Datasets:

Modalities:
Tabular
Text
Formats:
parquet
Libraries:
Datasets
pandas
Dataset Viewer
Auto-converted to Parquet
id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2019-9232
In libvpx, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122675483
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.5
null
5
GHSA-6jwh-r89p-vcc3
An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: N/A. Android ID: A-31750190. References: MT-ALPS02974192.
[]
null
null
7.8
null
GHSA-cq4c-h8jq-jgh9
An exploitable out-of-bounds read vulnerability exists in the way MiniSNMPD version 1.4 parses incoming SNMP packets. A specially crafted SNMP request can trigger an out-of-bounds memory read, which can result in the disclosure of sensitive information and denial of service. To trigger this vulnerability, an attacker needs to send a specially crafted packet to the vulnerable server.
[]
null
9.1
null
null
GHSA-qpg7-fjp7-h39j
An issue was discovered in swftools through 20201222. A NULL pointer dereference exists in the function main() located in swfdump.c. It allows an attacker to cause Denial of Service.
[]
null
5.5
null
null
GHSA-fq2g-rg9g-mgcg
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Promotions). The supported version that is affected is 16.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data. CVSS 3.0 Base Score 6.5 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N).
[]
null
6.5
null
null
CVE-2024-22513
djangorestframework-simplejwt version 5.3.1 and before is vulnerable to information disclosure. A user can access web application resources even after their account has been disabled due to missing user validation checks via the for_user method.
[]
null
5.5
null
null
CVE-2019-19824
On certain TOTOLINK Realtek SDK based routers, an authenticated attacker may execute arbitrary OS commands via the sysCmd parameter to the boafrm/formSysCmd URI, even if the GUI (syscmd.htm) is not available. This allows for full control over the device's internals. This affects A3002RU through 2.0.0, A702R through 2.1.3, N301RT through 2.1.6, N302R through 3.4.0, N300RT through 3.4.0, N200RE through 4.0.0, N150RT through 3.4.0, N100RE through 3.4.0, and N302RE 2.0.2.
[ "cpe:2.3:o:totolink:a3002ru_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a702r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n301rt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n302r_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n200re_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n150rt_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n100re_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n302re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a3002ru_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a3002ru:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:a702r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:a702r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n301rt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n301rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n302r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n302r:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n300rt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n300rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n200re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n200re:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n150rt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n150rt:-:*:*:*:*:*:*:*", "cpe:2.3:o:totolink:n100re_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:totolink:n100re:-:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2018-11555
tificc in Little CMS 2.9 has an out-of-bounds write in the PrecalculatedXFORM function in cmsxform.c in liblcms2.a via a crafted TIFF file. NOTE: Little CMS developers do consider this a vulnerability because the issue is based on an sample program using LIBTIFF and do not apply to the lcms2 library, lcms2 does not depends on LIBTIFF other than to build sample programs, and the issue cannot be reproduced on the lcms2 library.”
[ "cpe:2.3:a:littlecms:little_cms:2.9:*:*:*:*:*:*:*" ]
null
null
7.8
6.8
GHSA-23xj-w5qm-57j6
Untrusted search path vulnerability in Installer of HIBUN Confidential File Viewer prior to 11.20.0001 allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory.
[]
null
null
7.8
null
GHSA-p8r2-77q8-jfwh
Multiple cross-site scripting (XSS) vulnerabilities in asaanCart 0.9 allow remote attackers to inject arbitrary web script or HTML via the (1) PATH_INFO to calc.php, (2) chat.php, (3) register.php, or (4) index.php in libs/smarty_ajax/; or the (5) page parameter to libs/smarty_ajax/index.php.
[]
null
null
null
null
CVE-2020-23564
File Upload vulnerability in SEMCMS 3.9 allows remote attackers to run arbitrary code via SEMCMS_Upfile.php.
[ "cpe:2.3:a:sem-cms:semcms:3.9:*:*:*:*:*:*:*" ]
null
7.2
null
null
GHSA-mqfj-275x-jhp4
A CWE-94: Improper Control of Generation of Code ('Code Injection') vulnerability exists in Andover Continuum (All versions), which could cause files on the application server filesystem to be viewable when an attacker interferes with an application's processing of XML data.
[]
null
null
null
null
GHSA-xfxc-48qf-j4g6
Weak encryption mechanisms in RFID Tags in Yale Conexis L1 v1.1.0 allows attackers to create a cloned tag via physical proximity to the original.
