CIRCL/vulnerability-severity-classification-roberta-base
Text Classification
•
0.1B
•
Updated
•
613
•
5
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-6c46-vqrp-wg6q
|
Yahoo! Messenger for WAP permits saving messages that contain JavaScript, which allows user-assisted remote attackers to inject arbitrary web script or HTML via a URL at the online service.
|
[] | null | null | null | null | null |
|
CVE-2025-36924
|
In ss_DecodeLcsAssistDataReqMsg(void) of ss_LcsManagement.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 8
| null | null | null |
|
GHSA-8xr4-8v2f-pqrx
|
An improper access control vulnerability in GitLab CE/EE affecting all versions from 17.4 prior to 17.8.6, 17.9 prior to 17.9.3, and 17.10 prior to 17.10.1 allows a user who was an instance admin before but has since been downgraded to a regular user to continue to maintain elevated privileges to groups and projects.
|
[] | null | 7.5
| null | null | null |
|
RHSA-2025:7893
|
Red Hat Security Advisory: grafana security update
|
grafana: Cross-site Scripting (XSS) in Grafana via Custom Frontend Plugins and Open Redirect
|
[
"cpe:/a:redhat:enterprise_linux:9::appstream"
] | null | 7.6
| null | null | null |
GHSA-qhmx-5r65-gg8m
|
ImageMagick 7.0.8-11 Q16 has a heap-based buffer over-read in the coders/psd.c ParseImageResourceBlocks function.
|
[] | null | null | 8.8
| null | null |
|
CVE-2011-1286
|
Google V8, as used in Google Chrome before 10.0.648.127, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger incorrect access to memory.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-39jx-jr53-979c
|
An issue in the component luaG_runerror of Lua v5.4.4 and below leads to a heap-buffer overflow when a recursive error occurs.
|
[] | null | 7.5
| null | null | null |
|
CVE-2023-46408
|
TOTOLINK X6000R v9.4.0cu.652_B20230116 was discovered to contain a command execution vulnerability via the sub_ The 41DD80 function.
|
[
"cpe:2.3:o:totolink:x6000r_firmware:9.4.0cu.652_b20230116:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x6000r:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
ICSA-17-222-01
|
SIMPlight SCADA Software
|
The uncontrolled search path element vulnerability has been identified, which may allow an attacker to place a malicious DLL file within the search path resulting in execution of arbitrary code.CVE-2017-9661 has been assigned to this vulnerability. A CVSS v3 base score of 7.0 has been assigned; the CVSS vector string is (AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).
|
[] | null | null | 7
| null | null |
GHSA-5pvw-cg3j-8fx4
|
The Appzend theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘progressbarLayout’ parameter in all versions up to, and including, 1.2.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4
| null | null | null |
|
GHSA-pxq6-w56g-vh78
|
The Christmas Greetings plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the code parameter in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
|
[] | null | 6.1
| null | null | null |
|
CVE-2010-4979
|
SQL injection vulnerability in image/view.php in CANDID allows remote attackers to execute arbitrary SQL commands via the image_id parameter.
|
[
"cpe:2.3:a:nicholas_berry:candid:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2002-1180
|
A typographical error in the script source access permissions for Internet Information Server (IIS) 5.0 does not properly exclude .COM files, which allows attackers with only write permissions to upload malicious .COM files, aka "Script Source Access Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-fv85-4x5j-8vfr
|
Multiple unspecified vulnerabilities in YaCy before 0.61 have unknown impact and attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2015-0662
|
Cisco AnyConnect Secure Mobility Client 4.0(.00051) and earlier allows local users to gain privileges via crafted IPC messages that trigger use of root privileges for a software-package installation, aka Bug ID CSCus79385.
|
[
"cpe:2.3:a:cisco:anyconnect_secure_mobility_client:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2
| null |
|
CVE-2024-54426
|
WordPress LeaderBoard Plugin plugin <= 1.2.4 - CSRF to Stored Cross-Site Scripting vulnerability
|
Cross-Site Request Forgery (CSRF) vulnerability in Andy Fradelakis LeaderBoard Plugin allows Stored XSS.This issue affects LeaderBoard Plugin: from n/a through 1.2.4.
|
[] | null | 7.1
| null | null | null |
CVE-2025-24810
|
Cross-site scripting vulnerability exists in Simple Image Sizes 3.2.3 and earlier. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege and accessing the settings screen.
|
[] | null | null | 4.8
| null | null |
|
CVE-2019-14553
|
Improper authentication in EDK II may allow a privileged user to potentially enable information disclosure via network access.
