CIRCL/vulnerability-severity-classification-roberta-base
Text Classification
•
0.1B
•
Updated
•
615
•
5
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2021-4472
|
Python-mistralclient: mistral-dashboard: local file inclusion through the 'create workbook' feature
|
The mistral-dashboard plugin for openstack has a local file inclusion vulnerability through the 'Create Workbook' feature that may result in disclosure of arbitrary local files content.
|
[
"cpe:/a:redhat:openstack:13",
"cpe:/a:redhat:openstack:16.2",
"cpe:/a:redhat:openstack:17.1"
] | null | 6.5
| null | null | null |
CVE-1999-1569
|
Quake 1 and NetQuake servers allow remote attackers to cause a denial of service (resource exhaustion or forced disconnection) via a flood of spoofed UDP connection packets, which exceeds the server's player limit.
|
[
"cpe:2.3:a:id_software:quake:1.9:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2025-51650
|
An arbitrary file upload vulnerability in the component /controller/PicManager.php of FoxCMS v1.2.6 allows attackers to execute arbitrary code via uploading a crafted template file.
|
[] | null | 5.6
| null | null | null |
|
GHSA-rgfx-ffpf-rhj3
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix bounds check for dcn35 DcfClocks[Why]
NumFclkLevelsEnabled is used for DcfClocks bounds check
instead of designated NumDcfClkLevelsEnabled.
That can cause array index out-of-bounds access.[How]
Use designated variable for dcn35 DcfClocks bounds check.
|
[] | null | null | null | null | null |
|
CVE-2013-5486
|
Directory traversal vulnerability in processImageSave.jsp in DCNM-SAN Server in Cisco Prime Data Center Network Manager (DCNM) before 6.2(1) allows remote attackers to write arbitrary files via the chartid parameter, aka Bug IDs CSCue77035 and CSCue77036. NOTE: this can be leveraged to execute arbitrary commands by using the JBoss autodeploy functionality.
|
[
"cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\\(4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:4.1\\(5\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:4.2\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:4.2\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.0\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.0\\(3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.1\\(3u\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\\(2a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\\(2b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\\(2c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:5.2\\(2e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:6.1\\(1a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:6.1\\(1b\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:prime_data_center_network_manager:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-crx8-mq4w-pqc9
|
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 update 4 and earlier, 6 update 32 and earlier, 5 update 35 and earlier, and 1.4.2_37 and earlier allows local users to affect confidentiality via unknown vectors related to printing on Solaris or Linux.
|
[] | null | null | null | null | null |
|
GHSA-r44m-x4hw-7wjr
|
** DISPUTED ** Race condition in VIPRE Antivirus Premium 4.0.3272 on Windows XP allows local users to bypass kernel-mode hook handlers, and execute dangerous code that would otherwise be blocked by a handler but not blocked by signature-based malware detection, via certain user-space memory changes during hook-handler execution, aka an argument-switch attack or a KHOBE attack. NOTE: this issue is disputed by some third parties because it is a flaw in a protection mechanism for situations where a crafted program has already begun to execute.
|
[] | null | 7
| null | null | null |
|
CVE-2022-25418
|
Tenda AC9 V15.03.2.21_cn was discovered to contain a stack overflow via the function openSchedWifi.
|
[
"cpe:2.3:o:tenda:ac9_firmware:v15.03.2.21_cn:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac9:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
CVE-2018-0617
|
Directory traversal vulnerability in ChamaNet MemoCGI v2.1800 to v2.2200 allows remote attackers to read arbitrary files via unspecified vectors.
|
[
"cpe:2.3:a:chama:memocgi:*:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2018-17442
|
An issue was discovered on D-Link Central WiFi Manager before v 1.03r0100-Beta1. An unrestricted file upload vulnerability in the onUploadLogPic endpoint allows remote authenticated users to execute arbitrary PHP code.
|
[
"cpe:2.3:a:dlink:central_wifimanager:*:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.5
| null |
|
GHSA-42v5-vmqc-jx62
|
Incorrect Privilege Assignment vulnerability in Rankology Rankology SEO – On-site SEO allows Privilege Escalation. This issue affects Rankology SEO – On-site SEO: from n/a through 2.2.3.
|
[] | null | 9.8
| null | null | null |
|
CVE-2013-2190
|
The translate_hierarchy_event function in x11/clutter-device-manager-xi2.c in Clutter, when resuming the system, does not properly handle XIQueryDevice errors when a device has "disappeared," which causes the gnome-shell to crash and allows physically proximate attackers to access the previous gnome-shell session via unspecified vectors.
