/routes.lua in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to delete dashboards via crafted HTTP requests.
|
[] |
|
CVE-2020-21127
|
MetInfo 7.0.0 contains a SQL injection vulnerability via admin/?n=logs&c=index&a=dodel.
|
[
"cpe:2.3:a:metinfo:metinfo:7.0.0:-:*:*:*:*:*:*"
] |
|
GHSA-xxvh-8h9p-mpwj
|
Zulip 8.3 is vulnerable to Cross Site Scripting (XSS) via the replace_emoji_with_text function in ui_util.ts.
|
[] |
|
CVE-2004-1435
|
Multiple versions of Cisco ONS 15327, ONS 15454, and ONS 15454 SDH, including 4.6(0) and 4.6(1), 4.5(x), 4.1(0) to 4.1(3), 4.0(0) to 4.0(2), and earlier versions, allows remote attackers to cause a denial of service (control card reset) via a large number of TCP connections with an invalid response instead of the final ACK (TCP-ACK).
|
[
"cpe:2.3:a:cisco:optical_networking_systems_software:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:1.3\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:2.3\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:optical_networking_systems_software:4.6\\(1\\):*:*:*:*:*:*:*"
] |
|
GHSA-9pqq-c77f-g45f
|
Authenticated user can execute arbitrary commands in the context of the root user by providing payload in the "destination" field of the network test tools. This is similar to the vulnerability CVE-2021-28151 mitigated on the user interface level by blacklisting characters with JavaScript, however, it can still be exploited by sending POST requests directly.
|
[] |
|
CVE-2021-25505
|
Improper authentication in Samsung Pass prior to 3.0.02.4 allows to use app without authentication when lockscreen is unlocked.
|
[
"cpe:2.3:a:samsung:samsung_pass:*:*:*:*:*:android:*:*"
] |
|
GHSA-67pv-grw8-c32m
|
SQL injection vulnerability in the tt_news Mail alert (dl3_tt_news_alerts) extension 0.2.0 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
|
[] |
|
CVE-2012-0873
|
Multiple cross-site scripting (XSS) vulnerabilities in Boonex Dolphin before 7.0.8 allow remote attackers to inject arbitrary web script or HTML via the (1) explain parameter to explanation.php or the (2) photos_only, (3) online_only, or (4) mode parameters to viewFriends.php.
|
[
"cpe:2.3:a:boonex:dolphin:*:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:boonex:dolphin:7.0.6:*:*:*:*:*:*:*"
] |
|
GHSA-r6mp-q3jr-f6gv
|
SQL injection vulnerability in the module "Complete for Create a Quote in Frontend + Backend Pro" (askforaquotemodul) <= 1.0.51 from Buy Addons for PrestaShop allows attackers to view sensitive information and cause other impacts via methods `AskforaquotemodulcustomernewquoteModuleFrontController::run()`, `AskforaquotemoduladdproductnewquoteModuleFrontController::run()`, `AskforaquotemodulCouponcodeModuleFrontController::run()`, `AskforaquotemodulgetshippingcostModuleFrontController::run()`, `AskforaquotemodulgetstateModuleFrontController::run().`
|
[] |
|
CVE-2019-12618
|
HashiCorp Nomad 0.9.0 through 0.9.1 has Incorrect Access Control via the exec driver.
|
[
"cpe:2.3:a:hashicorp:nomad:*:*:*:*:*:*:*:*"
] |
|
CVE-2002-1654
|
iPlanet Web Server Enterprise Edition and Netscape Enterprise Server 4.0 and 4.1 allows remote attackers to conduct HTTP Basic Authentication via the wp-force-auth Web Publisher command, which provides a distinct attack vector and may make it easier to conduct brute force password guessing without detection.
|
[
"cpe:2.3:a:iplanet:iplanet_web_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:iplanet:iplanet_web_server:enterprise_4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:iplanet:iplanet_web_server:enterprise_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*"
] |
|
CVE-2012-5790
|
PayPal Payments Standard PHP Library 20120427 does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to misinterpretation of a certain TRUE value.
|
[
"cpe:2.3:a:paypal:payments_standard:20120427:*:*:*:*:*:*:*"
] |
|
GHSA-xhwh-qc34-g7xv
|
Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) 1.3.1 allows remote attackers to execute arbitrary code via a long DeviceType (aka urn) field in a UDP packet.
|
[] |
|
GHSA-4rv2-f267-rh4v
|
The LabTools WordPress plugin through 1.0 does not have proper authorisation and CSRF check in place when deleting publications, allowing any authenticated users, such as subscriber to delete arbitrary publication
|
[] |
|
CVE-2023-52981
|
drm/i915: Fix request ref counting during error capture & debugfs dump
|
In the Linux kernel, the following vulnerability has been resolved:
drm/i915: Fix request ref counting during error capture & debugfs dump
When GuC support was added to error capture, the reference counting
around the request object was broken. Fix it up.
