
CIRCL/vulnerability-severity-classification-distilbert-base-uncased
Text Classification
•
Updated
•
650
•
1
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-fwxc-qvhc-7v9m | SSH 1.2.27 with Kerberos authentication support stores Kerberos tickets in a file which is created in the current directory of the user who is logging in, which could allow remote attackers to sniff the ticket cache if the home directory is installed on NFS. | [] | null | null | null | null |
|
CVE-2017-14448 | An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image-2.0.2. A specially crafted XCF image can cause a heap overflow resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability. | [
"cpe:2.3:a:libsdl:sdl_image:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | null |
|
GHSA-374f-438q-472r | Use after free in Autofill in Google Chrome prior to 128.0.6613.84 allowed a remote attacker who had convinced the user to engage in specific UI interactions to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | [] | null | 8.8 | null | null |
|
CVE-2022-26124 | Improper buffer restrictions in BIOS firmware for some Intel(R) NUC Boards, Intel(R) NUC 8 Boards, Intel(R) NUC 8 Rugged Boards and Intel(R) NUC 8 Rugged Kits before version CHAPLCEL.0059 may allow a privileged user to potentially enable escalation of privilege via local access. | [
"cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkrn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkrn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_rugged_kit_nuc8cchkr:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_8_rugged_board_nuc8cchbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_8_rugged_board_nuc8cchbn:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:nuc_board_nuc8cchb_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:nuc_board_nuc8cchb:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-4vv9-x75r-hv57 | In libxaac there is a possible information disclosure due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-118615501 | [] | null | null | null | null |
|
GHSA-8hrx-2qh8-5m5m | The WP-Members Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpmem_user_memberships shortcode in all versions up to, and including, 3.5.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 6.4 | null | null |
|
GHSA-jc23-xg6p-84pp | When api-config-dir is set to a non-empty value, which is not the case by default, the API in PowerDNS Recursor 4.x up to and including 4.0.6 and 3.x up to and including 3.7.4 allows an authorized user to update the Recursor's ACL by adding and removing netmasks, and to configure forward zones. It was discovered that the new netmask and IP addresses of forwarded zones were not sufficiently validated, allowing an authenticated user to inject new configuration directives into the Recursor's configuration. | [] | null | null | 5.3 | null |
|
CVE-2024-32574 | WordPress WP Simple HTML Sitemap plugin <= 2.8 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ashish Ajani WP Simple HTML Sitemap allows Reflected XSS.This issue affects WP Simple HTML Sitemap: from n/a through 2.8.
| [] | null | 7.1 | null | null |
GHSA-v75x-7vhx-wgjx | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | null | null |
|
GHSA-vh73-q3rw-qx7w | Boundary vulnerable to session hijacking through TLS certificate tampering | Boundary and Boundary Enterprise (“Boundary”) is vulnerable to session hijacking through TLS certificate tampering. An attacker with privileges to enumerate active or pending sessions, obtain a private key pertaining to a session, and obtain a valid trust on first use (TOFU) token may craft a TLS certificate to hijack an active session and gain access to the underlying service or application. | [] | null | 8 | null | null |
GHSA-vrx7-4ch8-xhvx | tnftpd before 20080929 splits large command strings into multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via unknown vectors, probably involving a crafted ftp:// link to a tnftpd server. | [] | null | null | null | null |
|
RHSA-2011:0856 | Red Hat Security Advisory: java-1.6.0-openjdk security update | OpenJDK: integer overflows in JPEGImageReader and font SunLayoutEngine (2D, 7013519) OpenJDK: JVM memory corruption via certain bytecode (HotSpot, 7020373) OpenJDK: Deserialization allows creation of mutable SignedObject (Deserialization, 6618658) OpenJDK: NetworkInterface information leak (Networking, 7013969) OpenJDK: incorrect numeric type conversion in TransformHelper (2D, 7016495) OpenJDK: unprivileged proxy settings change via SOAPConnection (SAAJ, 7013971) OpenJDK: MediaTracker created Component instances with unnecessary privileges (Swing, 7020198) | [
"cpe:/o:redhat:enterprise_linux:6::server"
] | null | null | null | null |
CVE-2010-3250 | Unspecified vulnerability in Google Chrome before 6.0.472.53 allows remote attackers to enumerate the set of installed extensions via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2007-5375 | Interpretation conflict in the Sun Java Virtual Machine (JVM) allows user-assisted remote attackers to conduct a multi-pin DNS rebinding attack and execute arbitrary JavaScript in an intranet context, when an intranet web server has an HTML document that references a "mayscript=true" Java applet through a local relative URI, which may be associated with different IP addresses by the browser and the JVM. | [