|
[
"cpe:2.3:a:clutter_project:clutter:-:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1
| null |
|
CVE-2015-2339
|
TPview.dll in VMware Workstation 10.x before 10.0.6 and 11.x before 11.1.1, VMware Player 6.x before 6.0.6 and 7.x before 7.1.1, and VMware Horizon Client 3.2.x before 3.2.1, 3.3.x, and 5.x local-mode before 5.4.2 on Windows does not properly allocate memory, which allows guest OS users to cause a host OS denial of service via unspecified vectors, a different vulnerability than CVE-2015-2338.
|
[
"cpe:2.3:a:vmware:horizon_client:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_client:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*"
] | null | null | null | 6.1
| null |
|
CVE-2025-53236
|
WordPress UDesign Core plugin <= 4.14.0 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in AndonDesign UDesign Core u-design-core allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects UDesign Core: from n/a through <= 4.14.0.
|
[] | null | 6.3
| null | null | null |
GHSA-ggh3-rx92-gffh
|
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
|
[] | null | 8.4
| null | null | null |
|
GHSA-p2v6-235w-qhfc
|
In Modem IMS SMS UA, there is a possible out of bounds write due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00730807; Issue ID: MOLY00730807.
|
[] | null | 7.5
| null | null | null |
|
CVE-2024-36668
|
idccms v1.35 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component admin/type_deal.php?mudi=del
|
[
"cpe:2.3:a:idccms_project:idccms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:idccms_project:idccms:1.35:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
|
CVE-2023-40138
|
In FillUi of FillUi.java, there is a possible way to view another user's images due to a confused deputy. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
] | null | 3.3
| null | null | null |
|
CVE-2016-10562
|
iedriver is an NPM wrapper for Selenium IEDriver. iedriver versions below 3.0.0 download binary resources over HTTP, which leaves the module vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested binary with an attacker controlled binary if the attacker is on the network or positioned in between the user and the remote server.
|
[
"cpe:2.3:a:iedriver_project:iedriver:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1
| 9.3
| null |
|
CVE-2024-5376
|
Kashipara College Management System view_each_faculty.php cross site scripting
|
A vulnerability was found in Kashipara College Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file view_each_faculty.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-266288.
|
[
"cpe:2.3:a:kashipara:college_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3
| 3.5
| 3.5
| 4
| null |
CVE-2023-6247
|
The PKCS#7 parser in OpenVPN 3 Core Library versions through 3.8.3 did not properly validate the parsed data, which would result in the application crashing.
|
[] | null | 6.5
| null | null | null |
|
CVE-2024-9258
|
IrfanView SID File Parsing Uninitialized Pointer Remote Code Execution Vulnerability
|
IrfanView SID File Parsing Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of IrfanView. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of SID files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23276.
|
[
"cpe:2.3:a:irfanview:irfanview:-:*:*:*:*:*:*:*",
"cpe:2.3:a:irfanview:irfanview:4.66:*:*:*:*:*:x64:*"
] | null | null | 7.8
| null | null |
CVE-2025-26157
|
A SQL Injection vulnerability was found in /bpms/index.php in Source Code and Project Beauty Parlour Management System V1.1, which allows remote attackers to execute arbitrary code via the name POST request parameter.
|
[] | null | 5.9
| null | null | null |
|
CVE-2023-35091
|
WordPress WooCommerce Stock Manager Plugin <= 2.10.0 is vulnerable to Cross Site Request Forgery (CSRF)
|
Cross-Site Request Forgery (CSRF) vulnerability in StoreApps Stock Manager for WooCommerce plugin <= 2.10.0 versions.
|
[
"cpe:2.3:a:storeapps:stock_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*"
] | null | 4.3
| null | null | null |
CVE-2024-38202
|
Windows Update Stack Elevation of Privilege Vulnerability
|
Summary
Microsoft was notified that an elevation of privilege vulnerability exists in Windows Update, potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of Virtualization Based Security (VBS). However, an attacker attempting to exploit this vulnerability requires additional interaction by a privileged user to be successful.
Microsoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.
If there are any further updates regarding mitigations for this vulnerability, this CVE will be updated and customers will be notified. We highly encourage customers to subscribe to Security Update Guide notifications to receive an alert if an update occurs.
Details
A security researcher informed Microsoft of an elevation of privilege vulnerability in Windows Update potentially enabling an attacker with basic user privileges to reintroduce previously mitigated vulnerabilities or circumvent some features of VBS. For exploitation to succeed, an attacker must trick or convince an Administrator or a user with delegated permissions into performing a system restore which inadvertently triggers the vulnerability.