The context based search manages the spinlocking around the search
internally. So it needs to grab the reference count internally as
well. The execlist only request based search relies on external
locking, so it needs an external reference count but within the
spinlock not outside it.
The only other caller of the context based search is the code for
dumping engine state to debugfs. That code wasn't previously getting
an explicit reference at all as it does everything while holding the
execlist specific spinlock. So, that needs updaing as well as that
spinlock doesn't help when using GuC submission. Rather than trying to
conditionally get/put depending on submission model, just change it to
always do the get/put.
v2: Explicitly document adding an extra blank line in some dense code
(Andy Shevchenko). Fix multiple potential null pointer derefs in case
of no request found (some spotted by Tvrtko, but there was more!).
Also fix a leaked request in case of !started and another in
__guc_reset_context now that intel_context_find_active_request is
actually reference counting the returned request.
v3: Add a _get suffix to intel_context_find_active_request now that it
grabs a reference (Daniele).
v4: Split the intel_guc_find_hung_context change to a separate patch
and rename intel_context_find_active_request_get to
intel_context_get_active_request (Tvrtko).
v5: s/locking/reference counting/ in commit message (Tvrtko)
(cherry picked from commit 3700e353781e27f1bc7222f51f2cc36cbeb9b4ec)
|
[] |
CVE-2025-20667
|
In Modem, there is a possible information disclosure due to incorrect error handling. This could lead to remote information disclosure, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01513293; Issue ID: MSV-2741.
|
[] |
|
GHSA-w5f9-f469-qpc7
|
Uncontrolled resource consumption vulnerability in Cybozu Remote Service 4.1.0 to 4.1.1 allows a remote authenticated attacker to consume huge storage space or cause significantly delayed communication.
|
[] |
|
GHSA-fxc3-452x-46r5
|
Integer overflow in the net_tx_pkt_init function in hw/net/net_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (QEMU process crash) via the maximum fragmentation count, which triggers an unchecked multiplication and NULL pointer dereference.
|
[] |
|
CVE-2018-19752
|
DomainMOD through 4.11.01 has XSS via the assets/add/registrar.php notes field for the Registrar.
|
[
"cpe:2.3:a:domainmod:domainmod:*:*:*:*:*:*:*:*"
] |
|
GHSA-7qgr-9v2j-3xr8
|
This issue was addressed with improved checks. This issue is fixed in macOS Monterey 12.4, macOS Big Sur 11.6.6. An attacker may be able to cause unexpected application termination or arbitrary code execution.
|
[] |
|
GHSA-xxfm-q6cq-gcwc
|
Buffer overflow in O'Reilly WebSite Professional web server 2.4 and earlier allows remote attackers to execute arbitrary commands via a long GET request or Referrer header.
|
[] |
|
CVE-2011-4216
|
Investintech.com SlimPDF Reader does not properly restrict write operations, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF document.
|
[
"cpe:2.3:a:investintech:slimpdf_reader:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-45175
|
An issue was discovered in LIVEBOX Collaboration vDesk through v018. An Insecure Direct Object Reference can occur under the 5.6.5-3/doc/{ID-FILE]/c/{N]/{C]/websocket endpoint. A malicious unauthenticated user can access cached files in the OnlyOffice backend of other users by guessing the file ID of a target file.
|
[
"cpe:2.3:a:liveboxcloud:vdesk:*:*:*:*:*:*:*:*"
] |
|
GHSA-jwgg-6gv4-m9cx
|
The getHTTPResponse function in miniwget.c in MiniUPnP 1.9 allows remote attackers to cause a denial of service (crash) via crafted headers that trigger an out-of-bounds read.
|
[] |
|
CVE-2024-26714
|
interconnect: qcom: sc8180x: Mark CO0 BCM keepalive
|
In the Linux kernel, the following vulnerability has been resolved:
interconnect: qcom: sc8180x: Mark CO0 BCM keepalive
The CO0 BCM needs to be up at all times, otherwise some hardware (like
the UFS controller) loses its connection to the rest of the SoC,
resulting in a hang of the platform, accompanied by a spectacular
logspam.
Mark it as keepalive to prevent such cases.
|
[] |
GHSA-chh2-528g-gx39
|
In access_secure_service_from_temp_bond of btm_sec.cc, there is a possible way to achieve keystroke injection due to improper input validation. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
GHSA-qc68-5gff-qw5c
|
The Setup Wizard in Atlassian JIRA Enterprise Edition before 3.12.1 does not properly restrict setup attempts after setup is complete, which allows remote attackers to change the default language.
|
[] |
|
GHSA-q39p-3jrw-5c8j
|
A denial of service vulnerability exists when the Windows TCP/IP stack improperly handles ICMPv6 Router Advertisement packets, aka 'Windows TCP/IP Denial of Service Vulnerability'.