"cpe:2.3:a:sun:java_virtual_machine:*:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-2008-7295 | Microsoft Internet Explorer cannot properly restrict modifications to cookies established in HTTPS sessions, which allows man-in-the-middle attackers to overwrite or delete arbitrary cookies via a Set-Cookie header in an HTTP response, related to lack of the HTTP Strict Transport Security (HSTS) includeSubDomains feature, aka a "cookie forcing" issue. | [
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
] | null | null | null | 5.8 |
|
CVE-2008-7299 | IBM Tivoli Federated Identity Manager (TFIM) 6.2.0 before 6.2.0.2 uses an incomplete SAML 1.x browser-artifact, which allows remote OpenID providers to spoof assertions via vectors related to the Issuer field. | [
"cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_federated_identity_manager:6.2.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-hh35-3vw8-785j | The gravity-forms-sms-notifications plugin before 2.4.0 for WordPress has XSS. | [] | null | null | 6.1 | null |
|
CVE-2025-25114 | WordPress User Role plugin <= 1.0 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ehabstar User Role allows Reflected XSS. This issue affects User Role: from n/a through 1.0. | [] | null | 7.1 | null | null |
CVE-2021-41126 | Deleted Admin Can Sign In to Admin Interface | October is a Content Management System (CMS) and web platform built on the the Laravel PHP Framework. In affected versions administrator accounts which had previously been deleted may still be able to sign in to the backend using October CMS v2.0. The issue has been patched in v2.1.12 of the october/october package. There are no workarounds for this issue and all users should update. | [
"cpe:2.3:a:octobercms:october:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
GHSA-h5q8-x55p-gmfg | SQL injection vulnerability in the Business Rules Framework (CRM-BF-BRF) in SAP CRM allows attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2097534. | [] | null | null | null | null |
|
CVE-2014-9392 | Cross-site request forgery (CSRF) vulnerability in the PictoBrowser (pictobrowser-gallery) plugin 0.3.1 and earlier for WordPress allows remote attackers to hijack the authentication of administrators for requests that conduct cross-site scripting (XSS) attacks via the pictoBrowserFlickrUser parameter in the options-page.php page to wp-admin/options-general.php. | [
"cpe:2.3:a:pictobrowser_project:pictobrowser:*:*:*:*:*:wordpress:*:*"
] | null | null | null | 6.8 |
|
CVE-2012-3197 | Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Replication. | [
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:11.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
CVE-2024-27775 | SysAid - CWE-918: Server-Side Request Forgery (SSRF) |
SysAid before version 23.2.14 b18 - CWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user's NTLMv2 hash
| [] | null | 7.2 | null | null |
CVE-2022-48336 | Widevine Trusted Application (TA) 5.0.0 through 7.1.1 has a PRDiagParseAndStoreData integer overflow and resultant buffer overflow. | [
"cpe:2.3:a:widevine:trusted_application:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2020-3634 | u'Multiple Read overflows issue due to improper length check while decoding Generic NAS transport/EMM info' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QCS610, QM215, Rennell, SA415M, Saipan, SC7180, SDA660, SDA845, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 | [
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9645_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9645:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 9.4 |
|
RHSA-2021:4179 | Red Hat Security Advisory: file-roller security update | file-roller: directory traversal via directory symlink pointing outside of the target directory (incomplete fix for CVE-2020-11736) | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 3.9 | null | null |
GHSA-cxc6-7754-2grf | A vulnerability, which was classified as problematic, was found in GPAC 2.3-DEV-rev35-gbbca86917-master. This affects the function gf_m2ts_process_sdt of the file media_tools/mpegts.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The identifier VDB-223293 was assigned to this vulnerability. | [] | null | 7.8 | null | null |
|
GHSA-m95x-799j-2j8h | In Live555 before 2019.02.27, malformed headers lead to invalid memory access in the parseAuthorizationHeader function. | [] | null | 9.8 | null | null |
|
CVE-2017-11013 | In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, countOffset (in function UnpackCore) is increased for each loop, while there is no boundary check against "pIe->arraybound". | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | 9.3 |
|
CVE-2019-18389 | A heap-based buffer overflow in the vrend_renderer_transfer_write_iov function in vrend_renderer.c in virglrenderer through 0.8.0 allows guest OS users to cause a denial of service, or QEMU guest-to-host escape and code execution, via VIRGL_CCMD_RESOURCE_INLINE_WRITE commands. | [
"cpe:2.3:a:virglrenderer_project:virglrenderer:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | 4.6 |
|
CVE-2024-47664 | spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware | In the Linux kernel, the following vulnerability has been resolved:
spi: hisi-kunpeng: Add verification for the max_frequency provided by the firmware
If the value of max_speed_hz is 0, it may cause a division by zero
error in hisi_calc_effective_speed().