|
[
"cpe:2.3:a:tianocore:edk2:-:*:*:*:*:*:*:*"
] | null | 4.9
| null | 4
| null |
|
CVE-2019-14313
|
A SQL injection vulnerability exists in the 10Web Photo Gallery plugin before 1.5.31 for WordPress. Successful exploitation of this vulnerability would allow a remote attacker to execute arbitrary SQL commands on the affected system via filemanager/model.php.
|
[
"cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*"
] | null | 9.8
| null | 10
| null |
|
CVE-2014-2430
|
Unspecified vulnerability in Oracle MySQL Server 5.5.36 and earlier and 5.6.16 and earlier allows remote authenticated users to affect availability via unknown vectors related to Performance Schema.
|
[
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5
| null |
|
GHSA-w3c4-7mf3-vq4q
|
In various functions of DrmPlugin.cpp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-176444154
|
[] | null | null | null | null | null |
|
CVE-2025-7409
|
code-projects Mobile Shop LoginAsAdmin.php sql injection
|
A vulnerability was found in code-projects Mobile Shop 1.0 and classified as critical. This issue affects some unknown processing of the file /LoginAsAdmin.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| 7.3
| 7.5
| null |
CVE-2020-7837
|
An issue was discovered in ML Report Program. There is a stack-based buffer overflow in function sub_41EAF0 at MLReportDeamon.exe. The function will call vsprintf without checking the length of strings in parameters given by attacker. And it finally leads to a stack-based buffer overflow via access to crafted web page. This issue affects: Infraware ML Report 2.19.312.0000.
|
[
"cpe:2.3:a:polarisoffice:polaris_ml_report:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
|
GHSA-63cq-cj6g-qfr2
|
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
|
[] | null | 6.6
| null | null | null |
|
GHSA-mq2g-3crj-3phw
|
Adobe Experience Manager versions 6.5, and 6.4 have an authentication bypass vulnerability. Successful exploitation could lead to remote code execution.
|
[] | null | null | null | null | null |
|
GHSA-g5wq-3r27-v2x7
|
In onCreate of EmergencyCallbackModeExitDialog.java, there is a possible way to crash the emergency callback mode due to a missing null check. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | 5.5
| null | null | null |
|
cisco-sa-20190109-esa-dos
|
Cisco Email Security Appliance Memory Corruption Denial of Service Vulnerability
|
A vulnerability in the Secure/Multipurpose Internet Mail Extensions (S/MIME) Decryption and Verification or S/MIME Public Key Harvesting features of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to cause an affected device to corrupt system memory. A successful exploit could cause the filtering process to unexpectedly reload, resulting in a denial of service (DoS) condition on the device.
The vulnerability is due to improper input validation of S/MIME-signed emails. An attacker could exploit this vulnerability by sending a malicious S/MIME-signed email through a targeted device. If Decryption and Verification or Public Key Harvesting is configured, the filtering process could crash due to memory corruption and restart, resulting in a DoS condition. The software could then resume processing the same S/MIME-signed email, causing the filtering process to crash and restart again. A successful exploit could allow the attacker to cause a permanent DoS condition. This vulnerability may require manual intervention to recover the ESA.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | null | 8.6
| null | null |
CVE-2022-31054
|
Uses of deprecated API can be used to cause DoS in user-facing endpoints in Argo Events
|
Argo Events is an event-driven workflow automation framework for Kubernetes. Prior to version 1.7.1, several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service. A patch for this vulnerability has been released in Argo Events version 1.7.1.
|
[
"cpe:2.3:a:argo_events_project:argo_events:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
GHSA-f82h-5m28-cr2p
|
The WP Cookie Consent ( for GDPR, CCPA & ePrivacy ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘Client-IP’ header in all versions up to, and including, 3.2.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 7.2
| null | null | null |
|
GHSA-72mf-gf7v-562w
|
Race in v8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
|
[] | null | 7.5
| null | null | null |
|
CVE-2025-45890
|
Directory Traversal vulnerability in novel plus before v.5.1.0 allows a remote attacker to execute arbitrary code via the filePath parameter
|
[] | null | 9.8
| null | null | null |
|
ICSA-19-346-03
|
Omron PLC CJ, CS and NJ Series
|
The software does not implement sufficient measures to prevent multiple failed authentication attempts within in a short time frame, making it more susceptible to brute force attacks. CVE-2019-18261 has been assigned to this vulnerability. A CVSS v3 base score of 6.5 has been calculated; the CVSS vector string is (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
|
[] | null | null | 6.5
| null | null |
CVE-2021-47446
|
drm/msm/a4xx: fix error handling in a4xx_gpu_init()
|
In the Linux kernel, the following vulnerability has been resolved:
drm/msm/a4xx: fix error handling in a4xx_gpu_init()
This code returns 1 on error instead of a negative error. It leads to
an Oops in the caller. A second problem is that the check for
"if (ret != -ENODATA)" cannot be true because "ret" is set to 1.