[]
null
6.5
null
null
CVE-2021-42645
CMSimple_XH 1.7.4 is affected by a remote code execution (RCE) vulnerability. To exploit this vulnerability, an attacker must use the "File" parameter to upload a PHP payload to get a reverse shell from the vulnerable host.
[ "cpe:2.3:a:cmsimple-xh:cmsimple_xh:1.7.4:*:*:*:*:*:*:*" ]
null
10
null
10
GHSA-q39p-c62c-433g
While processing modem SSR after IMS is registered, the IMS data daemon is restarted but the ipc_dataHandle is no longer available. Consequently, the DPL thread frees the internal memory for dataDHandle but the local variable pointer is not updated which can lead to a Use After Free condition in Snapdragon Mobile and Snapdragon Wear.
[]
null
null
8.4
null
GHSA-h3rg-2ghf-ph8j
Hotel Management System commit 91caab8 was discovered to contain a SQL injection vulnerability via the room_type parameter at admin_room_removed.php.
[]
null
9.8
null
null
GHSA-36j8-893c-jhgw
Multiple buffer overflows in Apple Type Services (ATS) in Apple Mac OS X 10.5.8 allow remote attackers to execute arbitrary code via a crafted embedded font in a document.
[]
null
null
null
null
GHSA-fw8x-jr68-w9q9
Cross-site scripting (XSS) vulnerability Fujitsu e-Pares V01 L01 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[]
null
null
null
null
GHSA-pr9r-mj5f-cvxc
The Page Builder: KingComposer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via via shortcode in versions before 2.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
5.5
null
null
GHSA-hffr-h2c8-jr4p
The General Responder implementation in the IP Service Level Agreement (SLA) feature in Cisco IOS 15.2 and IOS XE 3.1.xS through 3.4.xS before 3.4.5S and 3.5.xS through 3.7.xS before 3.7.2S allows remote attackers to cause a denial of service (device reload) via crafted (1) IPv4 or (2) IPv6 IP SLA packets on UDP port 1167, aka Bug ID CSCuc72594.
[]
null
null
null
null
CVE-2015-6098
Buffer overflow in the Network Driver Interface Standard (NDIS) implementation in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows local users to gain privileges via a crafted application, aka "Windows NDIS Elevation of Privilege Vulnerability."
[ "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2017-20126
KB Affiliate Referral Script index.php sql injection
A vulnerability was found in KB Affiliate Referral Script 1.0. It has been classified as critical. This affects an unknown part of the file /index.php. The manipulation of the argument username/password with the input 'or''=' leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:kb_affiliate_referral_script_project:kb_affiliate_referral_script:1.0:*:*:*:*:*:*:*" ]
null
7.3
null
null
GHSA-pr98-23f8-jwxv
QOS.CH logback-core Expression Language Injection vulnerability
ACE vulnerability in JaninoEventEvaluator by QOS.CH logback-core up to and including version 1.5.12 in Java applications allows attackers to execute arbitrary code by compromising an existing logback configuration file or by injecting an environment variable before program execution.Malicious logback configuration files can allow the attacker to execute arbitrary code using the JaninoEventEvaluator extension.A successful attack requires the user to have write access to a configuration file. Alternatively, the attacker could inject a malicious environment variable pointing to a malicious configuration file. In both cases, the attack requires existing privilege.
[]
5.9
null
null
null
RHSA-2020:4351
Red Hat Security Advisory: chromium-browser security update
freetype: Heap-based buffer overflow due to integer truncation in Load_SBit_Png chromium-browser: Inappropriate implementation in Blink chromium-browser: Use after free in media chromium-browser: Use after free in PDFium chromium-browser: Use after free in printing
[ "cpe:/a:redhat:rhel_extras:6" ]
null
8.8
null
null
GHSA-qq65-5wvg-p275
OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files.