|
[] |
|
CVE-2004-0827
|
Multiple buffer overflows in the ImageMagick graphics library 5.x before 5.4.4, and 6.x before 6.0.6.2, allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via malformed (1) AVI, (2) BMP, or (3) DIB files.
|
[
"cpe:2.3:a:enlightenment:imlib:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib:1.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:enlightenment:imlib2:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.4.8.2.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.3.2.1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.6.0_2003-04-09:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:5.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:imagemagick:imagemagick:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_desktop_system:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java_desktop_system:2003:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:conectiva:linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:advanced_server_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:enterprise_server_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:2.1:*:workstation_ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:fedora_core:core_3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:ia64:*:*:*:*:*",
"cpe:2.3:o:redhat:linux_advanced_workstation:2.1:*:itanium_processor:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.0:*:i386:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:desktop_10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:server_7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:server_8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:workstation_7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:turbolinux:turbolinux:workstation_8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ia64:*:*:*:*:*",
"cpe:2.3:o:ubuntu:ubuntu_linux:4.1:*:ppc:*:*:*:*:*"
] |
|
GHSA-p9vv-hm69-8j9v
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in NotFound Multiple Carousel allows SQL Injection. This issue affects Multiple Carousel: from n/a through 2.0.
|
[] |
|
CVE-2021-47395
|
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
|
In the Linux kernel, the following vulnerability has been resolved:
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
Limit max values for vht mcs and nss in ieee80211_parse_tx_radiotap
routine in order to fix the following warning reported by syzbot:
WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
WARNING: CPU: 0 PID: 10717 at include/net/mac80211.h:989 ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
Modules linked in:
CPU: 0 PID: 10717 Comm: syz-executor.5 Not tainted 5.14.0-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
RIP: 0010:ieee80211_rate_set_vht include/net/mac80211.h:989 [inline]
RIP: 0010:ieee80211_parse_tx_radiotap+0x101e/0x12d0 net/mac80211/tx.c:2244
RSP: 0018:ffffc9000186f3e8 EFLAGS: 00010216
RAX: 0000000000000618 RBX: ffff88804ef76500 RCX: ffffc900143a5000
RDX: 0000000000040000 RSI: ffffffff888f478e RDI: 0000000000000003
RBP: 00000000ffffffff R08: 0000000000000000 R09: 0000000000000100
R10: ffffffff888f46f9 R11: 0000000000000000 R12: 00000000fffffff8
R13: ffff88804ef7653c R14: 0000000000000001 R15: 0000000000000004
FS: 00007fbf5718f700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b2de23000 CR3: 000000006a671000 CR4: 00000000001506f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600
Call Trace:
ieee80211_monitor_select_queue+0xa6/0x250 net/mac80211/iface.c:740
netdev_core_pick_tx+0x169/0x2e0 net/core/dev.c:4089
__dev_queue_xmit+0x6f9/0x3710 net/core/dev.c:4165
__bpf_tx_skb net/core/filter.c:2114 [inline]
__bpf_redirect_no_mac net/core/filter.c:2139 [inline]
__bpf_redirect+0x5ba/0xd20 net/core/filter.c:2162
____bpf_clone_redirect net/core/filter.c:2429 [inline]
bpf_clone_redirect+0x2ae/0x420 net/core/filter.c:2401
bpf_prog_eeb6f53a69e5c6a2+0x59/0x234
bpf_dispatcher_nop_func include/linux/bpf.h:717 [inline]
__bpf_prog_run include/linux/filter.h:624 [inline]
bpf_prog_run include/linux/filter.h:631 [inline]
bpf_test_run+0x381/0xa30 net/bpf/test_run.c:119
bpf_prog_test_run_skb+0xb84/0x1ee0 net/bpf/test_run.c:663
bpf_prog_test_run kernel/bpf/syscall.c:3307 [inline]
__sys_bpf+0x2137/0x5df0 kernel/bpf/syscall.c:4605
__do_sys_bpf kernel/bpf/syscall.c:4691 [inline]
__se_sys_bpf kernel/bpf/syscall.c:4689 [inline]
__x64_sys_bpf+0x75/0xb0 kernel/bpf/syscall.c:4689
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x4665f9
|
[] |
GHSA-mx7c-v526-jx53
|
Vulnerability in the Oracle Solaris product of Oracle Systems (component: Filesystem). The supported version that is affected is 11. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle Solaris executes to compromise Oracle Solaris. While the vulnerability is in Oracle Solaris, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Solaris. CVSS 3.0 Base Score 6.0 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H).