|
[] | null | 5.5
| null | null | null |
CVE-2023-22332
|
Information disclosure vulnerability exists in Pgpool-II 4.4.0 to 4.4.1 (4.4 series), 4.3.0 to 4.3.4 (4.3 series), 4.2.0 to 4.2.11 (4.2 series), 4.1.0 to 4.1.14 (4.1 series), 4.0.0 to 4.0.21 (4.0 series), All versions of 3.7 series, All versions of 3.6 series, All versions of 3.5 series, All versions of 3.4 series, and All versions of 3.3 series. A specific database user's authentication information may be obtained by another database user. As a result, the information stored in the database may be altered and/or database may be suspended by a remote attacker who successfully logged in the product with the obtained credentials.
|
[
"cpe:2.3:a:pgpool:pgpool-ii:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | null | null |
|
CVE-2019-8693
|
A validation issue was addressed with improved input sanitization. This issue is fixed in macOS Mojave 10.14.6. An application may be able to read restricted memory.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | 5.5
| null | 4.3
| null |
|
CVE-2021-44206
|
Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service
|
Local privilege escalation due to DLL hijacking vulnerability in Acronis Media Builder service. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287
|
[
"cpe:2.3:a:acronis:true_image:2021:-:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_1:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_2:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_3:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:true_image:2021:update_4:*:*:*:windows:*:*",
"cpe:2.3:a:acronis:cyber_protect_home_office:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.3
| null | 4.4
| null |
CVE-2021-31930
|
Persistent cross-site scripting (XSS) in the web interface of Concerto through 2.3.6 allows an unauthenticated remote attacker to introduce arbitrary JavaScript by injecting an XSS payload into the First Name or Last Name parameter upon registration. When a privileged user attempts to delete the account, the XSS payload will be executed.
|
[
"cpe:2.3:a:concerto-signage:concerto:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | 4.3
| null |
|
CVE-2024-1275
|
Vulnerability in Baxter Welch Allyn Connex Spot Monitor
|
Use of Default Cryptographic Key vulnerability in Baxter Welch Allyn Connex Spot Monitor may allow Configuration/Environment Manipulation.This issue affects Welch Allyn Connex Spot Monitor in all versions prior to 1.52.
|
[
"cpe:2.3:o:baxter:welch_allyn_connex_spot_monitor:*:*:*:*:*:*:*:*"
] | 9.1
| null | null | null | null |
CVE-2023-53640
|
ASoC: lpass: Fix for KASAN use_after_free out of bounds
|
In the Linux kernel, the following vulnerability has been resolved:
ASoC: lpass: Fix for KASAN use_after_free out of bounds
When we run syzkaller we get below Out of Bounds error.
"KASAN: slab-out-of-bounds Read in regcache_flat_read"
Below is the backtrace of the issue:
BUG: KASAN: slab-out-of-bounds in regcache_flat_read+0x10c/0x110
Read of size 4 at addr ffffff8088fbf714 by task syz-executor.4/14144
CPU: 6 PID: 14144 Comm: syz-executor.4 Tainted: G W
Hardware name: Qualcomm Technologies, Inc. sc7280 CRD platform (rev5+) (DT)
Call trace:
dump_backtrace+0x0/0x4ec
show_stack+0x34/0x50
dump_stack_lvl+0xdc/0x11c
print_address_description+0x30/0x2d8
kasan_report+0x178/0x1e4
__asan_report_load4_noabort+0x44/0x50
regcache_flat_read+0x10c/0x110
regcache_read+0xf8/0x5a0
_regmap_read+0x45c/0x86c
_regmap_update_bits+0x128/0x290
regmap_update_bits_base+0xc0/0x15c
snd_soc_component_update_bits+0xa8/0x22c
snd_soc_component_write_field+0x68/0xd4
tx_macro_put_dec_enum+0x1d0/0x268
snd_ctl_elem_write+0x288/0x474
By Error checking and checking valid values issue gets rectifies.
|
[] | null | null | null | null | null |
CVE-2025-68739
|
PM / devfreq: hisi: Fix potential UAF in OPP handling
|
In the Linux kernel, the following vulnerability has been resolved:
PM / devfreq: hisi: Fix potential UAF in OPP handling
Ensure all required data is acquired before calling dev_pm_opp_put(opp)
to maintain correct resource acquisition and release order.
|
[] | null | null | null | null | null |
CVE-2022-1805
|
When connecting to Amazon Workspaces, the SHA256 presented by AWS connection provisioner is not fully verified by Zero Clients. The issue could be exploited by an adversary that places a MITM (Man in the Middle) between a zero client and AWS session provisioner in the network. This issue is only applicable when connecting to an Amazon Workspace from a PCoIP Zero Client.
|
[
"cpe:2.3:o:teradici:tera2_pcoip_zero_client_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:teradici:tera2_pcoip_zero_client_firmware:22.04:*:*:*:*:*:*:*",
"cpe:2.3:h:teradici:tera2_pcoip_zero_client:-:*:*:*:*:*:*:*"
] | null | 8.1
| null | null | null |
|
CVE-2024-38271
|
Denial of Service in Quick Share
|
There exists a vulnerability in Quick Share/Nearby, where an attacker can force a victim to stay connected to a temporary hotspot created for the sharing. As part of the sequence of packets in a Quick Share connection over Bluetooth, the attacker forces the victim to connect to the attacker’s WiFi network and then sends an OfflineFrame that crashes Quick Share.