Microsoft has developed a security update to mitigate this threat which was made available October 08, 2024 and is provided in the Security Updates table of this CVE for customers to download. Note: Depending on your version of Windows, additional steps may be required to update Windows Recovery Environment (WinRE) to be protected from this vulnerability. Please refer to the FAQ section for more information. Guidance for customers who cannot immediately implement the update is provided in the Recommended Actions section of this CVE to help reduce the risks associated with this vulnerability and to protect their systems.
If there are any further... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38202
|
[
"cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*"
] | null | 7.3
| null | null | null |
GHSA-437h-8p4c-5p9r
|
Wellcms 2.2.0 is vulnerable to Cross Site Request Forgery (CSRF).
|
[] | null | 8.8
| null | null | null |
|
CVE-2009-1284
|
Buffer overflow in BibTeX 0.99 allows context-dependent attackers to cause a denial of service (memory corruption and crash) via a long .bib bibliography file.
|
[
"cpe:2.3:a:bibtex:bibtex:0.99:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-f2p2-qfcm-69wm
|
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker with administrative privileges to inject arbitrary commands into the underlying operating system and execute them using root-level privileges. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending malicious input to a specific field in the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying Linux operating system as a user with root-level privileges.
|
[] | null | 7.2
| null | null | null |
|
CVE-2021-25278
|
FTAPI 4.0 through 4.10 allows XSS via an SVG document to the Background Image upload feature in the Submit Box Template Editor.
|
[
"cpe:2.3:a:ftapi:ftapi:*:*:*:*:*:*:*:*"
] | null | 4.8
| null | 3.5
| null |
|
CVE-2019-15271
|
Cisco Small Business RV016, RV042, RV042G, and RV082 Routers Arbitrary Command Execution Vulnerability
|
A vulnerability in the web-based management interface of certain Cisco Small Business RV Series Routers could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The attacker must have either a valid credential or an active session token. The vulnerability is due to lack of input validation of the HTTP payload. An attacker could exploit this vulnerability by sending a malicious HTTP request to the web-based management interface of the targeted device. A successful exploit could allow the attacker to execute commands with root privileges.
|
[
"cpe:2.3:o:cisco:rv016_multi-wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016_multi-wan_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042_dual_wan_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_dual_gigabit_wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g_dual_gigabit_wan_vpn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_dual_wan_vpn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082_dual_wan_vpn:-:*:*:*:*:*:*:*"
] | null | null | 8.8
| null | null |
CVE-2024-6375
|
Missing authorization check may lead to shard key refinement
|
A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3.
|
[
"cpe:2.3:a:mongodb:mongodb:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:5.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
GHSA-hf8q-wrgf-872g
|
SQL injection vulnerability exists in the script DIAE_tagHandler.ashx.
|
[] | null | 8.8
| null | null | null |
|
GHSA-8r7j-pj39-v7xh
|
Hitachi Vantara Pentaho Business Analytics Server prior to versions 9.4.0.0 and 9.3.0.2, including 8.3.x display the target path on host when a file is uploaded with an invalid character in its name.
|
[] | null | 4.3
| null | null | null |
|
CVE-2020-11476
|
Concrete5 before 8.5.3 allows Unrestricted Upload of File with Dangerous Type such as a .phar file.
|
[
"cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*"
] | null | 7.2
| null | 9
| null |
|
GHSA-5mm9-q2jr-6gr8
|
Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
|
[] | null | 6.1
| null | null | null |
|
GHSA-39fv-p94v-rg6c
|
An issue was discovered in Mbed TLS 3.5.x before 3.6.0. When negotiating the TLS version on the server side, it can fall back to the TLS 1.2 implementation of the protocol if it is disabled. If the TLS 1.2 implementation was disabled at build time, a TLS 1.2 client could put a TLS 1.3-only server into an infinite loop processing a TLS 1.2 ClientHello, resulting in a denial of service. If the TLS 1.2 implementation was disabled at runtime, a TLS 1.2 client can successfully establish a TLS 1.2 connection with the server.
|
[] | null | 5.4
| null | null | null |
|
GHSA-cvmf-9frc-7xwx
|
An issue existed in the storage of sensitive tokens. This issue was addressed by placing the tokens in Keychain. This issue is fixed in macOS High Sierra 10.13. A local attacker may gain access to iCloud authentication tokens.
|
[] | null | null | null | null | null |
|
CVE-2006-6687
|
Cross-site scripting (XSS) vulnerability in Web Automated Perl Portal (WebAPP) 0.9.9.4, and 0.9.9.3.4 Network Edition (NE) (aka WebAPP.NET), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:web-app.net:webapp:0.9.9.3.4:-:network:*:*:*:*:*",
"cpe:2.3:a:web-app.net:webapp:0.9.9.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-gcr6-f25q-5p9w
|
view_album.php in SelectaPix 1.31 and earlier allows remote attackers to obtain the installation path via a certain request, which displays the path in an error message, possibly due to an invalid or missing parameter.