|
[] |
|
CVE-2014-0216
|
The My Home implementation in the block_html_pluginfile function in blocks/html/lib.php in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 does not properly restrict file access, which allows remote attackers to obtain sensitive information by visiting an HTML block.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:moodle:moodle:2.6.2:*:*:*:*:*:*:*"
] |
|
CVE-2023-2382
|
Netgear SRX5308 Web Management Interface cross site scripting
|
A vulnerability was found in Netgear SRX5308 up to 4.3.5-3 and classified as problematic. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument sysLogInfo.serverName leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-227660. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] |
GHSA-73r4-8h5j-2cjg
|
mod_userdir in lighttpd before 1.4.20, when a case-insensitive operating system or filesystem is used, performs case-sensitive comparisons on filename components in configuration options, which might allow remote attackers to bypass intended access restrictions, as demonstrated by a request for a .PHP file when there is a configuration rule for .php files.
|
[] |
|
CVE-2016-6525
|
Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array.
|
[
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:artifex:mupdf:*:*:*:*:*:*:*:*"
] |
|
GHSA-4rxh-wp98-c3j4
|
The pushBIZ WordPress plugin through 1.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
|
[] |
|
GHSA-j46p-wfvm-g6pg
|
An issue in RUoYi v.4.8.0 allows a remote attacker to escalate privileges via the edit method of the /edit/{dictId} endpoint does not properly validate whether the requesting user has permission to modify the specified dictId
|
[] |
|
GHSA-7f85-jgjr-85qj
|
Use of Hard-coded Credentials vulnerability in FortiRecorder all versions below 2.7.4 may allow an unauthenticated attacker with knowledge of the aforementioned credentials and network access to FortiCameras to take control of those, provided they are managed by a FortiRecorder device.
|
[] |
|
CVE-2018-13573
|
The mintToken function of a smart contract implementation for TripPay, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
|
[
"cpe:2.3:a:trippay_project:trippay:-:*:*:*:*:*:*:*"
] |
|
CVE-1999-0019
|
Delete or create a file via rpc.statd, due to invalid information.
|
[
"cpe:2.3:a:data_general:dg_ux:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ncr:mp-ras:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nighthawk:cx_ux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nighthawk:powerux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:2:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*"
] |
|
GHSA-g6vp-23xc-rxrv
|
Konica Minolta bizhub MFP devices before 2022-04-14 use cleartext password storage for the /var/log/nginx/html/ADMINPASS and /etc/shadow files.
|
[] |
|
GHSA-7fpw-xhjc-qc6p
|
uConfig agent in Compex NetPassage WPE54G router allows remote attackers to cause a denial of service (unresposiveness) via crafted datagrams to UDP port 7778.
|
[] |
|
GHSA-8q75-6f6h-8grp
|
An authenticated Remote Code Execution (RCE) vulnerability exists in the AirWave CLI. Successful exploitation of this vulnerability could allow a remote authenticated threat actor to run arbitrary commands as a privileged user on the underlying host.
|
[] |
|
CVE-2016-6373
|
The web-based GUI in Cisco Cloud Services Platform (CSP) 2100 2.0 allows remote authenticated administrators to execute arbitrary OS commands as root via crafted platform commands, aka Bug ID CSCva00541.
|
[
"cpe:2.3:a:cisco:cloud_services_platform_2100:2.0.0_base:*:*:*:*:*:*:*"
] |
|
CVE-2020-7603
|
closure-compiler-stream through 0.1.15 allows execution of arbitrary commands. The argument "options" of the exports function in "index.js" can be controlled by users without any sanitization.
|
[
"cpe:2.3:a:closure-compiler-stream_project:closure-compiler-stream:*:*:*:*:*:node.js:*:*"
] |
|
CVE-2025-42974
|
Missing Authorization Check in SAP NetWeaver and ABAP Platform (SDCCN)
|
Due to missing authorization check, an attacker authenticated as a non-administrative user could call a remote-enabled function module. This could enable access to information normally restricted, resulting in low impact on confidentiality. There is no impact on integrity or availability.
|
[] |
GHSA-7w6p-v52h-gg48
|
An issue was discovered in certain Apple products. Pages before 6.1, Numbers before 4.1, and Keynote before 7.1 on macOS and Pages before 3.1, Numbers before 3.1, and Keynote before 3.1 on iOS are affected. The issue involves the "Export" component. It allows users to bypass iWork PDF password protection by leveraging use of 40-bit RC4.
|
[] |
|
CVE-2024-41831
|
ZDI-CAN-24569: Adobe Acrobat Reader DC AcroForm Use-After-Free Remote Code Execution Vulnerability
|
Acrobat Reader versions 20.005.30636, 24.002.20965, 24.002.20964, 24.001.30123 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:macos:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:windows:*:*",
"cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
GHSA-3ghv-w9fm-536c
|
IBM Maximo Asset Management 7.6 through 7.6.3 installs with a default administrator account that a remote intruder could use to gain administrator access to the system. This vulnerability is due to an incomplete fix for CVE-2015-4966. IBM X-Force ID: 142116.
|
[] |
|
GHSA-x8q6-xr39-6p4c
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in wpdevart Countdown and CountUp, WooCommerce Sales Timer plugin <= 1.8.2 versions.