[]
null
9.8
null
null
GHSA-hqfr-fqq8-v557
Integer overflow may occur if atom size is less than atom offset as there is improper validation of atom size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCA6574AU, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130
[]
null
null
null
null
CVE-2019-10918
A vulnerability has been identified in SIMATIC PCS 7 V8.0 and earlier (All versions), SIMATIC PCS 7 V8.1 (All versions < V8.1 with WinCC V7.3 Upd 19), SIMATIC PCS 7 V8.2 (All versions < V8.2 SP1 with WinCC V7.4 SP1 Upd11), SIMATIC PCS 7 V9.0 (All versions < V9.0 SP2 with WinCC V7.4 SP1 Upd11), SIMATIC WinCC (TIA Portal) V13 (All versions), SIMATIC WinCC (TIA Portal) V14 (All versions < V14 SP1 Upd 9), SIMATIC WinCC (TIA Portal) V15 (All versions < V15.1 Upd 3), SIMATIC WinCC Runtime Professional V13 (All versions), SIMATIC WinCC Runtime Professional V14 (All versions < V14.1 Upd 8), SIMATIC WinCC Runtime Professional V15 (All versions < V15.1 Upd 3), SIMATIC WinCC V7.2 and earlier (All versions), SIMATIC WinCC V7.3 (All versions < V7.3 Upd 19), SIMATIC WinCC V7.4 (All versions < V7.4 SP1 Upd 11), SIMATIC WinCC V7.5 (All versions < V7.5 Upd 3). An authenticatd attacker with network access to the DCOM interface could execute arbitrary commands with SYSTEM privileges. The vulnerability could be exploited by an attacker with network access to the affected system. Successful exploitation requires authentication with a low-privileged user account and no user interaction. An attacker could use the vulnerability to compromise confidentiality and integrity and availability of the affected system. At the time of advisory publication no public exploitation of this security vulnerability was known.
[ "cpe:2.3:a:siemens:simatic_pcs_7:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:8.2:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_pcs_7:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:*:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.3:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.4:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc:7.5:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):13.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):14.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_\\(tia_portal\\):15.0:*:*:*:*:*:*:*", "cpe:2.3:a:siemens:simatic_wincc_runtime_professional:*:*:*:*:*:*:*:*" ]
null
8.8
null
9
CVE-2022-40636
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ansys SpaceClaim 2022 R1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17044.
[ "cpe:2.3:a:ansys:spaceclaim:2022:r1:*:*:*:*:*:*" ]
null
null
7
null
GHSA-45vm-xm4v-hvqm
Adobe Flash Player versions 24.0.0.194 and earlier have an exploitable heap overflow vulnerability when parsing an MP4 header. Successful exploitation could lead to arbitrary code execution.
[]
null
null
9.8
null
GHSA-4wmf-2vr2-25qx
Lenovo SHAREit before 3.5.98_ww on Android before 4.2 allows remote attackers to have unspecified impact via a crafted intent: URL, aka an "intent scheme URL attack."
[]
null
null
8.8
null
GHSA-w633-9m9w-6hm3
Multiple integer overflows in the opj_tcd_init_tile function in tcd.c in OpenJPEG, as used in PDFium in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted JPEG 2000 data.
[]
null
null
8.8
null
GHSA-675r-vh4c-38xv
The Feedpress Generator – External RSS Frontend Customizer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.2.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
[]
null
6.1
null
null
CVE-2023-33988
Cross-Site Scripting vulnerability in SAP Enable Now
In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Content-Security-Policy and X-XSS-Protection response headers are not implemented, allowing an unauthenticated attacker to attempt reflected cross-site scripting, which could result in disclosure or modification of information.
[ "cpe:2.3:a:sap:enable_now:-:*:*:*:*:*:*:*" ]
null
6.1
null
null
CVE-2017-12798
Cross-Site Scripting (XSS) exists in NexusPHP version v1.5 via the q parameter to searchsuggest.php.
[ "cpe:2.3:a:nexusphp_project:nexusphp:1.5:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-2xrp-fqg8-p623
IBM Connect:Direct for UNIX 6.1.0, 6.0.0, 4.3.0, and 4.2.0 can allow a local or remote user to obtain an authenticated CLI session due to improper authentication methods. IBM X-Force ID: 188516.
[]
null
null
null
null
GHSA-6vr4-gxc3-8q35
Vulnerability in the Primavera Portfolio Management product of Oracle Construction and Engineering (component: Web API). Supported versions that are affected are 18.0.0.0-18.0.3.0, 19.0.0.0-19.0.1.2 and 20.0.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Primavera Portfolio Management. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Primavera Portfolio Management accessible data as well as unauthorized read access to a subset of Primavera Portfolio Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N).
[]
null
null
null
null
GHSA-9v3j-cgxq-66w9
Multiple stack-based buffer overflows in 3Com 3CTftpSvc 2.0.1, and possibly earlier, allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a long mode field (aka transporting mode) in a (1) GET or (2) PUT command.
[]
null
null
null
null
GHSA-w7w4-m49g-rp26
In Teradici PCoIP Agent before 19.08.1 and PCoIP Client before 19.08.3, an unquoted service path can cause execution of %PROGRAMFILES(X86)%\Teradici\PCoIP.exe instead of the intended pcoip_vchan_printing_svc.exe file.
[]
null
null
null
null
CVE-2013-6878
Cross-site scripting (XSS) vulnerability in the Mijosoft MijoSearch component 2.0.4 and earlier for Joomla! allows remote attackers to inject arbitrary web script or HTML via the query parameter to component/mijosearch/search.