The value of max_speed_hz is provided by firmware.
Firmware is generally considered as a trusted domain. However, as
division by zero errors can cause system failure, for defense measure,
the value of max_speed is validated here. So 0 is regarded as invalid
and an error code is returned. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-5jf7-29p2-6rfv | SQL injection vulnerability in default.asp in ATCOM Netvolution 1.0 ASP allows remote attackers to execute arbitrary SQL commands via the bpe_nid parameter. | [] | null | null | null | null |
|
GHSA-w689-5mxw-fp2q | Missing Authorization vulnerability in Frank P. Walentynowicz FPW Category Thumbnails allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FPW Category Thumbnails: from n/a through 1.9.5. | [] | null | 6.3 | null | null |
|
CVE-2018-11936 | Index of array is processed in a wrong way inside a while loop and result in invalid index (-1 or something else) leads to out of bound memory access. in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in MDM9206, MDM9607, MDM9640, MDM9650, MSM8996AU, QCA6174A, QCA6574, QCA6574AU, QCA6584, QCA6584AU, QCA9377, QCA9379, QCA9886, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 820, SD 820A, SD 835, SDX20, SDX24, Snapdragon_High_Med_2016 | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9379_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9379:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9886_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9886:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2003-0071 | The DEC UDK processing feature in the xterm terminal emulator in XFree86 4.2.99.4 and earlier allows attackers to cause a denial of service via a certain character escape sequence that causes the terminal to enter a tight loop. | [
"cpe:2.3:a:xfree86_project:x11r6:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xfree86_project:x11r6:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:xfree86_project:x11r6:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:xfree86_project:x11r6:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xfree86_project:x11r6:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:xfree86_project:x11r6:4.2.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2023-38409 | An issue was discovered in set_con2fb_map in drivers/video/fbdev/core/fbcon.c in the Linux kernel before 6.2.12. Because an assignment occurs only for the first vc, the fbcon_registered_fb and fbcon_display arrays can be desynchronized in fbcon_mode_deleted (the con2fb_map points at the old fb_info). | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2018:1345 | Red Hat Security Advisory: kernel security update | Kernel: KVM: error in exception handling leads to wrong debug stack value Kernel: error in exception handling leads to DoS kernel: ptrace() incorrect error handling leads to corruption and DoS | [
"cpe:/o:redhat:rhel_eus:7.4::computenode",
"cpe:/o:redhat:rhel_eus:7.4::server"
] | null | null | 7.8 | null |
GHSA-8hmh-xv5p-r2p5 | A denial of service vulnerability in Bionic DNS could enable a remote attacker to use a specially crafted network packet to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32322088. | [] | null | null | 7.5 | null |
|
GHSA-xv6q-xxx5-mmp4 | In ProtocolEmbmsSaiListAdapter::Init() of protocolembmsadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation. | [] | null | 5.5 | null | null |
|
GHSA-gf9p-76p3-4hqw | The Colibri Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via image alt data parameter in all versions up to, and including, 1.0.262 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 4.4 | null | null |
|
CVE-2023-26392 | ZDI-CAN-20235: Adobe Substance 3D Stager USD File Parsing Use-After-Free Remote Code Execution Vulnerability | Adobe Substance 3D Stager version 2.0.1 (and earlier) is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
GHSA-w4cj-85p2-w8wp | Dell Unity, versions prior to 5.4, contains SQL Injection vulnerability. An authenticated attacker could potentially exploit this vulnerability, leading to exposure of sensitive information. | [] | null | 4.5 | null | null |
|
CVE-2016-2196 | Heap-based buffer overflow in the P-521 reduction function in Botan 1.11.x before 1.11.27 allows remote attackers to cause a denial of service (memory overwrite and crash) or execute arbitrary code via unspecified vectors. | [
"cpe:2.3:a:botan_project:botan:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.16:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.17:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.18:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.19:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.20:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.21:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.22:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.23:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.24:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.25:*:*:*:*:*:*:*",
"cpe:2.3:a:botan_project:botan:1.11.26:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
GHSA-88jf-cpwr-657f | A buffer overflow vulnerability in Disk Sorter Enterprise 9.5.12 and earlier allows remote attackers to execute arbitrary code via a GET request. | [] | null | null | 9.8 | null |
|