|
[] | null | null | null | null | null |
|
GHSA-5grv-4qg8-xxfq
|
Wiz Code Visual Studio Code extension in versions 1.0.0 up to 1.5.3 and Wiz (legacy) Visual Studio Code extension in versions 0.13.0 up to 0.17.8 are vulnerable to local command injection if the user opens a maliciously crafted Dockerfile located in a path that has been marked as a "trusted folder" within Visual Studio Code, and initiates a manual scan of the file.
|
[] | 7.1
| 0
| null | null | null |
|
CVE-2021-30908
|
An authentication issue was addressed with improved state management. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.1. A local attacker may be able to view the previous logged-in user’s desktop from the fast user switching screen.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*"
] | null | 3.3
| null | 1.9
| null |
|
CVE-2018-16752
|
LINK-NET LW-N605R devices with firmware 12.20.2.1486 allow Remote Code Execution via shell metacharacters in the HOST field of the ping feature at adm/systools.asp. Authentication is needed but the default password of admin for the admin account may be used in some cases.
|
[
"cpe:2.3:o:linknet-usa:lw-n605r_firmware:12.20.2.1486:*:*:*:*:*:*:*",
"cpe:2.3:h:linknet-usa:lw-n605r:-:*:*:*:*:*:*:*"
] | null | null | 8.8
| 9
| null |
|
GHSA-8rfp-v855-gr3w
|
Pre-Auth RCE via Path Traversal
|
[] | null | 8.3
| null | null | null |
|
GHSA-g74r-ffvr-5q9f
|
Memory Exposure in concat-stream
|
Versions of `concat-stream` before 1.5.2 are vulnerable to memory exposure if userp provided input is passed into `write()`Versions <1.3.0 are not affected due to not using unguarded Buffer constructor.RecommendationUpdate to version 1.5.2, 1.4.11, 1.3.2 or later.If you are unable to update make sure user provided input into the `write()` function is not a number.
|
[] | null | null | null | null | null |
GHSA-gjgq-7qmc-vjmv
|
A vulnerability has been identified in SPPA-T3000 Application Server (All versions). An attacker with network access to the Application Server could gain access to filenames on the server by sending specifically crafted packets to 8090/tcp. Please note that an attacker needs to have network access to the Application Server in order to exploit this vulnerability. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[] | null | null | null | null | null |
|
GHSA-5xjq-5qxg-9fvp
|
A vulnerability has been found in IBOS OA 4.5.5 and classified as critical. This vulnerability affects unknown code of the file ?r=diary/default/del of the component Delete Logs Handler. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-238630 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | null | 6.3
| null | null |
|
GHSA-jpx4-2v97-44rr
|
Missing Authorization vulnerability in KingAddons.com King Addons for Elementor. This issue affects King Addons for Elementor: from n/a through 24.12.58.
|
[] | null | 4.3
| null | null | null |
|
GHSA-x4r6-f226-q9x3
|
NVIDIA GeForce Experience all versions prior to 3.14.1 contains a potential vulnerability during GameStream installation where an attacker who has system access can potentially conduct a Man-in-the-Middle (MitM) attack to obtain sensitive information.
|
[] | null | null | 4.7
| null | null |
|
GHSA-mj9q-xcfx-3rjr
|
A vulnerability, which was classified as critical, has been found in SourceCodester Service Provider Management System 1.0. Affected by this issue is some unknown functionality of the file view.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230798 is the identifier assigned to this vulnerability.
|
[] | null | null | 6.3
| null | null |
|
GHSA-q4r6-53wp-992g
|
Time-based blind SQL injection vulnerabilities in TCMAN's GIM v11. These allow an attacker to retrieve, create, update and delete databases through ArbolID parameter in/GIMWeb/PC/frmPreventivosList.aspx.
|
[] | 8.7
| 9.8
| null | null | null |
|
GHSA-3xwf-6vgx-v5xj
|
In the Linux kernel, the following vulnerability has been resolved:io_uring: drop any code related to SCM_RIGHTSThis is dead code after we dropped support for passing io_uring fds
over SCM_RIGHTS, get rid of it.
|
[] | null | null | null | null | null |
|
CVE-2003-1269
|
AN HTTP 1.41e allows remote attackers to obtain the root web server path via an HTTP request with a long argument to a script, which leaks the path in an error message.