|
[] |
|
GHSA-987f-mx6v-8j5v
|
Transient DOS while parsing the multi-link element Control field when common information length check is missing before updating the location.
|
[] |
|
GHSA-377j-h2fm-67p8
|
The Header Footer Code Manager Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the message parameter in all versions up to, and including, 1.0.16 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] |
|
CVE-2013-0414
|
Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect integrity and availability via unknown vectors related to Utility/ksh93.
|
[
"cpe:2.3:o:sun:sunos:5.11:*:*:*:*:*:*:*"
] |
|
CVE-2012-0928
|
The ATRAC codec in RealNetworks RealPlayer 11.x and 14.x through 14.0.7, RealPlayer SP 1.0 through 1.1.5, and Mac RealPlayer 12.x before 12.0.0.1703 does not properly decode samples, which allows remote attackers to execute arbitrary code via a crafted ATRAC audio file.
|
[
"cpe:2.3:a:realnetworks:realplayer:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1.609:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.1.633:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:14.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.1744:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2.2315:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11_build_6.0.14.748:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1569:*:mac_os:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:12.0.0.1701:*:mac_os:*:*:*:*:*"
] |
|
GHSA-7qh4-q2fr-g376
|
Cross-site request forgery (CSRF) vulnerability in HP Power Manager (HPPM) 4.3.2 and earlier allows remote attackers to hijack the authentication of administrators for requests that create new administrative accounts.
|
[] |
|
CVE-2021-35377
|
Cross Site Scripting vulnerability found in VICIdial v2.14-610c and v.2.10-415c allows attackers execute arbitrary code via the /agc/vicidial.php, agc/vicidial-greay.php, and /vicidial/KHOMP_admin.php parameters.
|
[
"cpe:2.3:a:vicidial:vicidial:2.9-401c:140612-1626:*:*:*:*:*:*",
"cpe:2.3:a:vicidial:vicidial:2.10-415c:140918-1606:*:*:*:*:*:*",
"cpe:2.3:a:vicidial:vicidial:2.14-597c:191114-0949:*:*:*:*:*:*",
"cpe:2.3:a:vicidial:vicidial:2.14-610c:200528-2239:*:*:*:*:*:*"
] |
|
CVE-2024-11613
|
WordPress File Upload <= 4.24.15 - Unauthenticated Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion
|
The WordPress File Upload plugin for WordPress is vulnerable to Remote Code Execution, Arbitrary File Read, and Arbitrary File Deletion in all versions up to, and including, 4.24.15 via the 'wfu_file_downloader.php' file. This is due to lack of proper sanitization of the 'source' parameter and allowing a user-defined directory path. This makes it possible for unauthenticated attackers to execute code on the server.
|
[] |
GHSA-rv8h-hrgv-p5cw
|
In the Linux kernel, the following vulnerability has been resolved:btrfs: fix assertion failure when splitting ordered extent after transaction abortIf while we are doing a direct IO write a transaction abort happens, we
mark all existing ordered extents with the BTRFS_ORDERED_IOERR flag (done
at btrfs_destroy_ordered_extents()), and then after that if we enter
btrfs_split_ordered_extent() and the ordered extent has bytes left
(meaning we have a bio that doesn't cover the whole ordered extent, see
details at btrfs_extract_ordered_extent()), we will fail on the following
assertion at btrfs_split_ordered_extent():ASSERT(!(flags & ~BTRFS_ORDERED_TYPE_FLAGS));because the BTRFS_ORDERED_IOERR flag is set and the definition of
BTRFS_ORDERED_TYPE_FLAGS is just the union of all flags that identify the
type of write (regular, nocow, prealloc, compressed, direct IO, encoded).Fix this by returning an error from btrfs_extract_ordered_extent() if we
find the BTRFS_ORDERED_IOERR flag in the ordered extent. The error will
be the error that resulted in the transaction abort or -EIO if no
transaction abort happened.This was recently reported by syzbot with the following trace:FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 1
CPU: 0 UID: 0 PID: 5321 Comm: syz.0.0 Not tainted 6.13.0-rc5-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
<TASK>
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
fail_dump lib/fault-inject.c:53 [inline]
should_fail_ex+0x3b0/0x4e0 lib/fault-inject.c:154
should_failslab+0xac/0x100 mm/failslab.c:46
slab_pre_alloc_hook mm/slub.c:4072 [inline]
slab_alloc_node mm/slub.c:4148 [inline]
__do_kmalloc_node mm/slub.c:4297 [inline]
__kmalloc_noprof+0xdd/0x4c0 mm/slub.c:4310
kmalloc_noprof include/linux/slab.h:905 [inline]
kzalloc_noprof include/linux/slab.h:1037 [inline]
btrfs_chunk_alloc_add_chunk_item+0x244/0x1100 fs/btrfs/volumes.c:5742
reserve_chunk_space+0x1ca/0x2c0 fs/btrfs/block-group.c:4292
check_system_chunk fs/btrfs/block-group.c:4319 [inline]