This makes the Wifi connection to the attacker’s network last, instead of returning to the old network when the Quick Share session completes, allowing the attacker to be a MiTM. We recommend upgrading to version 1.0.1724.0 of Quick Share or above
|
[
"cpe:2.3:a:google:nearby:*:*:*:*:*:*:*:*"
] | 5.9
| null | null | null | null |
CVE-2021-20107
|
There exists an unauthenticated BLE Interface in Sloan SmartFaucets including Optima EAF, Optima ETF/EBF, BASYS EFX, and Flushometers including SOLIS. The vulnerability allows for unauthenticated kinetic effects and information disclosure on the faucets. It is possible to use the Bluetooth Low Energy (BLE) connectivity to read and write to many BLE characteristics on the device. Some of these control the flow of water, the sensitivity of the sensors, and information about maintenance.
|
[
"cpe:2.3:o:sloan:optima_eaf-100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_eaf-750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_eaf-750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-187_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-187:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-550_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-550:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-775_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-775:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-85_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-85:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_ebf-850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_ebf-850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-770_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-770:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-80_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-80:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:optima_etf-880_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:optima_etf-880:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-677_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-677:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-200:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-275_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-277_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-277:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-175_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-175:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-177_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-177:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:basys_efx-850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:basys_efx-850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8111_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8111:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8186_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8186:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_ress-c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_ress-c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_ress-u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_ress-u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8152_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8152:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8195_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8195:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8115:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8110_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8110:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8113_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8113:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8137_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8137:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_bpw_8000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_bpw_8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8116_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8116:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8111_bt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8111_bt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8153_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8153:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_8186_bt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_8186_bt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_ress-c_bt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_ress-c_bt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sloan:solis_ress-u_bt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:sloan:solis_ress-u_bt:-:*:*:*:*:*:*:*"
] | null | 5.4
| null | 4.8
| null |
|
GHSA-q3q7-5v7p-vvhh
|
In Splunk Enterprise versions 9.3.0, 9.2.3, and 9.1.6, a low-privileged user that does not hold the "admin" or "power" Splunk roles could view images on the machine that runs Splunk Enterprise by using the PDF export feature in Splunk classic dashboards. The images on the machine could be exposed by exporting the dashboard as a PDF, using the local image path in the img tag in the source extensible markup language (XML) code for the Splunk classic dashboard.
|
[] | null | 4.3
| null | null | null |
|
CVE-2023-33309
|
WordPress Duplicator Pro Plugin <= 4.5.11 is vulnerable to Cross Site Scripting (XSS)
|
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Awesome Motive Duplicator Pro plugin <= 4.5.11 versions.
|
[
"cpe:2.3:a:awesomemotive:duplicator:*:*:*:*:pro:wordpress:*:*"
] | null | 7.1
| null | null | null |
CVE-2012-2825
|
The XSL implementation in Google Chrome before 20.0.1132.43 allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.1:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.21:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.24:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.40:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:20.0.1132.41:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-h4v2-mpxm-7h3w
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in twh offset writing allows Reflected XSS.This issue affects offset writing: from n/a through 1.2.
|
[] | null | 7.1
| null | null | null |
|
CVE-2021-3527
|
A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.
|
[
"cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.5
| null | 2.1
| null |
|
GHSA-8p6w-fcq2-354c
|
The ChallengerTX (aka com.zhtiantian.ChallengerTX) application 3.9.12.5 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[] | null | null | null | null | null |
|
CVE-2025-32809
|
W. W. Norton InQuizitive through 2025-04-08 allows students to conduct stored XSS attacks against educators via a bonus description, feedback.choice_fb[], or question_id.
|
[] | null | 6.4
| null | null | null |
|
GHSA-58v3-xw4q-v5wp
|
The do_extendedOp function in ibmslapd in IBM Tivoli Directory Server (TDS) 6.2 on Linux allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted SecureWay 3.2 Event Registration Request (aka a 1.3.18.0.2.12.1 request).