[ "cpe:2.3:a:miwisoft:mijosearch:*:*:*:*:*:joomla\\!:*:*" ]
null
6.1
null
4.3
GHSA-pc58-v5qw-h9qf
The Siemens SPCanywhere application for Android does not properly store application passwords, which allows physically proximate attackers to obtain sensitive information by examining the device filesystem.
[]
null
null
null
null
GHSA-9g6m-wjrr-69cm
SQL injection vulnerability in Yeager CMS 1.2.1 allows remote attackers to execute arbitrary SQL commands via the "passwordreset&token" parameter.
[]
null
null
null
null
CVE-2025-20891
Out-of-bounds read in decoding malformed bitstream of video thumbnails in libsthmbc.so prior to SMR Jan-2025 Release 1 allows local attackers to read arbitrary memory. User interaction is required for triggering this vulnerability.
[]
null
5.3
null
null
CVE-2005-0875
Multiple buffer overflows in the Yahoo plug-in for Trillian 2.0, 3.0, and 3.1 allow remote web servers to cause a denial of service (application crash) via a long string in an HTTP 1.1 response header.
[ "cpe:2.3:a:cerulean_studios:trillian:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cerulean_studios:trillian:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:cerulean_studios:trillian:3.1:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-0477
Auto Featured Image < 3.9.16 - Author+ Arbitrary File Upload
The Auto Featured Image (Auto Post Thumbnail) WordPress plugin before 3.9.16 includes an AJAX endpoint that allows any user with at least Author privileges to upload arbitrary files, such as PHP files. This is caused by incorrect file extension validation.
[ "cpe:2.3:a:cm-wp:auto_featured_image:*:*:*:*:*:wordpress:*:*" ]
null
8.8
null
null
CVE-2021-42326
Redmine before 4.1.5 and 4.2.x before 4.2.3 may disclose the names of users on activity views due to an insufficient access filter.
[ "cpe:2.3:a:redmine:redmine:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
CVE-2016-6784
An elevation of privilege vulnerability in the MediaTek driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: N/A. Android ID: A-31350755. References: MT-ALPS02961424.
[ "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*" ]
null
null
7
9.3
GHSA-49p9-5x29-ccrv
GNUBOARD5 5.3.1.9 has XSS that allows remote attackers to inject arbitrary web script or HTML via the "Menu Link" parameter, aka the adm/menu_list_update.php me_link parameter.
[]
null
null
6.1
null
GHSA-33f2-r445-jvq6
Overlayfs in the Linux kernel and shiftfs, a non-upstream patch to the Linux kernel included in the Ubuntu 5.0 and 5.3 kernel series, both replace vma->vm_file in their mmap handlers. On error the original value is not restored, and the reference is put for the file to which vm_file points. On upstream kernels this is not an issue, as no callers dereference vm_file following after call_mmap() returns an error. However, the aufs patchs change mmap_region() to replace the fput() using a local variable with vma_fput(), which will fput() vm_file, leading to a refcount underflow.
[]
null
null
null
null
GHSA-77r3-hpmv-72f8
Directory traversal vulnerability in filedownload.php in xml2owl 0.1.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the file parameter.
[]
null
null
null
null
GHSA-f279-w6jr-7xxj
Use After Free vulnerability in Arm Ltd Midgard GPU Kernel Driver, Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to exploit a software race condition to perform improper memory processing operations. If the system’s memory is carefully prepared by the user and the system is under heavy load, then this in turn cause a use-after-free.This issue affects Midgard GPU Kernel Driver: from r13p0 through r32p0; Bifrost GPU Kernel Driver: from r1p0 through r18p0; Valhall GPU Kernel Driver: from r37p0 through r46p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r46p0.
[]
null
8.4
null
null
GHSA-9xg8-22rr-c6vh
Pivotal Concourse, all versions prior to 4.2.2, puts the user access token in a url during the login flow. A remote attacker who gains access to a user's browser history could obtain the access token and use it to authenticate as the user.
[]
null
null
7.5
null
GHSA-24wc-7r9r-xg28
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WEN Themes WEN Responsive Columns allows Stored XSS.This issue affects WEN Responsive Columns: from n/a through 1.3.2.
[]
null
6.5
null
null
GHSA-5ffg-379q-g96f
Mattermost 6.0 and earlier fails to sufficiently validate the email address during registration, which allows attackers to trick users into signing up using attacker-controlled email addresses via crafted invitation token.