do_chunk_alloc fs/btrfs/block-group.c:3891 [inline]
btrfs_chunk_alloc+0x77b/0xf80 fs/btrfs/block-group.c:4187
find_free_extent_update_loop fs/btrfs/extent-tree.c:4166 [inline]
find_free_extent+0x42d1/0x5810 fs/btrfs/extent-tree.c:4579
btrfs_reserve_extent+0x422/0x810 fs/btrfs/extent-tree.c:4672
btrfs_new_extent_direct fs/btrfs/direct-io.c:186 [inline]
btrfs_get_blocks_direct_write+0x706/0xfa0 fs/btrfs/direct-io.c:321
btrfs_dio_iomap_begin+0xbb7/0x1180 fs/btrfs/direct-io.c:525
iomap_iter+0x697/0xf60 fs/iomap/iter.c:90
__iomap_dio_rw+0xeb9/0x25b0 fs/iomap/direct-io.c:702
btrfs_dio_write fs/btrfs/direct-io.c:775 [inline]
btrfs_direct_write+0x610/0xa30 fs/btrfs/direct-io.c:880
btrfs_do_write_iter+0x2a0/0x760 fs/btrfs/file.c:1397
do_iter_readv_writev+0x600/0x880
vfs_writev+0x376/0xba0 fs/read_write.c:1050
do_pwritev fs/read_write.c:1146 [inline]
__do_sys_pwritev2 fs/read_write.c:1204 [inline]
__se_sys_pwritev2+0x196/0x2b0 fs/read_write.c:1195
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f1281f85d29
RSP: 002b:00007f12819fe038 EFLAGS: 00000246 ORIG_RAX: 0000000000000148
RAX: ffffffffffffffda RBX: 00007f1282176080 RCX: 00007f1281f85d29
RDX: 0000000000000001 RSI: 0000000020000240 RDI: 0000000000000005
RBP: 00007f12819fe090 R08: 0000000000000000 R09: 0000000000000003
R10: 0000000000007000 R11: 0000000000000246 R12: 0000000000000002
R13: 0000000000000000 R14: 00007f1282176080 R15: 00007ffcb9e23328
</TASK>
BTRFS error (device loop0 state A): Transaction aborted (error -12)
BTRFS: error (device loop0 state A
---truncated---
|
[] |
|
CVE-2024-1949
|
A race condition in Mattermost versions 8.1.x before 8.1.9, and 9.4.x before 9.4.2 allows an authenticated attacker to gain unauthorized access to individual posts' contents via carefully timed post creation while another user deletes posts.
|
[
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] |
|
GHSA-mxcj-7pjj-p9r6
|
The mtouch-quiz plugin before 3.1.3 for WordPress has XSS via the quiz parameter during a Quiz Manage operation.
|
[] |
|
CVE-2022-46835
|
SailPoint IdentityIQ JavaServer File Path Traversal Vulnerability
|
IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p2, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p5, IdentityIQ 8.1 and all 8.1 patch levels prior to 8.1p7, IdentityIQ 8.0 and all 8.0 patch levels prior to 8.0p6 allow access to arbitrary files in the application server filesystem due to a path traversal vulnerability in JavaServer Faces (JSF) 2.2.20 documented in CVE-2020-6950.
|
[
"cpe:2.3:a:sailpoint:identityiq:8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch2:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch3:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch4:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch5:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.1:patch6:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:patch1:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:patch2:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.2:patch4:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.3:-:*:*:*:*:*:*",
"cpe:2.3:a:sailpoint:identityiq:8.3:patch1:*:*:*:*:*:*"
] |
CVE-2025-54077
|
WeGIA Reflected Cross-Site Scripting (XSS) vulnerability in endpoint 'personalizacao.php' parameter 'err'
|
WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. A Reflected Cross-Site Scripting (XSS) vulnerability was identified in versions prior to 3.4.6 in the `personalizacao.php` endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the `err` parameter. Version 3.4.6 fixes the issue.
|
[] |
GHSA-87vf-6qwq-6725
|
In engineermode services, there is a missing permission check. This could lead to local denial of service in engineermode services.
|
[] |
|
GHSA-gp38-xvw7-cphq
|
An issue found in The Thaiger v.1.2 for Android allows unauthorized apps to cause a code execution attack by manipulating the SharedPreference files.
|
[] |
|
CVE-2018-21229
|
Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects R7500v2 before 1.0.3.20, R7800 before 1.0.2.38, WN3000RPv3 before 1.0.2.50, WNDR4300v2 before 1.0.0.50, and WNDR4500v3 before 1.0.0.50.
|
[
"cpe:2.3:o:netgear:r7500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7500:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rp:v3:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4300:v2:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wndr4500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wndr4500:v3:*:*:*:*:*:*:*"
] |
|
CVE-2024-42294
|
block: fix deadlock between sd_remove & sd_release
|
In the Linux kernel, the following vulnerability has been resolved:
block: fix deadlock between sd_remove & sd_release
Our test report the following hung task:
[ 2538.459400] INFO: task "kworker/0:0":7 blocked for more than 188 seconds.