|
[] | null | null | null | null | null |
|
GHSA-vhcm-pjgm-q2wv
|
In the Linux kernel, the following vulnerability has been resolved:PCI: tegra194: Move controller cleanups to pex_ep_event_pex_rst_deassert()Currently, the endpoint cleanup function dw_pcie_ep_cleanup() and EPF
deinit notify function pci_epc_deinit_notify() are called during the
execution of pex_ep_event_pex_rst_assert() i.e., when the host has asserted
PERST#. But quickly after this step, refclk will also be disabled by the
host.All of the tegra194 endpoint SoCs supported as of now depend on the refclk
from the host for keeping the controller operational. Due to this
limitation, any access to the hardware registers in the absence of refclk
will result in a whole endpoint crash. Unfortunately, most of the
controller cleanups require accessing the hardware registers (like eDMA
cleanup performed in dw_pcie_ep_cleanup(), etc...). So these cleanup
functions can cause the crash in the endpoint SoC once host asserts PERST#.One way to address this issue is by generating the refclk in the endpoint
itself and not depending on the host. But that is not always possible as
some of the endpoint designs do require the endpoint to consume refclk from
the host.Thus, fix this crash by moving the controller cleanups to the start of
the pex_ep_event_pex_rst_deassert() function. This function is called
whenever the host has deasserted PERST# and it is guaranteed that the
refclk would be active at this point. So at the start of this function
(after enabling resources) the controller cleanup can be performed. Once
finished, rest of the code execution for PERST# deassert can continue as
usual.
|
[] | null | 5.5
| null | null | null |
|
GHSA-jcw9-gccv-c5vw
|
Array index error in the qdm2_decode_super_block function in libavcodec/qdm2.c in FFmpeg before 1.1 allows remote attackers to have an unspecified impact via crafted QDM2 data, which triggers an out-of-bounds array access.
|
[] | null | null | null | null | null |
|
CVE-2009-1024
|
Multiple SQL injection vulnerabilities in Beerwin PHPLinkAdmin 1.0 allow remote attackers to execute arbitrary SQL commands via the linkid parameter to edlink.php, and unspecified other vectors.
|
[
"cpe:2.3:a:beerwin:phplinkadmin:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-mj4p-x3q7-xqph
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nick Halsey List Custom Taxonomy Widget allows Stored XSS.This issue affects List Custom Taxonomy Widget: from n/a through 4.1.
|
[] | null | 5.9
| null | null | null |
|
ICSA-12-227-01
|
Siemens COMOS Database Privilege Escalation Vulnerability
|
Siemens COMOS before 9.1 Patch 413, 9.2 before Update 03 Patch 023, and 10.0 before Patch 005 allows remote authenticated users to obtain database administrative access via unspecified method calls.
|
[] | null | null | null | null | null |
CVE-2022-32117
|
Jerryscript v2.4.0 was discovered to contain a stack buffer overflow via the function jerryx_print_unhandled_exception in /util/print.c.
|
[
"cpe:2.3:a:jerryscript:jerryscript:2.4.0:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
GHSA-7cwp-w3cq-m996
|
PHP 5.2.5 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long string in (1) the domain parameter to the dgettext function, the message parameter to the (2) dcgettext or (3) gettext function, the msgid1 parameter to the (4) dngettext or (5) ngettext function, or (6) the classname parameter to the stream_wrapper_register function. NOTE: this might not be a vulnerability in most web server environments that support multiple threads, unless this issue can be demonstrated for code execution.
|
[] | null | null | null | null | null |
|
CVE-2009-4686
|
Cross-site scripting (XSS) vulnerability in account.php in phplemon AdQuick 2.2.1 allows remote attackers to inject arbitrary web script or HTML via the red_url parameter.
|
[
"cpe:2.3:a:phplemon:adquick:2.2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2023-42817
|
Cross-site Scripting (XSS) in pimcore admin-ui-classic-bundle translations
|
Pimcore admin-ui-classic-bundle provides a Backend UI for Pimcore. The translation value with text including “%s” (from “%suggest%) is parsed by sprintf() even though it’s supposed to be output literally to the user. The translations may be accessible by a user with comparatively lower overall access (as the translation permission cannot be scoped to certain “modules”) and a skilled attacker might be able to exploit the parsing of the translation string in the dialog box. This issue has been patched in commit `abd77392` which is included in release 1.1.2. Users are advised to update to version 1.1.2 or apply the patch manually.
|
[
"cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*"
] | null | 5.4
| null | null | null |
CVE-2018-0922
|
Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Compatibility Pack SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft Office Word Viewer, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Compatibility Pack SP2, Microsoft Online Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2007 SP3, Microsoft Word 2010 SP2, Word 2013 and Microsoft Word 2016 allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".
