CIRCL/vulnerability-severity-classification-roberta-base
Text Classification
•
0.1B
•
Updated
•
626
•
7
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 38
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2019-5641
|
Rapid7 InsightVM Information Disclosure after Logout
|
Rapid7 InsightVM suffers from an information exposure issue whereby, when the user's session has ended due to inactivity, an attacker can use the Inspect Element browser feature to remove the login panel and view the details available in the last webpage visited by previous user
|
[
"cpe:2.3:a:rapid7:insightvm:*:*:*:*:*:*:*:*"
] | null | 3.3
| null | null | null |
CVE-2017-14585
|
A Server Side Request Forgery (SSRF) vulnerability could lead to remote code execution for authenticated administrators. This issue was introduced in version 2.2.0 of Hipchat Server and version 3.0.0 of Hipchat Data Center. Versions of Hipchat Server starting with 2.2.0 and before 2.2.6 are affected by this vulnerability. Versions of Hipchat Data Center starting with 3.0.0 and before 3.1.0 are affected.
|
[
"cpe:2.3:a:atlassian:hipchat_data_center:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:hipchat_server:*:*:*:*:*:*:*:*"
] | null | null | 7.2
| 9
| null |
|
CVE-2020-9858
|
A dynamic library loading issue was addressed with improved path searching. This issue is fixed in Windows Migration Assistant 2.2.0.0 (v. 1A11). Running the installer in an untrusted directory may result in arbitrary code execution.
|
[
"cpe:2.3:a:apple:windows_migration_assistant:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | 4.4
| null |
|
CVE-2018-12453
|
Type confusion in the xgroupCommand function in t_stream.c in redis-server in Redis before 5.0 allows remote attackers to cause denial-of-service via an XGROUP command in which the key is not a stream.
|
[
"cpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*"
] | null | null | 7.5
| 5
| null |
|
GHSA-w89c-3qr4-xm84
|
Stack-based buffer overflow in the "yyerror" function in Graphviz 2.34.0 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted file. NOTE: This vulnerability exists due to an incomplete fix for CVE-2014-0978.
|
[] | null | null | 7.8
| null | null |
|
CVE-2025-15428
|
UTT 进取 512W formRemoteControl strcpy buffer overflow
|
A weakness has been identified in UTT 进取 512W 1.7.7-171114. Affected is the function strcpy of the file /goform/formRemoteControl. This manipulation of the argument Profile causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 8.7
| 8.8
| 8.8
| 9
| null |
RHSA-2013:0191
|
Red Hat Security Advisory: JBoss Enterprise Application Platform 5.2.0 update
|
JBoss: twiddle.sh accepts credentials as command line arguments, exposing them to other local users via a process listing jbossws: Prone to character encoding pattern attack (XML Encryption flaw) jbossws: Prone to Bleichenbacher attack against to be distributed symmetric key Framework: Information (internal server information, classpath, local working directories, session IDs) disclosure CSRF on jmx-console allows invocation of operations on mbeans Console: XSS in invoke operation Cache: NonManagedConnectionFactory will log password in clear text when an exception occurs JBoss invoker servlets do not require authentication JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started apache-cxf: Apache CXF does not verify that elements were signed / encrypted by a particular Supporting Token JBoss: CallerIdentityLoginModule retaining password from previous call if a null password is provided JBoss: SecurityAssociation.getCredential() will return the previous credential if no security context is provided Web: Bypass of security constraints JBoss: AuthorizationInterceptor allows JMX operation to proceed despite authorization failure
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5::el6"
] | null | null | null | null | null |
CVE-2006-1960
|
Cross-site scripting (XSS) vulnerability in the appliance web user interface in Cisco CiscoWorks Wireless LAN Solution Engine (WLSE) and WLSE Express before 2.13 allows remote attackers to inject arbitrary web script or HTML, possibly via the displayMsg parameter to archiveApplyDisplay.jsp, aka bug ID CSCsc01095.
|
[
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.0:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.1:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.2:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.3:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.4:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.5:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.6:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.7:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.8:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.9:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.10:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.11:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.12:*:express:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:wireless_lan_solution_engine:2.13:*:express:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
CVE-2014-7720
|
The Better Homes and Gardens Aus (aka com.pacificmagazines.betterhomesandgardens) application @7F0801B2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:pacificmags:better_homes_and_gardens_aus:\\@7f0801b2:*:*:*:*:android:*:*"
] | null | null | null | 5.4
| null |
|
GHSA-rw9x-rggx-hc52
|
ImageIO in Apple iOS before 8.4.1 and OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted TIFF image.