[]
null
null
null
null
CVE-2022-22571
An authenticated high privileged user can perform a stored XSS attack due to incorrect output encoding in Incapptic connect and affects all current versions.
[ "cpe:2.3:a:ivanti:incapptic_connect:*:*:*:*:*:*:*:*" ]
null
4.8
null
3.5
CVE-2005-1446
SitePanel 2.6.1 and earlier (SitePanel2) allows remote attackers to upload and execute arbitrary files such as PHP scripts via an attachment to a trouble ticket.
[ "cpe:2.3:a:sitepanel:sitepanel:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2014-7748
The Garip Ve Ilginc Olaylar (aka com.wGaripveeIlgincOlay) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[ "cpe:2.3:a:garip_ve_ilginc_olaylar_project:garip_ve_ilginc_olaylar:0.1:*:*:*:*:android:*:*" ]
null
null
null
5.4
GHSA-rq57-8pjv-c6r7
IBM System Storage DS8900F 89.22.19.0, 89.30.68.0, 89.32.40.0, 89.33.48.0, 89.40.83.0, and 89.40.93.0 could allow a remote user to create an LDAP connection with a valid username and empty password to establish an anonymous connection.   IBM X-Force ID: 279518.
[]
null
5
null
null
GHSA-p3v2-vxq8-x73m
** DISPUTED ** PHP remote file inclusion vulnerability in include/plugin/block.t.php in Peter Schmidt phpmyProfiler 0.9.6b allows remote attackers to execute arbitrary PHP code via a URL in the pmp_rel_path parameter. NOTE: this issue is disputed by CVE because the applicable require_once is in a function that is not called on a direct request.
[]
null
null
null
null
GHSA-jrcw-x2cf-77fv
The Telephony subsystem in Apple iOS before 8.4 allows physically proximate attackers to execute arbitrary code via a crafted (1) SIM or (2) UIM card.
[]
null
null
null
null
GHSA-5xvr-vww3-xh7v
PHP remote file inclusion vulnerability in function.php in Ultimate Fun Book 1.02 allows remote attackers to execute arbitrary PHP code via a URL in the gbpfad parameter. NOTE: some sources mention "Ultimate Fun Board," but this appears to be an error.
[]
null
null
null
null
GHSA-mw3c-7pfv-wjvv
PHP remote file inclusion vulnerability in w-Agora 4.1.3 allows remote attackers to execute arbitrary PHP code via the inc_dir parameter.
[]
null
null
null
null
GHSA-wqmm-q65g-2hqr
Paramiko Unsafe randomness usage may allow access to sensitive information
common.py in Paramiko 1.7.1 and earlier, when using threads or forked processes, does not properly use RandomPool, which allows one session to obtain sensitive information from another session by predicting the state of the pool.
[]
7.1
6.5
null
null
GHSA-gqmj-9q6x-4fvg
Buffer overflow in getconf in IBM AIX 5.2 to 5.3 allows local users to execute arbitrary code via unknown vectors.
[]
null
null
null
null
CVE-2025-21731
nbd: don't allow reconnect after disconnect
In the Linux kernel, the following vulnerability has been resolved: nbd: don't allow reconnect after disconnect Following process can cause nbd_config UAF: 1) grab nbd_config temporarily; 2) nbd_genl_disconnect() flush all recv_work() and release the initial reference: nbd_genl_disconnect nbd_disconnect_and_put nbd_disconnect flush_workqueue(nbd->recv_workq) if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, ...)) nbd_config_put -> due to step 1), reference is still not zero 3) nbd_genl_reconfigure() queue recv_work() again; nbd_genl_reconfigure config = nbd_get_config_unlocked(nbd) if (!config) -> succeed if (!test_bit(NBD_RT_BOUND, ...)) -> succeed nbd_reconnect_socket queue_work(nbd->recv_workq, &args->work) 4) step 1) release the reference; 5) Finially, recv_work() will trigger UAF: recv_work nbd_config_put(nbd) -> nbd_config is freed atomic_dec(&config->recv_threads) -> UAF Fix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so that nbd_genl_reconfigure() will fail.
[]
null
7.8
null
null
CVE-2023-7286
ACF Quick Edit Fields <= 3.2.2 - Authenticated (Contributor+) Insecure Direct Object Reference
The plugin ACF Quick Edit Fields for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 3.2.2. This makes it possible for attackers without the edit_users capability to access metadata of other users, this includes contributor-level users and above.
[]
null
6.5
null
null
CVE-2023-26063
Certain Lexmark devices through 2023-02-19 access a Resource By Using an Incompatible Type.