|
[
"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:*:mac:*:*",
"cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:-:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_online_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_word_viewer:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2013:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
] | null | null | 7.8
| 9.3
| null |
|
GHSA-cx25-cpw4-c882
|
A vulnerability classified as problematic was found in Musicshelf 1.0/1.1 on Android. Affected by this vulnerability is an unknown functionality of the file io\fabric\sdk\android\services\network\PinningTrustManager.java of the component SHA-1 Handler. The manipulation leads to password hash with insufficient computational effort. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier VDB-256321 was assigned to this vulnerability.
|
[] | null | 1.6
| null | null | null |
|
CVE-2023-26364
|
Denial of Service of regular expression in package @adobe/css-tools
|
@adobe/css-tools version 4.3.0 and earlier are affected by an Improper Input Validation vulnerability that could result in a minor denial of service while attempting to parse CSS. Exploitation of this issue does not require user interaction or privileges.
|
[
"cpe:2.3:a:adobe:css-tools:*:*:*:*:*:node.js:*:*"
] | null | 5.3
| null | null | null |
GHSA-jpcg-wf9g-rwcq
|
Vulnerability in the Solaris component of Oracle Sun Systems Products Suite (subcomponent: LDAP Library). Supported versions that are affected are 10 and 11.3. Difficult to exploit vulnerability allows low privileged attacker with network access via LDAP to compromise Solaris. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Solaris accessible data as well as unauthorized read access to a subset of Solaris accessible data. CVSS 3.0 Base Score 4.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N).
|
[] | null | null | 4.2
| null | null |
|
GHSA-97qc-h8j3-mgv9
|
Design documents with matching document IDs, from databases on the same cluster, may share a mutable Javascript environment when using these design document functions:validate_doc_updatelistfilterfilter views (using view functions as filters)rewriteupdateThis doesn't affect map/reduce or search (Dreyfus) index functions.Users are recommended to upgrade to a version that is no longer affected by this issue (Apache CouchDB 3.3.2 or 3.2.3).Workaround: Avoid using design documents from untrusted sources which may attempt to cache or store data in the Javascript environment.
|
[] | null | 4.4
| null | null | null |
|
GHSA-5wp2-jh72-hch8
|
Ubiquiti UCRM versions 2.5.0 to 2.7.7 are vulnerable to Stored Cross-site Scripting. Due to the lack sanitization, it is possible to inject arbitrary HTML code by manipulating the uploaded filename. Successful exploitation requires valid credentials to an account with "Edit" access to "Scheduling".
|
[] | null | 5.4
| null | null | null |
|
CVE-2023-46091
|
WordPress Category SEO Meta Tags Plugin <= 2.5 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Bala Krishna, Sergey Yakovlev Category SEO Meta Tags plugin <= 2.5 versions.
|
[
"cpe:2.3:a:bala-krishna:category_seo_meta_tags:*:*:*:*:*:wordpress:*:*"
] | null | 5.9
| null | null | null |
GHSA-vj29-vrh9-6589
|
Missing Authorization vulnerability in Woo WooCommerce Subscriptions allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce Subscriptions: from n/a before 5.8.0.
|
[] | null | 4.3
| null | null | null |
|
CVE-2019-20462
|
An issue was discovered on Alecto IVM-100 2019-11-12 devices. The device comes with a serial interface at the board level. By attaching to this serial interface and rebooting the device, a large amount of information is disclosed. This includes the view password and the password of the Wi-Fi access point that the device used.
|
[] | null | 5.3
| null | null | null |
|
GHSA-7mw3-c8c6-gh37
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in tvOS 18.1, iOS 18.1 and iPadOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, macOS Ventura 13.7.1, macOS Sonoma 14.7.1, watchOS 11.1, visionOS 2.1. Parsing a file may lead to disclosure of user information.
|
[] | null | 6.5
| null | null | null |
|
GHSA-m66p-hgxv-mh75
|
a-blog cms versions prior to Ver.2.10.23 (Ver.2.10.x), Ver.2.9.26 (Ver.2.9.x), and Ver.2.8.64 (Ver.2.8.x) allows arbitrary scripts to be executed in the context of the application due to unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2015-8407
|
Stack-based buffer overflow in Adobe Flash Player before 18.0.0.268 and 19.x and 20.x before 20.0.0.228 on Windows and OS X and before 11.2.202.554 on Linux, Adobe AIR before 20.0.0.204, Adobe AIR SDK before 20.0.0.204, and Adobe AIR SDK & Compiler before 20.0.0.204 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8457.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.185:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.207:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.226:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:19.0.0.245:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
GHSA-jq7r-26j9-qj83
|
Out-of-bounds write in Intel(R) Media SDK all versions and some Intel(R) oneVPL software before version 23.3.5 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 3.9
| null | null | null |
|
GHSA-q296-9j5x-fxf4
|
SSL/TLS certificate validation unconditionally disabled by Jenkins Micro Focus Application Automation Tools Plugin
|
Micro Focus Application Automation Tools Plugin 6.7 and earlier unconditionally disables SSL/TLS certificate validation for connections to Service Virtualization servers.Micro Focus Application Automation Tools Plugin 6.8 no longer disables SSL/TLS certificate validation unconditionally by default. It provides an option to disable SSL/TLS certification validation for connections to Service Virtualization servers.