|
[] | null | null | null | null | null |
|
CVE-2016-0830
|
btif_config.c in Bluetooth in Android 6.x before 2016-03-01 allows remote attackers to cause a denial of service (memory corruption and persistent daemon crash) by triggering a large number of configuration entries, and consequently exceeding the maximum size of a configuration file, aka internal bug 26071376.
|
[
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*"
] | null | null | 6.5
| 3.3
| null |
|
CVE-2024-3990
|
HT Mega – Absolute Addons For Elementor <= 2.5.0 - Authenticated (Contributor+) Stored Cross-Site Scripting via Tooltip & Popover Widget
|
The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Tooltip & Popover Widget in all versions up to, and including, 2.5.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[] | null | 6.4
| null | null | null |
CVE-2024-50989
|
A SQL injection vulnerability in /omrs/admin/search.php in PHPGurukul Online Marriage Registration System v1.0 allows an attacker to execute arbitrary SQL commands via the "searchdata " parameter.
|
[
"cpe:2.3:a:phpgurukul:online_marriage_registration_system:1.0:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
CVE-2022-24712
|
Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4
|
CodeIgniter4 is the 4.x branch of CodeIgniter, a PHP full-stack web framework. A vulnerability in versions prior to 4.1.9 might allow remote attackers to bypass the CodeIgniter4 Cross-Site Request Forgery (CSRF) protection mechanism. Users should upgrade to version 4.1.9. There are workarounds for this vulnerability, but users will still need to code as these after upgrading to v4.1.9. Otherwise, the CSRF protection may be bypassed. If auto-routing is enabled, check the request method in the controller method before processing. If auto-routing is disabled, either avoid using `$routes->add()` and instead use HTTP verbs in routes; or check the request method in the controller method before processing.
|
[
"cpe:2.3:a:codeigniter:codeigniter:*:*:*:*:*:*:*:*"
] | null | 6.3
| null | null | null |
GHSA-xpvq-3p7m-m5gw
|
Misys FusionCapital Opics Plus does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to obtain sensitive information via a crafted certificate.
|
[] | null | null | 5.9
| null | null |
|
CVE-2024-8054
|
MM-Breaking News <= 0.7.9 - Stored XSS via CSRF
|
The MM-Breaking News WordPress plugin through 0.7.9 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack.
|
[
"cpe:2.3:a:mm_breaking_news:mm_breaking_news:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mm-breaking_news_project:mm-breaking_news:*:*:*:*:*:wordpress:*:*"
] | null | 6.1
| null | null | null |
CVE-2017-0793
|
A information disclosure vulnerability in the N/A memory subsystem. Product: Android. Versions: Android kernel. Android ID: A-35764946.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 5.5
| 7.1
| null |
|
GHSA-9cxv-8fwp-3hgq
|
Sympa 6.2.38 through 6.2.52 allows remote attackers to cause a denial of service (disk consumption from temporary files, and a flood of notifications to listmasters) via a series of requests with malformed parameters.
|
[] | null | null | null | null | null |
|
CVE-2022-22377
|
IBM Security Verify Privilege information disclosure
|
IBM Security Verify Privilege On-Premises 11.5 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 221827.
|
[
"cpe:2.3:a:ibm:security_verify_privilege_on-premises:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
CVE-2024-56736
|
Apache HertzBeat: Server-Side Request Forgery (SSRF) in Api Config Oss
|
Server-Side Request Forgery (SSRF) vulnerability in Apache HertzBeat.
This issue affects Apache HertzBeat (incubating): before 1.7.0.