GHSA-672r-3qpf-682q | The Microsoft EXE file parser in eSafe 7.0.17.0 and Prevx 3.0 allows remote attackers to bypass malware detection via an EXE file with a modified value in any of several e_ fields. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different EXE parser implementations. | [] | null | null | null | null |
|
GHSA-p9xp-xghp-gqvp | bbPress stored Cross-Site Scripting (XSS) vulnerability in the Forum creation section | The bbPress plugin through 2.6.4 for WordPress has stored XSS in the Forum creation section, resulting in JavaScript execution at wp-admin/edit.php?post_type=forum (aka the Forum listing page) for all users. An administrator can exploit this at the wp-admin/post.php?action=edit URI. | [] | null | 4.8 | null | null |
CVE-2022-43422 | Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier implements an agent/controller message that does not limit where it can be executed, allowing attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process. | [
"cpe:2.3:a:jenkins:compuware_topaz_utilities:*:*:*:*:*:jenkins:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*"
] | null | 5.3 | null | null |
|
CVE-2024-5726 | Timeline Event History <= 3.1 - Authenticated (Contributor+) PHP Object Injection | The Timeline Event History plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1 via deserialization of untrusted input 'timelines-data' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. | [
"cpe:2.3:a:wpdiscover:timeline_event_history:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | null |
CVE-2019-9531 | The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to a port that can run AT commands | The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to port 5454. This could allow an unauthenticated, remote attacker to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that provide unauthenticated, shell-like access to the device. | [
"cpe:2.3:o:cobham:explorer_710_firmware:1.07:*:*:*:*:*:*:*",
"cpe:2.3:h:cobham:explorer_710:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
GHSA-m4w4-6mfj-fqh8 | A vulnerability, which was classified as critical, has been found in 1000 Projects Daily College Class Work Report Book 1.0. This issue affects some unknown processing of the file /admin_info.php. The manipulation of the argument batch leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 6.9 | 7.3 | null | null |
|
GHSA-x4pg-475r-rqf2 | The person-to-person secure messaging feature in Sticker before 3.1.0 beta 2 allows remote attackers to post messages to unauthorized private groups by using the group's public encryption key. | [] | null | null | null | null |
|
CVE-2025-37916 | pds_core: remove write-after-free of client_id | In the Linux kernel, the following vulnerability has been resolved:
pds_core: remove write-after-free of client_id
A use-after-free error popped up in stress testing:
[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]
[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):
[Mon Apr 21 21:21:33 2025] pdsc_auxbus_dev_del+0xef/0x160 [pds_core]
[Mon Apr 21 21:21:33 2025] pdsc_remove+0xc0/0x1b0 [pds_core]
[Mon Apr 21 21:21:33 2025] pci_device_remove+0x24/0x70
[Mon Apr 21 21:21:33 2025] device_release_driver_internal+0x11f/0x180
[Mon Apr 21 21:21:33 2025] driver_detach+0x45/0x80
[Mon Apr 21 21:21:33 2025] bus_remove_driver+0x83/0xe0
[Mon Apr 21 21:21:33 2025] pci_unregister_driver+0x1a/0x80
The actual device uninit usually happens on a separate thread
scheduled after this code runs, but there is no guarantee of order
of thread execution, so this could be a problem. There's no
actual need to clear the client_id at this point, so simply
remove the offending code. | [] | null | null | null | null |
GHSA-h5rw-8p92-pmrf | Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371-perf, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | 3.7 | null | null |
|
GHSA-x3x8-r6pj-f993 | Windows Admin Center Security Feature Bypass Vulnerability | [] | null | 4.3 | null | null |
|
GHSA-xrpr-pc4j-r3pr | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Contempoinc Real Estate 7 WordPress theme <= 3.3.1 versions. | [] | null | 6.1 | null | null |
|
CVE-2022-48451 | In bluetooth service, there is a possible out of bounds write due to race condition. This could lead to local denial of service with System execution privileges needed. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*"
] | null | 4.1 | null | null |
|
GHSA-h4h9-pxfw-g65r | Heimdal, as used in Apple OS X before 10.11, allows remote attackers to conduct replay attacks against the SMB server via packet data that represents a Kerberos authenticated request. | [] | null | null | null | null |
|
ICSA-17-264-01 | Schneider Electric InduSoft Web Studio, InTouch Machine Edition | InduSoft Web Studio provides the capability for an HMI client to trigger script execution on the server for the purposes of performing customized calculations or actions. A remote malicious entity could bypass the server authentication and trigger the execution of an arbitrary command. The command is executed under high privileges and could lead to a complete compromise of the server.CVE-2017-13997 has been assigned to this vulnerability. A CVSS v3 base score of 9.8 has been assigned; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). | [] | null | null | 9.8 | null |