|
[
"cpe:2.3:a:an:an-http:1.41e:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2019-14080
|
Out of bound write can happen due to lack of check of array index value while parsing SDP attribute for SAR in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, Kamorta, MDM9607, MDM9640, MDM9650, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, Nicobar, QCM2150, QCS605, QM215, Rennell, SA415M, SC7180, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX24, SM6150, SM7150, SM8150, SXR1130
|
[
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 7.5
| null |
|
GHSA-vc93-p2h4-xrcp
|
Vulnerability in Oracle Essbase (component: Security and Provisioning). The supported version that is affected is 21.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Essbase. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Essbase accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N).
|
[] | null | 5.3
| null | null | null |
|
CVE-2005-3943
|
Multiple SQL injection vulnerabilities in ilyav FAQ System 1.1 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) FAQ_ID and (2) action parameters in (a) viewFAQ.php; and (3) CATEGORY_ID parameter in (b) index.php.
|
[
"cpe:2.3:a:faq_system:faq_system:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-1999-1445
|
Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords.
|
[
"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2013-4363
|
Algorithmic complexity vulnerability in Gem::Version::ANCHORED_VERSION_PATTERN in lib/rubygems/version.rb in RubyGems before 1.8.23.2, 1.8.24 through 1.8.26, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, as used in Ruby 1.9.0 through 2.0.0p247, allows remote attackers to cause a denial of service (CPU consumption) via a crafted gem version that triggers a large amount of backtracking in a regular expression. NOTE: this issue is due to an incomplete fix for CVE-2013-4287.
|
[
"cpe:2.3:a:rubygems:rubygems:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.13:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.15:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.16:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.17:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.18:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.19:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.20:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.21:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.22:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.24:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.25:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:1.8.26:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:rubygems:rubygems:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p0:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p125:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p194:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p286:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p383:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p385:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p392:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p426:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:1.9.3:p429:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:p0:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:p195:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:p247:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview1:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:preview2:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:ruby-lang:ruby:2.0.0:rc2:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
ICSA-20-273-03
|
B&R Automation SiteManager and GateManager
|
An authenticated adversary can read service configuration and other sensitive information and abuse this information for malicious activities on SiteManager instances.CVE-2020-11641 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N). An authenticated adversary can repeatedly trigger a restart of SiteManager instances, thus limiting availability.CVE-2020-11642 has been assigned to this vulnerability. A CVSS v3 base score of 7.7 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H). An authenticated adversary can gather information about devices belonging to a foreign organization and abuse this information for malicious activities.CVE-2020-11643 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N). An authenticated adversary can fool users of foreign domains with fictional audit messages/alerts of their choice.CVE-2020-11644 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N). An authenticated adversary can repeatedly trigger a restart of GateManager instances, thus limiting their availability.CVE-2020-11645 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). An authenticated adversary can view information about all devices belonging to their domain and abuse this information for malicious activities.CVE-2020-11646 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 4.3
| null | null |
CVE-2007-2914
|
Multiple cross-site scripting (XSS) vulnerabilities in PsychoStats 3.0.6b allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) awards.php, (2) login.php, (3) register.php, (4) weapons.php, and possibly other unspecified files.
|
[
"cpe:2.3:a:psychostats:psychostats:3.0.6b:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-jxmq-g7m5-r4p3
|
In all Android releases from CAF using the Linux kernel, a buffer overflow vulnerability exists in a camera function.
|
[] | null | null | 7.8
| null | null |
|
CVE-2022-48195
|
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end that does not validate the length of the nonce) could lead to insufficient randomness being used during authentication.
|
[
"cpe:2.3:a:mellium:sasl:0.3.0:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
GHSA-84wp-3676-5rx2
|
In the Linux kernel, the following vulnerability has been resolved:usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabledWhen only PHY1 is used (for example on Odroid-HC4), the regmap init code
uses the usb2 ports when doesn't initialize the PHY1 regmap entry.This fixes:
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000020
...
pc : regmap_update_bits_base+0x40/0xa0
lr : dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8
...