|
[] | null | 4.8
| null | null | null |
CVE-2021-37195
|
A vulnerability has been identified in COMOS V10.2 (All versions only if web components are used), COMOS V10.3 (All versions < V10.3.3.3 only if web components are used), COMOS V10.4 (All versions < V10.4.1 only if web components are used). The COMOS Web component of COMOS accepts arbitrary code as attachment to tasks. This could allow an attacker to inject malicious code that is executed when loading the attachment.
|
[
"cpe:2.3:a:siemens:comos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:comos:4.1:*:*:*:*:*:*:*"
] | null | 6.1
| null | 2.6
| null |
|
GHSA-j3qh-9fj7-j65q
|
Successful exploitation of this vulnerability for multiple Mitsubishi Electric Factory Automation Engineering Software Products of various versions could allow an attacker to escalate privilege and execute malicious programs, which could cause a denial-of-service condition, and allow information to be disclosed, tampered with, and/or destroyed.
|
[] | null | 9.8
| null | null | null |
|
CVE-2011-2121
|
Integer overflow in Adobe Shockwave Player before 11.6.0.626 allows attackers to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.196a:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.204:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.0.205:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.100:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.103:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.105:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.1.106:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.321:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.323:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.324:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:8.5.325:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.383:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:9.0.432:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.0.210:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.0.1.004:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.0.011:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.1.016:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.1.4.020:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.021:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.022:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:10.2.0.023:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.0.456:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.0.3.471:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.595:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.0.596:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.1.601:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.2.602:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.6.606:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.7.609:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.8.612:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:shockwave_player:11.5.9.615:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-f4ph-wxvj-8j8g
|
A flaw was discovered in OpenLDAP before 2.4.57 leading to an invalid pointer free and slapd crash in the saslAuthzTo processing, resulting in denial of service.
|
[] | null | 7.5
| null | null | null |
|
CVE-2014-5253
|
OpenStack Identity (Keystone) 2014.1.x before 2014.1.2.1 and Juno before Juno-3 does not properly revoke tokens when a domain is invalidated, which allows remote authenticated users to retain access via a domain-scoped token for that domain.
|
[
"cpe:2.3:a:openstack:keystone:2014.1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:keystone:2014.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:keystone:juno-1:*:*:*:*:*:*:*",
"cpe:2.3:a:openstack:keystone:juno-2:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*"
] | null | null | null | 4.9
| null |
|
CVE-2019-10688
|
VVX products with software versions including and prior to, UCS 5.9.2 with Better Together over Ethernet Connector (BToE) application 3.9.1, use hard-coded credentials to establish connections between the host application and the device.
|
[
"cpe:2.3:a:polycom:unified_communications_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:polycom:better_together_over_ethernet_connector:*:*:*:*:*:*:*:*"
] | null | null | 6.8
| 4.6
| null |
|
GHSA-w8pf-76j7-6h39
|
The dynamic configuration feature in Xinha WYSIWYG editor 0.96 Beta 2 and earlier, as used in Serendipity 1.5.2 and earlier, allows remote attackers to bypass intended access restrictions and modify the configuration of arbitrary plugins via (1) crafted backend_config_secret_key_location and backend_config_hash parameters that are used in a SHA1 hash of a shared secret that can be known or externally influenced, which are not properly handled by the "Deprecated config passing" feature; or (2) crafted backend_data and backend_data[key_location] variables, which are not properly handled by the xinha_read_passed_data function. NOTE: this can be leveraged to upload and possibly execute arbitrary files via config.inc.php in the ImageManager plugin.
|
[] | null | null | null | null | null |
|
CVE-2016-1791
|
The AMD subsystem in Apple OS X before 10.11.5 allows attackers to obtain sensitive kernel memory-layout information via a crafted app.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | 3.3
| 4.3
| null |
|
CVE-2013-7359
|
Unspecified vulnerability in SAP Mobile Infrastructure allows remote attackers to obtain sensitive port information via unknown vectors, related to an "internal port scanning" issue.
|
[
"cpe:2.3:a:sap:mobile_infrastructure:-:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-mmm7-3gcg-h332
|
Multiple vulnerabilities in the authorization process of Cisco ASR 5000 Series Software (StarOS) could allow an authenticated, remote attacker to bypass authorization and execute a subset of CLI commands on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.