[ 2538.459427] Call trace:
[ 2538.459430] __switch_to+0x174/0x338
[ 2538.459436] __schedule+0x628/0x9c4
[ 2538.459442] schedule+0x7c/0xe8
[ 2538.459447] schedule_preempt_disabled+0x24/0x40
[ 2538.459453] __mutex_lock+0x3ec/0xf04
[ 2538.459456] __mutex_lock_slowpath+0x14/0x24
[ 2538.459459] mutex_lock+0x30/0xd8
[ 2538.459462] del_gendisk+0xdc/0x350
[ 2538.459466] sd_remove+0x30/0x60
[ 2538.459470] device_release_driver_internal+0x1c4/0x2c4
[ 2538.459474] device_release_driver+0x18/0x28
[ 2538.459478] bus_remove_device+0x15c/0x174
[ 2538.459483] device_del+0x1d0/0x358
[ 2538.459488] __scsi_remove_device+0xa8/0x198
[ 2538.459493] scsi_forget_host+0x50/0x70
[ 2538.459497] scsi_remove_host+0x80/0x180
[ 2538.459502] usb_stor_disconnect+0x68/0xf4
[ 2538.459506] usb_unbind_interface+0xd4/0x280
[ 2538.459510] device_release_driver_internal+0x1c4/0x2c4
[ 2538.459514] device_release_driver+0x18/0x28
[ 2538.459518] bus_remove_device+0x15c/0x174
[ 2538.459523] device_del+0x1d0/0x358
[ 2538.459528] usb_disable_device+0x84/0x194
[ 2538.459532] usb_disconnect+0xec/0x300
[ 2538.459537] hub_event+0xb80/0x1870
[ 2538.459541] process_scheduled_works+0x248/0x4dc
[ 2538.459545] worker_thread+0x244/0x334
[ 2538.459549] kthread+0x114/0x1bc
[ 2538.461001] INFO: task "fsck.":15415 blocked for more than 188 seconds.
[ 2538.461014] Call trace:
[ 2538.461016] __switch_to+0x174/0x338
[ 2538.461021] __schedule+0x628/0x9c4
[ 2538.461025] schedule+0x7c/0xe8
[ 2538.461030] blk_queue_enter+0xc4/0x160
[ 2538.461034] blk_mq_alloc_request+0x120/0x1d4
[ 2538.461037] scsi_execute_cmd+0x7c/0x23c
[ 2538.461040] ioctl_internal_command+0x5c/0x164
[ 2538.461046] scsi_set_medium_removal+0x5c/0xb0
[ 2538.461051] sd_release+0x50/0x94
[ 2538.461054] blkdev_put+0x190/0x28c
[ 2538.461058] blkdev_release+0x28/0x40
[ 2538.461063] __fput+0xf8/0x2a8
[ 2538.461066] __fput_sync+0x28/0x5c
[ 2538.461070] __arm64_sys_close+0x84/0xe8
[ 2538.461073] invoke_syscall+0x58/0x114
[ 2538.461078] el0_svc_common+0xac/0xe0
[ 2538.461082] do_el0_svc+0x1c/0x28
[ 2538.461087] el0_svc+0x38/0x68
[ 2538.461090] el0t_64_sync_handler+0x68/0xbc
[ 2538.461093] el0t_64_sync+0x1a8/0x1ac
T1: T2:
sd_remove
del_gendisk
__blk_mark_disk_dead
blk_freeze_queue_start
++q->mq_freeze_depth
bdev_release
mutex_lock(&disk->open_mutex)
sd_release
scsi_execute_cmd
blk_queue_enter
wait_event(!q->mq_freeze_depth)
mutex_lock(&disk->open_mutex)
SCSI does not set GD_OWNS_QUEUE, so QUEUE_FLAG_DYING is not set in
this scenario. This is a classic ABBA deadlock. To fix the deadlock,
make sure we don't try to acquire disk->open_mutex after freezing
the queue.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
CVE-2019-9530
|
The web root directory of the Cobham EXPLORER 710, firmware version 1.07, has no access restrictions on downloading and reading all files
|
The web root directory of the Cobham EXPLORER 710, firmware version 1.07, has no access restrictions on downloading and reading all files. This could allow an unauthenticated, local attacker connected to the device to access and download any file found in the web root directory.
|
[
"cpe:2.3:o:cobham:explorer_710_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:cobham:explorer_710:-:*:*:*:*:*:*:*"
] |
CVE-2022-34966
|
OpenTeknik LLC OSSN OPEN SOURCE SOCIAL NETWORK v6.3 LTS was discovered to contain an HTML injection vulnerability via the location parameter at http://ip_address/:port/ossn/home.
|
[
"cpe:2.3:a:openteknik:open_source_social_network:6.3:*:*:*:lts:*:*:*"
] |
|
CVE-2022-31764
|
Apache ShardingSphere ElasticJob-UI allows RCE via event trace data source JDBC
|
The Lite UI of Apache ShardingSphere ElasticJob-UI allows an attacker to perform RCE by constructing a special JDBC URL of H2 database. This issue affects Apache ShardingSphere ElasticJob-UI version 3.0.1 and prior versions. This vulnerability has been fixed in ElasticJob-UI 3.0.2.
