
CIRCL/vulnerability-severity-classification-roberta-base
Text Classification
•
Updated
•
61
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2019-9232 | In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122675483 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-6jwh-r89p-vcc3 | An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31750190. References: MT-ALPS02974192. | [] | null | null | 7.8 | null |
|
GHSA-cq4c-h8jq-jgh9 | An exploitable out-of-bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out-of-bounds memory read, which can result in the disclosure of sensitive information and denial of service. To trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server. | [] | null | 9.1 | null | null |
|
GHSA-qpg7-fjp7-h39j | An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function main() located in swfdump.c. It allows an attacker to cause Denial of Service. | [] | null | 5.5 | null | null |
|
GHSA-fq2g-rg9g-mgcg | Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Promotions). The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N). | [] | null | 6.5 | null | null |
|
CVE-2024-22513 | djangorestframework-simplejwt version 5.3.1 and before is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method. | [] | null | 5.5 | null | null |
|
CVE-2019-19824 | On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2. | [
"cpe:2.3:o:totolink:a3002ru_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a702r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n301rt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n302r_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n200re_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n150rt_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n100re_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n302re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*",
"cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2018-11555 | tificc in Little CMS 2.9 has an out-of-bounds write in the PrecalculatedXFORM function in cmsxform.c in liblcms2.a via a crafted TIFF file. NOTE: Little CMS developers do consider this a vulnerability because the issue is based on an sample program using LIBTIFF and do not apply to the lcms2 library, lcms2 does not depends on LIBTIFF other than to build sample programs, and the issue cannot be reproduced on the lcms2 library.” | [
"cpe:2.3:a:littlecms:little_cms:2.9:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
GHSA-23xj-w5qm-57j6 | Untrusted search path vulnerability in Installer of HIBUN Confidential File Viewer prior to 11.20.0001 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [] | null | null | 7.8 | null |
|
GHSA-p8r2-77q8-jfwh | Multiple cross-site scripting (XSS) vulnerabilities in asaanCart 0.9 allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO to calc.php, (2) chat.php, (3) register.php, or (4) index.php in libs/smarty_ajax/; or the (5) page parameter to libs/smarty_ajax/index.php. | [] | null | null | null | null |
|
CVE-2020-23564 | File Upload vulnerability in SEMCMS 3.9 allows remote attackers to run arbitrary code via SEMCMS_Upfile.php. | [
"cpe:2.3:a:sem-cms:semcms:3.9:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-mqfj-275x-jhp4 | A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists in Andover Continuum (All versions), which could cause files on the application server filesystem to be viewable when an attacker interferes with an application's processing of XML data. | [] | null | null | null | null |
|
GHSA-xfxc-48qf-j4g6 | Weak encryption mechanisms in RFID Tags in Yale Conexis L1 v1.1.0 allows attackers to create a cloned tag via physical proximity to the original. | [] | null | 6.5 | null | null |
|
CVE-2021-42645 | CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host. | [
"cpe:2.3:a:cmsimple-xh:cmsimple_xh:1.7.4:*:*:*:*:*:*:*"
] | null | 10 | null | 10 |
|
GHSA-q39p-c62c-433g | While processing modem SSR after IMS is registered, the IMS data daemon is restarted but the ipc_dataHandle is no longer available. Consequently, the DPL thread frees the internal memory for dataDHandle but the local variable pointer is not updated which can lead to a Use After Free condition in Snapdragon Mobile and Snapdragon Wear. | [] | null | null | 8.4 | null |