Call trace:
regmap_update_bits_base+0x40/0xa0
dwc3_meson_g12a_usb2_init_phy+0x4c/0xf8
dwc3_meson_g12a_usb2_init+0x7c/0xc8
dwc3_meson_g12a_usb_init+0x28/0x48
dwc3_meson_g12a_probe+0x298/0x540
platform_probe+0x70/0xe0
really_probe+0xf0/0x4d8
driver_probe_device+0xfc/0x168
...
|
[] | null | 5.5
| null | null | null |
|
GHSA-mr3m-f78x-6fhf
|
In the Linux kernel, the following vulnerability has been resolved:net: ll_temac: platform_get_resource replaced by wrong functionThe function platform_get_resource was replaced with
devm_platform_ioremap_resource_byname and is called using 0 as name.This eventually ends up in platform_get_resource_byname in the call
stack, where it causes a null pointer in strcmp.It should have been replaced with devm_platform_ioremap_resource.
|
[] | null | 5.5
| null | null | null |
|
GHSA-hqcq-vffg-mcgx
|
The web console in Cisco Firepower Management Center 6.0.1 allows remote authenticated users to read arbitrary files via crafted parameters, aka Bug ID CSCva30376.
|
[] | null | null | 6.5
| null | null |
|
GHSA-r8pv-5qcr-8mr8
|
Vulnerability in the Oracle Installed Base product of Oracle E-Business Suite (component: APIs). Supported versions that are affected are 12.1.1 - 12.1.3 and 12.2.3 - 12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Installed Base. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Installed Base, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Installed Base accessible data. CVSS 3.1 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N).
|
[] | null | null | null | null | null |
|
GHSA-449v-6j3r-mxhj
|
A vulnerability classified as problematic has been found in HTACG tidy-html5 5.8.0. Affected is the function defaultAlloc of the file src/alloc.c. The manipulation leads to memory leak. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
|
[] | 1.9
| 3.3
| null | null | null |
|
CVE-2018-9039
|
In Octopus Deploy 2.0 and later before 2018.3.7, an authenticated user, with variable edit permissions, can scope some variables to targets greater than their permissions should allow. In other words, they can see machines beyond their team's scoped environments.
|
[
"cpe:2.3:a:octopus:octopus_deploy:*:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4
| null |
|
GHSA-vc7q-8w3h-jx8q
|
OTFCC commit 617837b was discovered to contain a heap buffer overflow via /release-x64/otfccdump+0x6e1fc8.
|
[] | null | 6.5
| null | null | null |
|
GHSA-g63q-86p7-3gmp
|
Use-after-free vulnerability in Adobe Flash Player before 18.0.0.261 and 19.x before 19.0.0.245 on Windows and OS X and before 11.2.202.548 on Linux, Adobe AIR before 19.0.0.241, Adobe AIR SDK before 19.0.0.241, and Adobe AIR SDK & Compiler before 19.0.0.241 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7660, CVE-2015-7661, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, and CVE-2015-8046.
|
[] | null | null | null | null | null |
|
CVE-2016-10523
|
MQTT before 3.4.6 and 4.0.x before 4.0.5 allows specifically crafted MQTT packets to crash the application, making a DoS attack feasible with very little bandwidth.
|
[
"cpe:2.3:a:mqtt-packet_project:mqtt-packet:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5
| 5
| null |
|
CVE-2015-7856
|
OpenNMS has a default password of rtc for the rtc account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials.
|
[
"cpe:2.3:a:opennms:opennms:-:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-r8qq-m2f2-8fxc
|
Multiple PHP remote file inclusion vulnerabilities in Web Server Creator - Web Portal 0.1 allow remote attackers to execute arbitrary PHP code via a URL in the (1) pg parameter to index.php and the (2) path parameter to news/form.php.
|
[] | null | null | null | null | null |
|
CVE-2006-2606
|
Cross-site scripting (XSS) vulnerability in Chatty, possibly 1.0.2 and other versions, allows remote attackers to inject arbitrary web script or HTML via the username.
|
[
"cpe:2.3:a:chatty:chatty:1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-85hc-7q7f-x4j8
|
A heap corruption vulnerability exists in the Advantech TP-3250 printer driver's DrvUI_x64_ADVANTECH.dll (v0.3.9200.20789) when DocumentPropertiesW() is called with a valid dmDriverExtra value but an undersized output buffer. The driver incorrectly assumes the output buffer size matches the input buffer size, leading to invalid memory operations and heap corruption. This vulnerability can cause denial of service through application crashes and potentially lead to code execution in user space. Local access is required to exploit this vulnerability.
|
[] | null | 6.8
| null | null | null |
|
CVE-2025-1208
|
code-projects Wazifa System Profile.php cross site scripting
|
A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /Profile.php. The manipulation of the argument postcontent leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.1
| 3.5
| 3.5
| 4
| null |
CVE-2010-1475
|
Directory traversal vulnerability in the Preventive & Reservation (com_preventive) component 1.0.5 for Joomla! allows remote attackers to read arbitrary files and possibly have unspecified other impact via a .. (dot dot) in the controller parameter to index.php.