GHSA-3w5w-2v95-54r9 | Draytek Vigor 3910 v4.3.2.6 was discovered to contain a buffer overflow in the ipaddrmsk%d parameter at v2x00.cgi. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input. | [] | null | 7.5 | null | null |
|
CVE-2021-32797 | JupyterLab: XSS due to lack of sanitization of the action attribute of an html <form> | JupyterLab is a user interface for Project Jupyter which will eventually replace the classic Jupyter Notebook. In affected versions untrusted notebook can execute code on load. In particular JupyterLab doesn’t sanitize the action attribute of html `<form>`. Using this it is possible to trigger the form validation outside of the form itself. This is a remote code execution, but requires user action to open a notebook. | [
"cpe:2.3:a:jupyter:jupyterlab:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
PYSEC-2014-4 | null | The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL to be generated. | [] | null | null | null | null |
RHSA-2024:4501 | Red Hat Security Advisory: firefox security update | Mozilla: Race condition in permission assignment Mozilla: Memory corruption in thread creation Mozilla: Memory safety bugs fixed in Firefox 128, Firefox ESR 115.13, and Thunderbird 115.13 | [
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
] | null | 7.5 | null | null |
CVE-2006-2019 | Apple Mac OS X Safari 2.0.3, 1.3.1, and possibly other versions allows remote attackers to cause a denial of service (CPU consumption and crash) via a TD element with a large number in the rowspan attribute. | [
"cpe:2.3:a:apple:safari:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:2.0.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2000-1186 | Buffer overflow in phf CGI program allows remote attackers to execute arbitrary commands by specifying a large number of arguments and including a long MIME header. | [
"cpe:2.3:a:phf:phf:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-269m-c36j-r834 | Infinispan vulnerable to Insertion of Sensitive Information into Log File | A flaw was found in Infinispan, when using JGroups with JDBC_PING. This issue occurs when an application inadvertently exposes sensitive information, such as configuration details or credentials, through logging mechanisms. This exposure can lead to unauthorized access and exploitation by malicious actors. | [] | null | 5.5 | null | null |
GHSA-29f2-q62m-qxwc | An issue discovered in kodbox through 1.43 allows attackers to arbitrarily add Administrator accounts via crafted GET request. | [] | null | 9.8 | null | null |
|
CVE-2021-25762 | In JetBrains Ktor before 1.4.3, HTTP Request Smuggling was possible. | [
"cpe:2.3:a:jetbrains:ktor:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2011-2128 | Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2114, CVE-2011-2117, CVE-2011-2124, and CVE-2011-2127. | [
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2017-3736 | There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen. | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
GHSA-r386-wm9g-qwpx | Buffer overflow in Adobe Flash Player before 10.3.183.29 and 11.x before 11.4.402.287 on Windows and Mac OS X, before 10.3.183.29 and 11.x before 11.2.202.243 on Linux, before 11.1.111.19 on Android 2.x and 3.x, and before 11.1.115.20 on Android 4.x; Adobe AIR before 3.4.0.2710; and Adobe AIR SDK before 3.4.0.2710 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than other Flash Player buffer overflow CVEs listed in APSB12-22. | [] | null | null | null | null |
|
CVE-2024-7896 | Tosei Online Store Management System ネット店舗管理システム p1_ftpserver.php command injection | A vulnerability was found in Tosei Online Store Management System ネット店舗管理システム 4.02/4.03/4.04. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cgi-bin/p1_ftpserver.php. The manipulation of the argument adr_txt leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:tosei:online_store_management_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tosei-corporation:online_store_management_system:4.0.4:*:*:*:*:*:*:*"
] | 5.3 | 6.3 | 6.3 | 6.5 |
CVE-2002-0305 | Zero One Tech (ZOT) P100s print server does not properly disable the SNMP service or change the default password, which could leave the server open to attack without the administrator's knowledge. | [
"cpe:2.3:h:zero_one_tech:p100s:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2020-27778 | A flaw was found in Poppler in the way certain PDF files were converted into HTML. A remote attacker could exploit this flaw by providing a malicious PDF file that, when processed by the 'pdftohtml' program, would crash the application causing a denial of service. | [
"cpe:2.3:a:freedesktop:poppler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2024-46606 | A cross-site scripting (XSS) vulnerability in the component /admin.php?page=photo of Piwigo v14.5.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Description field. | [
"cpe:2.3:a:piwigo:piwigo:14.5.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null |
|
GHSA-2wfp-xpjg-9f8f | Rejected reason: Not used | [] | null | null | null | null |
|
GHSA-wgv2-5mf7-qgw9 | Cross-site scripting (XSS) vulnerability in the httpError method in sapphire/core/control/RequestHandler.php in SilverStripe 2.3.x before 2.3.10 and 2.4.x before 2.4.4, when custom error handling is not used, allows remote attackers to inject arbitrary web script or HTML via "missing URL actions." | [] | null | null | null | null |