|
GHSA-h3rg-2ghf-ph8j | Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php. | [] | null | 9.8 | null | null |
|
GHSA-36j8-893c-jhgw | Multiple buffer overflows in Apple Type Services (ATS) in Apple Mac OS X 10.5.8 allow remote attackers to execute arbitrary code via a crafted embedded font in a document. | [] | null | null | null | null |
|
GHSA-fw8x-jr68-w9q9 | Cross-site scripting (XSS) vulnerability Fujitsu e-Pares V01 L01 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
GHSA-pr9r-mj5f-cvxc | The Page Builder: KingComposer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via via shortcode in versions before 2.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | [] | null | 5.5 | null | null |
|
GHSA-hffr-h2c8-jr4p | The General Responder implementation in the IP Service Level Agreement (SLA) feature in Cisco IOS 15.2 and IOS XE 3.1.xS through 3.4.xS before 3.4.5S and 3.5.xS through 3.7.xS before 3.7.2S allows remote attackers to cause a denial of service (device reload) via crafted (1) IPv4 or (2) IPv6 IP SLA packets on UDP port 1167, aka Bug ID CSCuc72594. | [] | null | null | null | null |
|
CVE-2015-6098 | Buffer overflow in the Network Driver Interface Standard (NDIS) implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows NDIS Elevation of Privilege Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2017-20126 | KB Affiliate Referral Script index.php sql injection | A vulnerability was found in KB Affiliate Referral Script 1.0. It has been classified as critical. This affects an unknown part of the file /index.php. The manipulation of the argument username/password with the input 'or''=' leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:kb_affiliate_referral_script_project:kb_affiliate_referral_script:1.0:*:*:*:*:*:*:*"
] | null | 7.3 | null | null |
GHSA-pr98-23f8-jwxv | QOS.CH logback-core Expression Language Injection vulnerability | ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension.A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege. | [] | 5.9 | null | null | null |
RHSA-2020:4351 | Red Hat Security Advisory: chromium-browser security update | freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png chromium-browser: Inappropriate implementation in Blink chromium-browser: Use after free in media chromium-browser: Use after free in PDFium chromium-browser: Use after free in printing | [
"cpe:/a:redhat:rhel_extras:6"
] | null | 8.8 | null | null |
GHSA-qq65-5wvg-p275 | OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files. | [] | null | 9.8 | null | null |
|
GHSA-hqfr-fqq8-v557 | Integer overflow may occur if atom size is less than atom offset as there is improper validation of atom size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCA6574AU, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130 | [] | null | null | null | null |
|
CVE-2019-10918 | A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known. | [
"cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 9 |
|
CVE-2022-40636 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17044. | [
"cpe:2.3:a:ansys:spaceclaim:2022:r1:*:*:*:*:*:*"
] | null | null | 7 | null |
|
GHSA-45vm-xm4v-hvqm | Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable heap overflow vulnerability when parsing an MP4 header. Successful exploitation could lead to arbitrary code execution. | [] | null | null | 9.8 | null |
|
GHSA-4wmf-2vr2-25qx | Lenovo SHAREit before 3.5.98_ww on Android before 4.2 allows remote attackers to have unspecified impact via a crafted intent: URL, aka an "intent scheme URL attack." | [] | null | null | 8.8 | null |
|
GHSA-w633-9m9w-6hm3 | Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data. | [] | null | null | 8.8 | null |
|
GHSA-675r-vh4c-38xv | The Feedpress Generator – External RSS Frontend Customizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
CVE-2023-33988 | Cross-Site Scripting vulnerability in SAP Enable Now | In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Content-Security-Policy and X-XSS-Protection response headers are not implemented, allowing an unauthenticated attacker to attempt reflected cross-site scripting, which could result in disclosure or modification of information.