|
[
"cpe:2.3:a:ternaria:com_preventive:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2025-9705
|
SourceCodester Water Billing System paybill.php sql injection
|
A weakness has been identified in SourceCodester Water Billing System 1.0. Affected is an unknown function of the file /paybill.php. This manipulation of the argument ID causes sql injection. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be exploited.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2013-1209
|
The encryption functionality in the Virtual Supervisor Module (VSM) to Virtual Ethernet Module (VEM) communication component in Cisco NX-OS on the Nexus 1000V does not properly authenticate VSM/VEM packets, which allows remote attackers to disable packet-level encryption and integrity protection via crafted packets, aka Bug ID CSCud14710.
|
[
"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2024-36427
|
The file-serving function in TARGIT Decision Suite before 24.06.19002 (TARGIT Decision Suite 2024 – June) allows authenticated attackers to read or write to server files via a crafted file request. This can allow code execution via a .xview file.
|
[
"cpe:2.3:a:targit:decision_suite:23.2.15007:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
GHSA-qg93-cpf3-386g
|
It was possible to call filesystem and network references using the local LibreOffice instance using manipulated ODT documents. Attackers could discover restricted network topology and services as well as including local files with read permissions of the open-xchange system user. This was limited to specific file-types, like images. We have improved existing content filters and validators to avoid including any local resources. No publicly available exploits are known.
|
[] | null | 5
| null | null | null |
|
GHSA-jjv4-qpph-8548
|
An issue was discovered in OpenGamePanel OGP-Agent-Linux through 2021-08-14. $HOME/OGP/Cfg/Config.pm has the root password in cleartext.
|
[] | null | null | null | null | null |
|
CVE-2016-8706
|
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
|
[
"cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*"
] | null | null | 8.1
| null | null |
|
GHSA-xj8x-pf8g-x973
|
The Web Post Protection feature in McAfee Host Data Loss Prevention (DLP) 3.x before 3.0.100.10 and 9.x before 9.0.0.422, when HTTP Capture mode is enabled, allows local users to obtain sensitive information from web traffic by reading unspecified files.
|
[] | null | null | null | null | null |
|
CVE-2013-2319
|
FileMaker Pro before 12 and Pro Advanced before 12 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:filemaker:filemaker_pro:*:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:8.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:9.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:9.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:10.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:11.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:11.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:11.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro:11.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:*:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:8.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:8.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:8.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:9.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:9.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:10.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:10.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:10.0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:11.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:11.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:11.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:filemaker:filemaker_pro_advanced:11.0.3.0:*:*:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
CVE-2024-58061
|
wifi: mac80211: prohibit deactivating all links
|
In the Linux kernel, the following vulnerability has been resolved:
wifi: mac80211: prohibit deactivating all links
In the internal API this calls this is a WARN_ON, but that
should remain since internally we want to know about bugs
that may cause this. Prevent deactivating all links in the
debugfs write directly.
|
[] | null | 5.5
| null | null | null |
CVE-2021-0878
|
In PVRSRVBridgeServerSyncGetStatus of the PowerVR kernel driver, a missing size check means there is a possible integer overflow that could allow out-of-bounds heap access. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android SoCAndroid ID: A-270399153
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
GHSA-v522-77pj-3mfp
|
none.php for SunPS iRunbook 2.5.2 allows remote attackers to read arbitrary files via an absolute pathname in the argument.
|
[] | null | null | null | null | null |
|
CVE-2023-4676
|
XSS in Yordams MedasPro
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Yordam MedasPro allows Reflected XSS.This issue affects MedasPro: before 28.
|
[
"cpe:2.3:a:yordam:medaspro:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | null | null |
GHSA-w4f9-wxqm-hcwj
|
Certain NETGEAR devices are affected by an attacker's ability to read arbitrary files. This affects D6220 before 1.0.0.40, D6400 before 1.0.0.74, D7000 before 1.0.1.60, D7800 before 1.0.1.34, D8500 before 1.0.3.39, DGN2200v4 before 1.0.0.94, DGN2200Bv4 before 1.0.0.94, EX6200v2 before 1.0.1.50, EX7000 before 1.0.0.56, JR6150 before 1.0.1.18, R6050 before 1.0.1.10J, R6100 before 1.0.1.16, R6150 before 1.0.1.10, R6220 before 1.1.0.50, R6250 before 1.0.4.12, R6300v2 before 1.0.4.12, R6400 before 1.0.1.24, R6400v2 before 1.0.2.32, R6700 before 1.0.1.26, R6700v2 before 1.2.0.4, R6800 before 1.0.1.10, R6900 before 1.0.1.26, R6900P before 1.0.0.58, R6900v2 before 1.2.0.4, R7000 before 1.0.9.6, R7000P before 1.0.0.58, R7100LG before 1.0.0.32, R7300 before 1.0.0.54, R7500 before 1.0.0.112, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, R7900 before 1.0.1.18, R8000 before 1.0.3.48, R8300 before 1.0.2.104, R8500 before 1.0.2.104, R9000 before 1.0.2.40, WNDR3400v3 before 1.0.1.14, WNDR3700v4 before 1.0.2.96, WNDR4300v1 before 1.0.2.98, WNDR4300v2 before 1.0.0.48, WNDR4500v3 before 1.0.0.48, and WNR3500Lv2 before 1.2.0.44.