[ "cpe:2.3:o:lexmark:cxtpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx930:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx931:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx942:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx943:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx944:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9335:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9445:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9455:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc9465:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstpc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs943:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtct_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx432:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3142:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtpm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx931:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtmm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx730:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx735:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4352:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlsg_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2236:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mslbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3340:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1342:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxlbd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb3442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1342:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m3250:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms321:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms621:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxngm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2338:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx321:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2442:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2546:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2650:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx521:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1242:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm1246:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3250:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:msngw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:b2865:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms821:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms823:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms825:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mstgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5255:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms826:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:mxtgw_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mb2770:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx721:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx722:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx725:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx822:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx826:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5365:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5370:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7355:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7370:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs439:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cslbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c3326:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs331:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx431:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3426:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxlbl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3224:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc3326:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cstzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2240:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs622:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:csnzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2325:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2425:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs521:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:cxtzj_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx522:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx622:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx625:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2535:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2640:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2235:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc4240:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx421:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc232:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mc2425:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lw80_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx610:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx611:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx617:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm3150:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163dn:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms710:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms711:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810dn:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms811:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812dn:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms817:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms818:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5163de:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms810de:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:m5170:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms812de:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx710:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx711:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx717:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx718:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx810:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx811:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx812:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5163:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5170:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5263:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm5270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7163:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7170:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7263:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm7270:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:ms911:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx910:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx911:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx912:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm9145:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm9155:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xm9165:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:mx6500e:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs310:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs317:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs410:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs417:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c2132:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs510:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs517:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx310:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx317:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx410:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx417:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2130:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx510:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cx517:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xc2132:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lhs60_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c746:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c792:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:cs796:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c925:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c950:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x548:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs548:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x746:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs748:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x792:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs795:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs796:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs798:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x925:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs925:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x950:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x952:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x954:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs950:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:xs955:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:6500e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lr_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c734:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:c736:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:e46x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:t65x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x46x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x65x:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x73x:-:*:*:*:*:*:*:*", "cpe:2.3:o:lexmark:lp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:w850:-:*:*:*:*:*:*:*", "cpe:2.3:h:lexmark:x86x:-:*:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2019-1794
Cisco Directory Connector Search Order Hijacking Vulnerability
A vulnerability in the search path processing of Cisco Directory Connector could allow an authenticated, local attacker to load a binary of their choosing. The vulnerability is due to uncontrolled search path elements. An attacker could exploit this vulnerability by placing a binary of their choosing earlier in the search path utilized by Cisco Directory Connector to locate and load required resources.
[ "cpe:2.3:a:cisco:meeting_server:2.2:*:*:*:*:*:*:*" ]
null
null
5.1
null
GHSA-q437-w69m-98g7
Matrimony v1.0 was discovered to contain a SQL injection vulnerability via the Password parameter.
[]
null
9.8
null
null
GHSA-w932-f265-m42g
Macromedia JRun 3.0, 3.1, and 4.0 allow remote attackers to view the source code of .JSP files via Unicode encoded character values in a URL.
[]
null
null
null
null
CVE-2013-2825
The DNP3 service in the Outstation component on Elecsys Director Gateway devices with kernel 2.6.32.11ael1 and earlier allows remote attackers to cause a denial of service (CPU consumption and communication outage) via crafted input.
[ "cpe:2.3:o:elecsyscorp:director_dnp3_outstation_kernel:2.6.32.11:ae11:*:*:*:*:*:*", "cpe:2.3:h:elecsyscorp:director_industrial_communication_gateway:-:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2017-16107
pooledwebsocket is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url.
[ "cpe:2.3:a:pooledwebsocket_project:pooledwebsocket:*:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
GHSA-qwvv-8h5h-p3cc
Novell iManager 2.7.x before 2.7 SP7 Patch 10 HF1 and NetIQ iManager 3.x before 3.0.3.1 have persistent CSRF in object management.
[]
null
null
8.8
null
CVE-2019-10368
A cross-site request forgery vulnerability in Jenkins JClouds Plugin 2.14 and earlier in BlobStoreProfile.DescriptorImpl#doTestConnection and JCloudsCloud.DescriptorImpl#doTestConnection allowed users with Overall/Read access to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[ "cpe:2.3:a:jenkins:jclouds:*:*:*:*:*:jenkins:*:*" ]
null
null
8.8
6.8
GHSA-xq4c-4fcc-74mp
There is a Null pointer dereference vulnerability in the camera module in smartphones. Successful exploitation of this vulnerability may affect service integrity.