| [
"cpe:2.3:a:sap:enable_now:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
CVE-2017-12798 | Cross-Site Scripting (XSS) exists in NexusPHP version v1.5 via the q parameter to searchsuggest.php. | [
"cpe:2.3:a:nexusphp_project:nexusphp:1.5:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-2xrp-fqg8-p623 | IBM Connect:Direct for UNIX 6.1.0, 6.0.0, 4.3.0, and 4.2.0 can allow a local or remote user to obtain an authenticated CLI session due to improper authentication methods. IBM X-Force ID: 188516. | [] | null | null | null | null |
|
GHSA-6vr4-gxc3-8q35 | Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web API). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2 and 20.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N). | [] | null | null | null | null |
|
GHSA-9v3j-cgxq-66w9 | Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command. | [] | null | null | null | null |
|
GHSA-w7w4-m49g-rp26 | In Teradici PCoIP Agent before 19.08.1 and PCoIP Client before 19.08.3, an unquoted service path can cause execution of %PROGRAMFILES(X86)%\Teradici\PCoIP.exe instead of the intended pcoip_vchan_printing_svc.exe file. | [] | null | null | null | null |
|
CVE-2013-6878 | Cross-site scripting (XSS) vulnerability in the Mijosoft MijoSearch component 2.0.4 and earlier for Joomla! allows remote attackers to inject arbitrary web script or HTML via the query parameter to component/mijosearch/search. | [
"cpe:2.3:a:miwisoft:mijosearch:*:*:*:*:*:joomla\\!:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-pc58-v5qw-h9qf | The Siemens SPCanywhere application for Android does not properly store application passwords, which allows physically proximate attackers to obtain sensitive information by examining the device filesystem. | [] | null | null | null | null |
|
GHSA-9g6m-wjrr-69cm | SQL injection vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary SQL commands via the "passwordreset&token" parameter. | [] | null | null | null | null |
|
CVE-2025-20891 | Out-of-bounds read in decoding malformed bitstream of video thumbnails in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to read arbitrary memory. User interaction is required for triggering this vulnerability. | [] | null | 5.3 | null | null |
|
CVE-2005-0875 | Multiple buffer overflows in the Yahoo plug-in for Trillian 2.0, 3.0, and 3.1 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header. | [
"cpe:2.3:a:cerulean_studios:trillian:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerulean_studios:trillian:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cerulean_studios:trillian:3.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-0477 | Auto Featured Image < 3.9.16 - Author+ Arbitrary File Upload | The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation. | [
"cpe:2.3:a:cm-wp:auto_featured_image:*:*:*:*:*:wordpress:*:*"
] | null | 8.8 | null | null |
CVE-2021-42326 | Redmine before 4.1.5 and 4.2.x before 4.2.3 may disclose the names of users on activity views due to an insufficient access filter. | [
"cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2016-6784 | An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31350755. References: MT-ALPS02961424. | [
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 7 | 9.3 |
|
GHSA-49p9-5x29-ccrv | GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Menu Link" parameter, aka the adm/menu_list_update.php me_link parameter. | [] | null | null | 6.1 | null |
|
GHSA-33f2-r445-jvq6 | Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow. | [] | null | null | null | null |
|
GHSA-77r3-hpmv-72f8 | Directory traversal vulnerability in filedownload.php in xml2owl 0.1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter. | [] | null | null | null | null |
|
GHSA-f279-w6jr-7xxj | Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0. | [] | null | 8.4 | null | null |
|
GHSA-9xg8-22rr-c6vh | Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user. | [] | null | null | 7.5 | null |
|
GHSA-24wc-7r9r-xg28 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WEN Themes WEN Responsive Columns allows Stored XSS.This issue affects WEN Responsive Columns: from n/a through 1.3.2. | [] | null | 6.5 | null | null |
|
GHSA-5ffg-379q-g96f | Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token. | [] | null | null | null | null |
|
CVE-2022-22571 | An authenticated high privileged user can perform a stored XSS attack due to incorrect output encoding in Incapptic connect and affects all current versions. | [
"cpe:2.3:a:ivanti:incapptic_connect:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2005-1446 | SitePanel 2.6.1 and earlier (SitePanel2) allows remote attackers to upload and execute arbitrary files such as PHP scripts via an attachment to a trouble ticket. | [
"cpe:2.3:a:sitepanel:sitepanel:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2014-7748 | The Garip Ve Ilginc Olaylar (aka com.wGaripveeIlgincOlay) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:garip_ve_ilginc_olaylar_project:garip_ve_ilginc_olaylar:0.1:*:*:*:*:android:*:*"
] | null | null | null | 5.4 |
|
GHSA-rq57-8pjv-c6r7 | IBM System Storage DS8900F 89.22.19.0, 89.30.68.0, 89.32.40.0, 89.33.48.0, 89.40.83.0, and 89.40.93.0 could allow a remote user to create an LDAP connection with a valid username and empty password to establish an anonymous connection. IBM X-Force ID: 279518. | [] | null | 5 | null | null |