|
[] | null | null | null | null | null |
|
GHSA-j26f-vqgh-5h66
|
A cleartext storage of sensitive information in GUI in FortiADC versions 5.4.3 and below, 6.0.0 and below may allow a remote authenticated attacker to retrieve some sensitive information such as users LDAP passwords and RADIUS shared secret by deobfuscating the passwords entry fields.
|
[] | null | null | null | null | null |
|
CVE-2020-6444
|
Uninitialized use in WebRTC in Google Chrome prior to 81.0.4044.92 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*"
] | null | 6.3
| null | 6.8
| null |
|
CVE-2019-20670
|
Certain NETGEAR devices are affected by stored XSS. This affects RBR50 before 2.3.5.30, RBS50 before 2.3.5.30, and RBK50 before 2.3.5.30.
|
[
"cpe:2.3:o:netgear:rbr50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbr50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbs50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbs50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rbk50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rbk50:-:*:*:*:*:*:*:*"
] | null | null | 6
| null | null |
|
GHSA-qq7q-wg3v-qj6m
|
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: Kernel). Supported versions that are affected are 10 and 11.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via DHCP to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Solaris. CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
|
[] | null | null | 3.7
| null | null |
|
CVE-2017-1482
|
IBM Sterling B2B Integrator Standard Edition 5.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 128620.
|
[
"cpe:2.3:a:ibm:sterling_b2b_integrator:5.2:*:*:*:*:*:*:*"
] | null | null | 5.4
| 3.5
| null |
|
GHSA-jw73-g5p2-f7qc
|
An issue was discovered on Wireless IP Camera (P2P) WIFICAM cameras. There is Command Injection in the set_ftp.cgi script via shell metacharacters in the pwd variable, as demonstrated by a set_ftp.cgi?svr=192.168.1.1&port=21&user=ftp URI.
|
[] | null | null | null | null | null |
|
CVE-2024-42065
|
drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init
|
In the Linux kernel, the following vulnerability has been resolved:
drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init
Add an explicit check to ensure that the mgr is not NULL.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
GHSA-rpw6-pjfj-6x6g
|
An issue was discovered in Decentralized Anonymous Payment System (DAPS) through 2019-08-26. It is possible to force wallets to send HTTP requests to arbitrary locations, both on the local network and on the internet. This is a serious threat to user privacy, since it can possibly leak their IP address and the fact that they are using the product. This also affects Dash Core through 0.14.0.3 and Private Instant Verified Transactions (PIVX) through 3.4.0.
|
[] | null | null | null | null | null |
|
GHSA-8898-r2f6-xp4w
|
A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This affects an unknown part of the file /admin/operations/booking.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.5
| 7.3
| null | null | null |
|
GHSA-672h-6x89-76m5
|
Open redirect vulnerability in Flask-Security-Too
|
An open redirect vulnerability in the python package Flask-Security-Too <=5.3.2 allows attackers to redirect unsuspecting users to malicious sites via a crafted URL by abusing the ?next parameter on the /login and /register routes.Flask-Security-Too contains logic to validate that the URL specified within the next parameter is either relative or has the same network location as the requesting URL in an attempt to prevent open redirections. Previously known examples that bypassed the validation logic such as `https://example/login?next=\\\\\\github.com` were patched in version 4.1.0However, examples such as `https://example/login?next=/\\github.com` and `https://example/login?next=\\/github.com` were discovered due to how web browsers normalize slashes in URLs, which makes the package vulnerable through version <=5.3.2Additionally, with Werkzeug >=2.1.0 the autocorrect_location_header configuration was changed to False - which means that location headers in redirects are relative by default. Thus, this issue may impact applications that were previously not impacted, if they are using Werkzeug >=2.1.0 as the WSGI layer.
|
[] | 5.3
| 6.1
| null | null | null |
CVE-2024-53459
|
Sysax Multi Server 6.99 is vulnerable to Cross Site Scripting (XSS) via the /scgi?sid parameter.
|
[
"cpe:2.3:a:sysax:multi_server:6.99:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
This dataset, CIRCL/vulnerability-scores, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))