|
CVE-2017-0207 | Microsoft Outlook for Mac 2011 allows remote attackers to spoof web content via a crafted email with specific HTML tags, aka "Microsoft Browser Spoofing Vulnerability." | [
"cpe:2.3:a:microsoft:outlook:2011:*:*:*:*:mac_os_x:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2009-2488 | Unspecified vulnerability in the NFSv4 module in the kernel in Sun Solaris 10, and OpenSolaris snv_102 through snv_119, allows local users to cause a denial of service (client panic) via vectors involving "file operations." | [
"cpe:2.3:o:sun:opensolaris:snv_102:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_102:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_103:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_104:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_105:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_106:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_107:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_108:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_109:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_110:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_111:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_111:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_112:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_112:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_113:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_113:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_114:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_114:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_115:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_115:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_116:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_116:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_117:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_117:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_118:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_118:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_119:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:opensolaris:snv_119:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:sparc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:10:*:x86:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2022-38184 | There is an improper access control vulnerability in Portal for ArcGIS versions 10.8.1 | There is an improper access control vulnerability in Portal for ArcGIS versions 10.8.1 and below which could allow a remote, unauthenticated attacker to access an API that may induce Esri Portal for ArcGIS to read arbitrary URLs. | [
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-6gq3-77jq-hrr5 | A potential security vulnerability has been identified in HPE Device Entitlement Gateway (DEG) v3.2.4, v3.3 and v3.3.1. The vulnerability could be remotely exploited to allow local SQL injection and elevation of privilege. | [] | null | null | 8.8 | null |
|
GHSA-h8v3-qm46-h5jf | In Splunk Enterprise versions below 9.0.5, 8.2.11, and 8.1.14, and Splunk Cloud Platform versions below 9.0.2303.100, an attacker can exploit a vulnerability in the {{dump}} SPL command to cause a denial of service by crashing the Splunk daemon. | [] | null | 6.5 | null | null |
|
CVE-2006-1322 | Novell Netware NWFTPD 5.06.05 allows remote attackers to cause a denial of service (ABEND) via an MDTM command that uses a long path for the target file, possibly due to a buffer overflow. | [
"cpe:2.3:a:novell:netware_ftp_server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:netware_ftp_server:5.07:*:*:*:*:*:*:*",
"cpe:2.3:o:novell:netware:6.5:sp4:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-v7xw-65g3-rxf5 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects RAX200 before 1.0.4.120, RAX75 before 1.0.4.120, RAX80 before 1.0.4.120, RBK852 before 3.2.17.12, RBR850 before 3.2.17.12, and RBS850 before 3.2.17.12. | [] | null | null | null | null |
|
CVE-2019-1221 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.6 |
|
GHSA-2rpf-w4m3-hpq2 | Cross-site scripting (XSS) vulnerability in Wolf CMS 0.8.3.1 via the page editing feature, as demonstrated by /?/admin/page/edit/3. | [] | null | null | 4.8 | null |
|
GHSA-h9cr-cxm7-hxwf | This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_dashboard.php. When parsing the service_stop parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9726. | [] | null | null | null | null |
|
CVE-2023-49394 | Zentao versions 4.1.3 and before has a URL redirect vulnerability, which prevents the system from functioning properly. | [
"cpe:2.3:a:easycorp:zentao:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
CVE-2021-34850 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.0.0.49893. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-14529. | [
"cpe:2.3:a:foxit:pdf_reader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_editor:11.0.0.49893:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 7.8 | null |
|
RHSA-2023:0756 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.9 XP 4.0.0.GA Security release | okhttp: information disclosure via improperly used cryptographic function libksba: integer overflow to code execution | [