|
GHSA-p3v2-vxq8-x73m | ** DISPUTED ** PHP remote file inclusion vulnerability in include/plugin/block.t.php in Peter Schmidt phpmyProfiler 0.9.6b allows remote attackers to execute arbitrary PHP code via a URL in the pmp_rel_path parameter. NOTE: this issue is disputed by CVE because the applicable require_once is in a function that is not called on a direct request. | [] | null | null | null | null |
|
GHSA-jrcw-x2cf-77fv | The Telephony subsystem in Apple iOS before 8.4 allows physically proximate attackers to execute arbitrary code via a crafted (1) SIM or (2) UIM card. | [] | null | null | null | null |
|
GHSA-5xvr-vww3-xh7v | PHP remote file inclusion vulnerability in function.php in Ultimate Fun Book 1.02 allows remote attackers to execute arbitrary PHP code via a URL in the gbpfad parameter. NOTE: some sources mention "Ultimate Fun Board," but this appears to be an error. | [] | null | null | null | null |
|
GHSA-mw3c-7pfv-wjvv | PHP remote file inclusion vulnerability in w-Agora 4.1.3 allows remote attackers to execute arbitrary PHP code via the inc_dir parameter. | [] | null | null | null | null |
|
GHSA-wqmm-q65g-2hqr | Paramiko Unsafe randomness usage may allow access to sensitive information | common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool. | [] | 7.1 | 6.5 | null | null |
GHSA-gqmj-9q6x-4fvg | Buffer overflow in getconf in IBM AIX 5.2 to 5.3 allows local users to execute arbitrary code via unknown vectors. | [] | null | null | null | null |
|
CVE-2025-21731 | nbd: don't allow reconnect after disconnect | In the Linux kernel, the following vulnerability has been resolved:
nbd: don't allow reconnect after disconnect
Following process can cause nbd_config UAF:
1) grab nbd_config temporarily;
2) nbd_genl_disconnect() flush all recv_work() and release the
initial reference:
nbd_genl_disconnect
nbd_disconnect_and_put
nbd_disconnect
flush_workqueue(nbd->recv_workq)
if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, ...))
nbd_config_put
-> due to step 1), reference is still not zero
3) nbd_genl_reconfigure() queue recv_work() again;
nbd_genl_reconfigure
config = nbd_get_config_unlocked(nbd)
if (!config)
-> succeed
if (!test_bit(NBD_RT_BOUND, ...))
-> succeed
nbd_reconnect_socket
queue_work(nbd->recv_workq, &args->work)
4) step 1) release the reference;
5) Finially, recv_work() will trigger UAF:
recv_work
nbd_config_put(nbd)
-> nbd_config is freed
atomic_dec(&config->recv_threads)
-> UAF
Fix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so
that nbd_genl_reconfigure() will fail. | [] | null | 7.8 | null | null |
CVE-2023-7286 | ACF Quick Edit Fields <= 3.2.2 - Authenticated (Contributor+) Insecure Direct Object Reference | The plugin ACF Quick Edit Fields for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.2.2. This makes it possible for attackers without the edit_users capability to access metadata of other users, this includes contributor-level users and above. | [] | null | 6.5 | null | null |
CVE-2023-26063 | Certain Lexmark devices through 2023-02-19 access a Resource By Using an Incompatible Type. | [
"cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstpc_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs943:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtct_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtpm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtmm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mslsg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxlsg_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mslbd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxlbd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:msngm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxngm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtgm_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:msngw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mstgw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:mxtgw_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cslbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cslbl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxlbn_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxlbl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cstzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs622:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:csnzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:cxtzj_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc232:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:lw80_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx617:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms711:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812dn:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5163de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx711:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx717:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx718:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx810:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx811:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx812:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5263:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm5270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7163:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