[]
null
null
null
null
GHSA-wxfr-9v84-73vc
A vulnerability in the DLL loading mechanism of Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to perform a DLL hijacking attack on an affected device if the VPN Posture (HostScan) Module is installed on the AnyConnect client. This vulnerability is due to a race condition in the signature verification process for DLL files that are loaded on an affected device. An attacker could exploit this vulnerability by sending a series of crafted interprocess communication (IPC) messages to the AnyConnect process. A successful exploit could allow the attacker to execute arbitrary code on the affected device with SYSTEM privileges. To exploit this vulnerability, the attacker must have valid credentials on the Windows system.
[]
null
6.7
null
null
GHSA-frxp-xxx8-hrg6
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.
[]
null
4.3
null
null
CVE-2021-40392
An information disclosure vulnerability exists in the Web Application functionality of Moxa MXView Series 3.2.4. Network sniffing can lead to a disclosure of sensitive information. An attacker can sniff network traffic to exploit this vulnerability.
[ "cpe:2.3:a:moxa:mxview:3.2.4:*:*:*:*:*:*:*" ]
null
null
5.3
null
CVE-2022-38974
WordPress WPML Multilingual CMS premium plugin <= 4.5.10 - Broken Access Control vulnerability
Broken Access Control vulnerability in WPML Multilingual CMS premium plugin <= 4.5.10 on WordPress allows users with subscriber or higher user roles to change the status of the translation jobs.
[ "cpe:2.3:a:wpml:wpml:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2020-1093
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1058, CVE-2020-1060.
[ "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*" ]
null
7.5
null
7.6
GHSA-r5x6-vq9j-ccgv
Guidance Software EnCase Enterprise Edition (EEE) 6 does not properly verify the identity of the acquisition target during communication with the EnCase Servlet (EEE servlet), which might allow remote attackers to spoof the disk image.
[]
null
null
null
null
CVE-2021-21178
Inappropriate implementation in Compositing in Google Chrome on Linux and Windows prior to 89.0.4389.72 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
CVE-2024-50158
RDMA/bnxt_re: Fix out of bound check
In the Linux kernel, the following vulnerability has been resolved: RDMA/bnxt_re: Fix out of bound check Driver exports pacing stats only on GenP5 and P7 adapters. But while parsing the pacing stats, driver has a check for "rdev->dbr_pacing". This caused a trace when KASAN is enabled. BUG: KASAN: slab-out-of-bounds in bnxt_re_get_hw_stats+0x2b6a/0x2e00 [bnxt_re] Write of size 8 at addr ffff8885942a6340 by task modprobe/4809
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*" ]
null
7.8
null
null
CVE-2023-20025
A vulnerability in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, and RV082 Routers could allow an unauthenticated, remote attacker to bypass authentication on an affected device. This vulnerability is due to improper validation of user input within incoming HTTP packets. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface. A successful exploit could allow the attacker to bypass authentication and gain root access on the underlying operating system.
[ "cpe:2.3:o:cisco:rv016_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv082_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*" ]
null
9
null
null
GHSA-4g82-3jcr-q52w
Malware in ctx
The `ctx` hosted project on [PyPI](https://pypi.org/project/ctx/) was taken over via user account compromise and replaced with a malicious project which contained runtime code that collected the content of `os.environ.items()` when instantiating `Ctx` objects. The captured environment variables were sent as a base64 encoded query parameter to a heroku application running at `https://anti-theft-web.herokuapp.com`.If you installed the package between May 14, 2022 and May 24, 2022, and your environment variables contain sensitive data like passwords and API keys (like `AWS_ACCESS_KEY_ID` and `AWS_SECRET_ACCESS_KEY`), we advise you to rotate your passwords and keys, then perform an audit to determine if they were exploited.
[]
null
null
null
null
GHSA-7vqj-q42p-29c8
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations.
[]
null
null
null
null
GHSA-w38m-qrcj-jg5r
Google V8, as used in Google Chrome before 34.0.1847.116, does not properly use numeric casts during handling of typed arrays, which allows remote attackers to cause a denial of service (out-of-bounds array access) or possibly have unspecified other impact via crafted JavaScript code.
[]
null
null
null
null
CVE-2012-4579
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.2.2 allow remote authenticated users to inject arbitrary web script or HTML via a Table Operations (1) TRUNCATE or (2) DROP link for a crafted table name, (3) the Add Trigger popup within a Triggers page that references crafted table names, (4) an invalid trigger-creation attempt for a crafted table name, (5) crafted data in a table, or (6) a crafted tooltip label name during GIS data visualization, a different issue than CVE-2012-4345.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:phpmyadmin:phpmyadmin:3.5.2.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-2h5r-mrp2-g8m3
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in SendPress Newsletters plugin <= 1.23.11.6 versions.