"cpe:/a:redhat:jbosseapxp"
] | null | 8.6 | null | null |
GHSA-7gqq-55wr-j9w3 | Dell OpenManage Server Administrator, versions 11.0.1.0 and prior, contains a Local Privilege Escalation vulnerability via XSL Hijacking. A local low-privileged malicious user could potentially exploit this vulnerability and escalate their privilege to the admin user and gain full control of the machine. Exploitation may lead to a complete system compromise. | [] | null | 7.3 | null | null |
|
GHSA-7h2j-3ff7-3r95 | Cross-site scripting (XSS) vulnerability in mysql-lists 1.2 and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2023-29064 | Hardcoded Secrets | The FACSChorus software contains sensitive information stored in plaintext. A threat actor could gain hardcoded secrets used by the application, which include tokens and passwords for administrative accounts. | [
"cpe:2.3:a:bd:facschorus:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bd:facschorus:5.1:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_tower_g9:-:*:*:*:*:*:*:*",
"cpe:2.3:a:bd:facschorus:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bd:facschorus:3.1:*:*:*:*:*:*:*",
"cpe:2.3:h:hp:hp_z2_tower_g5:-:*:*:*:*:*:*:*"
] | null | 4.1 | null | null |
CVE-2023-39933 | Insufficient verification vulnerability exists in Broadcast Mail CGI (pmc.exe) included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, a user who can upload files through the product may execute an arbitrary executable file with the web server's execution privilege. | [] | null | 4.3 | null | null |
|
RHSA-2023:5194 | Red Hat Security Advisory: frr security update | frr: Incorrect handling of a error in parsing of an invalid section of a BGP update can de-peer a router | [
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.5 | null | null |
CVE-2007-5034 | ELinks before 0.11.3, when sending a POST request for an https URL, appends the body and content headers of the POST request to the CONNECT request in cleartext, which allows remote attackers to sniff sensitive data that would have been protected by TLS. NOTE: this issue only occurs when a proxy is defined for https. | [
"cpe:2.3:a:elinks:elinks:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2004-1934 | PHP remote file inclusion vulnerability in affich.php in Gemitel 3.50 allows remote attackers to execute arbitrary PHP code via the base parameter. | [
"cpe:2.3:a:isesam:gemitel:3.50:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2009-0200 | Integer underflow in OpenOffice.org (OOo) before 3.1.1 and StarOffice/StarSuite 7, 8, and 9 might allow remote attackers to execute arbitrary code via crafted records in the document table of a Word document, leading to a heap-based buffer overflow. | [
"cpe:2.3:a:openoffice:openoffice.org:*:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0-ru:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1:rc3:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.84:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.87:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.91:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.93:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.95:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.100:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.104:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.113:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.118:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.122:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.130:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.156:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:1.9.680:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.2:rc1:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.2:rc2:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.1.154:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:2.4.1:*:64-bit:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:605b:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:609:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:614:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:619:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:627:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:633:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:638:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:638c:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:641b:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:641d:*:*:*:*:*:*:*",
"cpe:2.3:a:openoffice:openoffice.org:643:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-p7p8-8m5p-c79x | A vulnerability has been found in PHPGurukul Small CRM 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/edit-user.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | null | null |
|
GHSA-q8q6-vq5m-jhx5 | The perf_callchain_user_64 function in arch/powerpc/perf/callchain.c in the Linux kernel before 4.0.2 on ppc64 platforms allows local users to cause a denial of service (infinite loop) via a deep 64-bit userspace backtrace. | [] | null | null | null | null |
|
GHSA-r69h-6c4g-63xf | Cleartext Transmission of Sensitive Information in Jenkins Configuration as Code Plugin | Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form. | [] | null | 4.9 | null | null |
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))