|
[] | null | null | null | null | null |
|
GHSA-8v97-xp35-mqxj
|
A stored cross-site scripting (XSS) vulnerability in the Add Classification function of Zoo Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via unspecified vectors.
|
[] | null | 5.4
| null | null | null |
|
GHSA-cj9c-5245-m5rj
|
The sort parameter in the download page /sysworkflow/en/neoclassic/reportTables/reportTables_Ajax is vulnerable to SQL injection in ProcessMaker 3.4.11. A specially crafted HTTP request can cause an SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
|
[] | null | 8.8
| null | null | null |
|
GHSA-p592-g5c7-x7w6
|
Integer signedness error in the (1) cab_unstore and (2) cab_extract functions in libclamav/cab.c in Clam AntiVirus (ClamAV) before 0.90.2 allow remote attackers to execute arbitrary code via a crafted CHM file that contains a negative integer, which passes a signed comparison and leads to a stack-based buffer overflow.
|
[] | null | null | null | null | null |
|
CVE-2018-7745
|
An issue was discovered in Western Bridge Cobub Razor 0.7.2. Authentication is not required for /index.php?/install/installation/createuserinfo requests, resulting in account creation.
|
[
"cpe:2.3:a:cobub:razor:0.7.2:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
GHSA-8x8q-fxh8-9q62
|
Microsoft Office 2003 SP3 and 2007 SP3, Word 2003 SP3 and 2007 SP3, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability."
|
[] | null | null | null | null | null |
|
CVE-2009-2574
|
index.php in MiniTwitter 0.2 beta allows remote authenticated users to modify certain options of arbitrary accounts via an opt action.
|
[
"cpe:2.3:a:bioscripts:minitwitter:0.2_beta:*:*:*:*:*:*:*"
] | null | null | null | 6.5
| null |
|
GHSA-62rw-g63g-4696
|
A vulnerability was found in macrozheng mall up to 1.0.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/login. The manipulation leads to cleartext transmission of sensitive information. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 2.9
| 3.7
| null | null | null |
|
GHSA-gvrr-q7f9-rx5j
|
IBM Aspera Shares 1.9.0 through 1.10.0 PL6 could allow an attacker to spoof their IP address, which is written to log files, due to improper verification of 'Client-IP' headers.
|
[] | null | 5.3
| null | null | null |
|
CVE-2006-2655
|
The build process for ypserv in FreeBSD 5.3 up to 6.1 accidentally disables access restrictions when using the /var/yp/securenets file, which allows remote attackers to bypass intended access restrictions.
|
[
"cpe:2.3:o:freebsd:freebsd:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.3:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:pre-release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:releng:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:5.4:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.0:stable:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:release:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:6.1:stable:*:*:*:*:*:*"
] | null | null | null | 6.4
| null |
|
GHSA-5g3f-4m9c-jvq6
|
The WP Header Images WordPress plugin before 2.0.1 does not sanitise and escape the t parameter before outputting it back in the plugin's settings page, leading to a Reflected Cross-Site Scripting issue
|
[] | null | null | null | null | null |
|
CVE-2024-2643
|
My Sticky Bar < 2.6.8 - Admin+ Stored XSS
|
The Floating Notification Bar, Sticky Menu on Scroll, Announcement Banner, and Sticky Header for Any WordPress plugin before 2.6.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
|
[] | null | 4.8
| null | null | null |
CVE-2015-3770
|
IOGraphics in Apple OS X before 10.10.5 allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted app, a different vulnerability than CVE-2015-5783.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-mv2c-c44v-x327
|
TOTOlink EX1800T v9.1.0cu.2112_B20220316 is vulnerable to unauthorized arbitrary command execution in the lanPriDns parameter’ of the setLanConfig interface of the cstecgi .cgi
|
[] | null | 9.8
| null | null | null |
|
GHSA-59xx-v58q-6v8h
|
The default configuration of IBM WebSphere Application Server (WAS) 7.0.0 before 7.0.0.39, 8.0.0 before 8.0.0.11, and 8.5 before 8.5.5.6 has a false value for the com.ibm.ws.webcontainer.disallowServeServletsByClassname WebContainer property, which allows remote attackers to obtain privileged access via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-cxp3-m897-wfvf
|
The SCANCTRL.ScanCtrlCtrl.1 ActiveX control in scan.dll in Nessus Vulnerability Scanner 3.0.6 allows remote attackers to delete arbitrary files via unspecified vectors involving the deleteNessusRC method, probably a directory traversal vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2017-18790
|
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100.
|
[
"cpe:2.3:o:netgear:r6700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7100lg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7100lg:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8500:-:*:*:*:*:*:*:*"
] | null | null | 6.2
| null | null |
This dataset, CIRCL/vulnerability-scores, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))