[]
null
7.1
null
null
GHSA-qqfg-93rc-qwq3
Unspecified vulnerability in PHP before 5.2.4 has unknown impact and attack vectors, related to an "Improved fix for MOPB-03-2007," probably a variant of CVE-2007-1285.
[]
null
null
null
null
CVE-2021-36705
In ProLink PRC2402M V1.0.18 and older, the set_TR069 function in the adm.cgi binary, accessible with a page parameter value of TR069 contains a trivial command injection where the value of the TR069_local_port parameter is passed directly to system.
[ "cpe:2.3:o:prolink:prc2402m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:prolink:prc2402m:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
CVE-2014-10069
Hitron CVE-30360 devices use a 578A958E3DD933FC DES key that is shared across different customers' installations, which makes it easier for attackers to obtain sensitive information by decrypting a backup configuration file, as demonstrated by a password hash in the um_auth_account_password field.
[ "cpe:2.3:o:hitrontech:cve-30360_firmware:3.1.1.21:*:*:*:*:*:*:*", "cpe:2.3:h:hitrontech:cve-30360:-:*:*:*:*:*:*:*" ]
null
null
7.5
5
CVE-2021-35370
An issue found in Peacexie Imcat v5.4 allows attackers to execute arbitrary code via the incomplete filtering function.
[ "cpe:2.3:a:txjia:imcat:5.4:*:*:*:*:*:*:*" ]
null
9.8
null
null
GHSA-x3rc-h9v8-w5jq
Permission control vulnerability in the calendarProvider module.Successful exploitation of this vulnerability may affect service confidentiality.
[]
null
7.5
null
null
RHSA-2021:2499
Red Hat Security Advisory: OpenShift Container Platform 4.6.36 security update
jetty: local temporary directory hijacking vulnerability jetty: buffer not correctly recycled in Gzip Request inflation jetty: request containing multiple Accept headers with a large number of "quality" parameters may lead to DoS
[ "cpe:/a:redhat:openshift:4.6::el7", "cpe:/a:redhat:openshift:4.6::el8" ]
null
5.3
null
null
GHSA-9qfr-vx9q-5vh6
The mintToken function of a smart contract implementation for CCindex10 (T10), an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[]
null
7.5
null
null
GHSA-34h4-6895-w557
Cross-Site Request Forgery (CSRF) vulnerability in theDotstore Product Attachment for WooCommerce plugin <= 2.1.8 versions.
[]
null
4.3
null
null
GHSA-chrg-mx57-ghvc
Cross-Site Request Forgery (CSRF) vulnerability in MainWP Matomo Extension <= 4.0.4 versions.
[]
null
8.8
null
null
CVE-2016-6513
epan/dissectors/packet-wbxml.c in the WBXML dissector in Wireshark 2.x before 2.0.5 does not restrict the recursion depth, which allows remote attackers to cause a denial of service (application crash) via a crafted packet.
[ "cpe:2.3:a:wireshark:wireshark:2.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:wireshark:wireshark:2.0.4:*:*:*:*:*:*:*" ]
null
null
5.9
4.3
CVE-2006-4830
Directory traversal vulnerability in EditBlogTemplatesPlugin.java in David Czarnecki Blojsom 2.30 allows remote attackers to have an unknown impact by sending an HTTP request with a certain value of blogTemplate.
[ "cpe:2.3:a:blojsom:blojsom:2.30:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2017-2632
A logic error in valid_role() in CloudForms role validation before 5.7.1.3 could allow a tenant administrator to create groups with a higher privilege level than the tenant administrator should have. This would allow an attacker with tenant administration access to elevate privileges.
[ "cpe:2.3:a:redhat:cloudforms_management_engine:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:cloudforms:4.2:*:*:*:*:*:*:*" ]
null
null
4.9
null
End of preview. Expand in Data Studio

Sources of the data

  • CVE Program (enriched with data from vulnrichment and Fraunhofer FKIE)
  • GitHub Security Advisories
  • PySec advisories
  • CSAF Red Hat
  • CSAF Cisco
  • CSAF CISA

Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.

Query with datasets

import json
from datasets import load_dataset

dataset = load_dataset("CIRCL/vulnerability-scores")

vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]

filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)

for entry in filtered_entries["train"]:
    print(json.dumps(entry, indent=4))
Downloads last month
341

Models trained or fine-tuned on CIRCL/vulnerability-scores