7263:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm7270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:ms911:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx910:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx911:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx912:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm9145:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm9155:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xm9165:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs417:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c2132:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs517:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx317:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx417:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2130:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cx517:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xc2132:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:lhs60_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x746:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs795:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs796:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs798:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs950:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:xs955:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:lr_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lexmark:lp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
CVE-2019-1794 | Cisco Directory Connector Search Order Hijacking Vulnerability | A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources. | [
"cpe:2.3:a:cisco:meeting_server:2.2:*:*:*:*:*:*:*"
] | null | null | 5.1 | null |
GHSA-q437-w69m-98g7 | Matrimony v1.0 was discovered to contain a SQL injection vulnerability via the Password parameter. | [] | null | 9.8 | null | null |
|
GHSA-w932-f265-m42g | Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL. | [] | null | null | null | null |
|
CVE-2013-2825 | The DNP3 service in the Outstation component on Elecsys Director Gateway devices with kernel 2.6.32.11ael1 and earlier allows remote attackers to cause a denial of service (CPU consumption and communication outage) via crafted input. | [
"cpe:2.3:o:elecsyscorp:director_dnp3_outstation_kernel:2.6.32.11:ae11:*:*:*:*:*:*",
"cpe:2.3:h:elecsyscorp:director_industrial_communication_gateway:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2017-16107 | pooledwebsocket is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. | [
"cpe:2.3:a:pooledwebsocket_project:pooledwebsocket:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-qwvv-8h5h-p3cc | Novell iManager 2.7.x before 2.7 SP7 Patch 10 HF1 and NetIQ iManager 3.x before 3.0.3.1 have persistent CSRF in object management. | [] | null | null | 8.8 | null |
|
CVE-2019-10368 | A cross-site request forgery vulnerability in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:jclouds:*:*:*:*:*:jenkins:*:*"
] | null | null | 8.8 | 6.8 |
|
GHSA-xq4c-4fcc-74mp | There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity. | [] | null | null | null | null |
|
GHSA-wxfr-9v84-73vc | A vulnerability in the DLL loading mechanism of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for DLL files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid credentials on the Windows system. | [] | null | 6.7 | null | null |
|
GHSA-frxp-xxx8-hrg6 | Missing Authorization in DayByDay CRM | In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information. | [] | null | 4.3 | null | null |
CVE-2021-40392 | An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability. | [
"cpe:2.3:a:moxa:mxview:3.2.4:*:*:*:*:*:*:*"
] | null | null | 5.3 | null |
|
CVE-2022-38974 | WordPress WPML Multilingual CMS premium plugin <= 4.5.10 - Broken Access Control vulnerability | Broken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with subscriber or higher user roles to change the status of the translation jobs. | [
"cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2020-1093 | A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1058, CVE-2020-1060. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
] | null | 7.5 | null | 7.6 |
|
GHSA-r5x6-vq9j-ccgv | Guidance Software EnCase Enterprise Edition (EEE) 6 does not properly verify the identity of the acquisition target during communication with the EnCase Servlet (EEE servlet), which might allow remote attackers to spoof the disk image. | [] | null | null | null | null |
|
CVE-2021-21178 | Inappropriate implementation in Compositing in Google Chrome on Linux and Windows prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-50158 | RDMA/bnxt_re: Fix out of bound check | In the Linux kernel, the following vulnerability has been resolved:
RDMA/bnxt_re: Fix out of bound check
Driver exports pacing stats only on GenP5 and P7 adapters. But while
parsing the pacing stats, driver has a check for "rdev->dbr_pacing". This
caused a trace when KASAN is enabled.
BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re]
Write of size 8 at addr ffff8885942a6340 by task modprobe/4809 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-2023-20025 | A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow an unauthenticated, remote attacker to bypass authentication on an affected device.