The premise of this attack is that the attacker has obtained the account and password. Otherwise, the attacker cannot perform this attack.
|
[] |
CVE-2023-2688
|
The WordPress File Upload and WordPress File Upload Pro plugins for WordPress are vulnerable to Path Traversal in versions up to, and including, 4.19.1 via the vulnerable parameter wfu_newpath. This allows administrator-level attackers to move files uploaded with the plugin (located in wp-content/uploads by default) outside of the web root.
|
[
"cpe:2.3:a:iptanus:wordpress_file_upload:*:*:*:*:*:wordpress:*:*",
"cpe:2.3:a:iptanus:wordpress_file_upload_pro:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2005-1787
|
setup.php in phpStat 1.5 allows remote attackers to bypass authentication and gain administrator privileges by setting the $check variable.
|
[
"cpe:2.3:a:phpstat:phpstat:-:*:*:*:*:*:*:*"
] |
|
GHSA-pvxg-5348-rxvf
|
The session cookie in MailGates and MailAudit from Openfind does not have the HttpOnly flag enabled, allowing remote attackers to potentially steal the session cookie via XSS.
|
[] |
|
CVE-2012-4932
|
Multiple cross-site scripting (XSS) vulnerabilities in SimpleInvoices before stable-2012-1-CIS3000 allow remote attackers to inject arbitrary web script or HTML via (1) the having parameter in a manage action to index.php; (2) the Email field in an Add User action; (3) the Customer Name field in an Add Customer action; the (4) Street address, (5) Street address 2, (6) City, (7) Zip code, (8) State, (9) Country, (10) Mobile Phone, (11) Phone, (12) Fax, (13) Email, (14) PayPal business name, (15) PayPal notify url, (16) PayPal return url, (17) Eway customer ID, (18) Custom field 1, (19) Custom field 2, (20) Custom field 3, or (21) Custom field 4 field in an Add Biller action; (22) the Customer field in an Add Invoice action; the (23) Invoice or (24) Notes field in a Process Payment action; (25) the Payment type description field in a Payment Types action; (26) the Description field in an Invoice Preferences action; (27) the Description field in a Manage Products action; or (28) the Description field in a Tax Rates action.
|
[
"cpe:2.3:a:simple_invoices:simple_invoices:*:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_invoices:simple_invoices:2006-12-11:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_invoices:simple_invoices:2007-01-25:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_invoices:simple_invoices:2007-02-02:*:*:*:*:*:*:*",
"cpe:2.3:a:simple_invoices:simple_invoices:2007-05-25:*:*:*:*:*:*:*"
] |
|
CVE-2020-10640
|
ICSA-20-140-02 Emerson OpenEnterprise
|
Emerson OpenEnterprise versions through 3.3.4 may allow an attacker to run an arbitrary commands with system privileges or perform remote code execution via a specific communication service.
|
[
"cpe:2.3:a:emerson:openenterprise_scada_server:*:*:*:*:*:*:*:*"
] |
GHSA-c2wr-cf32-2rj9
|
The google-language-translator plugin before 5.0.06 for WordPress has XSS.
|
[] |
|
CVE-2023-7161
|
Netentsec NS-ASG Application Security Gateway Login sql injection
|
A vulnerability classified as critical has been found in Netentsec NS-ASG Application Security Gateway 6.3.1. This affects an unknown part of the file index.php?para=index of the component Login. The manipulation of the argument check_VirtualSiteId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-249183.
|
[
"cpe:2.3:o:netentsec:application_security_gateway_firmware:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:h:netentsec:application_security_gateway:-:*:*:*:*:*:*:*"
] |
CVE-2017-2135
|
Cross-site scripting vulnerability in WP Statistics version 12.0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
|
[
"cpe:2.3:a:wp-statistics:wp_statistics:*:*:*:*:*:wordpress:*:*"
] |
|
CVE-2022-47167
|
WordPress Crayon Syntax Highlighter Plugin <= 2.8.4 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in Aram Kocharyan Crayon Syntax Highlighter plugin <= 2.8.4 versions.
|
[
"cpe:2.3:a:crayon_syntax_highlighter_project:crayon_syntax_highlighter:*:*:*:*:*:wordpress:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.