This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass authentication and gain root access on the underlying operating system. | [
"cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*"
] | null | 9 | null | null |
|
GHSA-4g82-3jcr-q52w | Malware in ctx | The `ctx` hosted project on [PyPI](https://pypi.org/project/ctx/) was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of `os.environ.items()` when instantiating `Ctx` objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running at `https://anti-theft-web.herokuapp.com`.If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited. | [] | null | null | null | null |
GHSA-7vqj-q42p-29c8 | Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations. | [] | null | null | null | null |
|
GHSA-w38m-qrcj-jg5r | Google V8, as used in Google Chrome before 34.0.1847.116, does not properly use numeric casts during handling of typed arrays, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code. | [] | null | null | null | null |
|
CVE-2012-4579 | Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via a Table Operations (1) TRUNCATE or (2) DROP link for a crafted table name, (3) the Add Trigger popup within a Triggers page that references crafted table names, (4) an invalid trigger-creation attempt for a crafted table name, (5) crafted data in a table, or (6) a crafted tooltip label name during GIS data visualization, a different issue than CVE-2012-4345. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-2h5r-mrp2-g8m3 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.23.11.6 versions. | [] | null | 7.1 | null | null |
|
GHSA-qqfg-93rc-qwq3 | Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an "Improved fix for MOPB-03-2007," probably a variant of CVE-2007-1285. | [] | null | null | null | null |
|
CVE-2021-36705 | In ProLink PRC2402M V1.0.18 and older, the set_TR069 function in the adm.cgi binary, accessible with a page parameter value of TR069 contains a trivial command injection where the value of the TR069_local_port parameter is passed directly to system. | [
"cpe:2.3:o:prolink:prc2402m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:prolink:prc2402m:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2014-10069 | Hitron CVE-30360 devices use a 578A958E3DD933FC DES key that is shared across different customers' installations, which makes it easier for attackers to obtain sensitive information by decrypting a backup configuration file, as demonstrated by a password hash in the um_auth_account_password field. | [
"cpe:2.3:o:hitrontech:cve-30360_firmware:3.1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:h:hitrontech:cve-30360:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2021-35370 | An issue found in Peacexie Imcat v5.4 allows attackers to execute arbitrary code via the incomplete filtering function. | [
"cpe:2.3:a:txjia:imcat:5.4:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-x3rc-h9v8-w5jq | Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality. | [] | null | 7.5 | null | null |
|
RHSA-2021:2499 | Red Hat Security Advisory: OpenShift Container Platform 4.6.36 security update | jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS | [
"cpe:/a:redhat:openshift:4.6::el7",
"cpe:/a:redhat:openshift:4.6::el8"
] | null | 5.3 | null | null |
GHSA-9qfr-vx9q-5vh6 | The mintToken function of a smart contract implementation for CCindex10 (T10), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] | null | 7.5 | null | null |
|
GHSA-34h4-6895-w557 | Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Product Attachment for WooCommerce plugin <= 2.1.8 versions. | [] | null | 4.3 | null | null |
|
GHSA-chrg-mx57-ghvc | Cross-Site Request Forgery (CSRF) vulnerability in MainWP Matomo Extension <= 4.0.4 versions. | [] | null | 8.8 | null | null |
|
CVE-2016-6513 | epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 2.x before 2.0.5 does not restrict the recursion depth, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*"
] | null | null | 5.9 | 4.3 |
|
CVE-2006-4830 | Directory traversal vulnerability in EditBlogTemplatesPlugin.java in David Czarnecki Blojsom 2.30 allows remote attackers to have an unknown impact by sending an HTTP request with a certain value of blogTemplate. | [
"cpe:2.3:a:blojsom:blojsom:2.30:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2017-2632 | A logic error in valid_role() in CloudForms role validation before 5.7.1.3 could allow a tenant administrator to create groups with a higher privilege level than the tenant administrator should have. This would allow an attacker with tenant administration access to elevate privileges. | [
"cpe:2.3:a:redhat:cloudforms_management_engine:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:cloudforms:4.2:*:*:*:*:*:*:*"
] | null | null | 4.9 | null |
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))