Users are recommended to upgrade to version 1.7.0, which fixes the issue.
|
[] | null | 6.5
| null | null | null |
GHSA-rf22-j4q7-f2f8
|
Sagemcom F@st 5260 routers using firmware version 0.4.39, in WPA mode, default to using a PSK that is generated from a 2-part wordlist of known values and a nonce with insufficient entropy. The number of possible PSKs is about 1.78 billion, which is too small.
|
[] | null | null | 5.3
| null | null |
|
CVE-2024-32455
|
WordPress Fatal Error Notify plugin <= 1.5.2 - Broken Access Control vulnerability
|
Missing Authorization vulnerability in Very Good Plugins Fatal Error Notify.This issue affects Fatal Error Notify: from n/a through 1.5.2.
|
[] | null | 4.3
| null | null | null |
CVE-2011-3727
|
DokuWiki 2009-12-25c allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by lib/tpl/index.php and certain other files.
|
[
"cpe:2.3:a:dokuwiki:dokuwiki:2009-12-25c:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-ppcq-248q-f293
|
Adobe Framemaker versions 2019.0.4 and below have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2008-0281
|
SQL injection vulnerability in liste.php in ID-Commerce 2.0 and earlier allows remote attackers to execute arbitrary SQL commands via the idFamille parameter.
|
[
"cpe:2.3:a:id-commerce:id-commerce:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-9mpf-qr4j-4fp9
|
hw/usb/bus.c in QEMU 1.6.2 allows remote attackers to execute arbitrary code via crafted savevm data, which triggers a heap-based buffer overflow, related to "USB post load checks."
|
[] | null | null | null | null | null |
|
CVE-2022-25460
|
Tenda AC6 v15.03.05.09_multi was discovered to contain a stack overflow via the endip parameter in the SetPptpServerCfg function.
|
[
"cpe:2.3:o:tenda:ac6_firmware:15.03.05.09:*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
GHSA-h7mm-rm52-m4cv
|
Unspecified vulnerability in the Java SE and Java SE Embedded components in Oracle Java SE Java SE 7u40 and earlier, Java SE 6u60 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect integrity via unknown vectors related to Deployment.
|
[] | null | null | null | null | null |
|
CVE-2018-5048
|
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 6.5
| 4.3
| null |
|
GHSA-pvg5-p5vq-vw3r
|
Microsoft Internet Explorer 6 and earlier allows remote attackers to cause a denial of service (application hang) via a CSS-formatted HTML INPUT element within a DIV element that has a larger size than the INPUT.
|
[] | null | null | null | null | null |
|
CVE-2022-31608
|
NVIDIA GPU Display Driver for Linux contains a vulnerability in an optional D-Bus configuration file, where a local user with basic capabilities can impact protected D-Bus endpoints, which may lead to code execution, denial of service, escalation of privileges, information disclosure, and data tampering.
|
[
"cpe:2.3:a:nvidia:gpu_display_driver:*:*:*:*:*:linux:*:*",
"cpe:2.3:h:nvidia:geforce:-:*:*:*:*:*:*:*",
"cpe:2.3:a:nvidia:rtx:-:*:*:*:*:*:*:*",
"cpe:2.3:h:nvidia:tesla:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
CVE-2021-31815
|
GAEN (aka Google/Apple Exposure Notifications) through 2021-04-27 on Android allows attackers to obtain sensitive information, such as a user's location history, in-person social graph, and (sometimes) COVID-19 infection status, because Rolling Proximity Identifiers and MAC addresses are written to the Android system log, and many Android devices have applications (preinstalled by the hardware manufacturer or network operator) that read system log data and send it to third parties. NOTE: a news outlet (The Markup) states that they received a vendor response indicating that fix deployment "began several weeks ago and will be complete in the coming days."
|
[
"cpe:2.3:a:google:google\\/apple_exposure_notifications:*:*:*:*:*:android:*:*"
] | null | 3.3
| null | 2.1
| null |
|
CVE-2024-35964
|
Bluetooth: ISO: Fix not validating setsockopt user input
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: ISO: Fix not validating setsockopt user input
Check user input length before copying data.
|
[] | null | 7.1
| null | null | null |
CVE-2023-6350
|
Use after free in libavif in Google Chrome prior to 119.0.6045.199 allowed a remote attacker to potentially exploit heap corruption via a crafted avif file. (Chromium security severity: High)
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
|
CVE-2014-125102
|
Bestwebsoft Relevant Plugin Thumbnail information disclosure
|
A vulnerability classified as problematic was found in Bestwebsoft Relevant Plugin up to 1.0.7 on WordPress. Affected by this vulnerability is an unknown functionality of the component Thumbnail Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 1.0.8 is able to address this issue. The identifier of the patch is 860d1891025548cf0f5f97364c1f51a888f523c3. It is recommended to upgrade the affected component. The identifier VDB-230113 was assigned to this vulnerability.
|
[
"cpe:2.3:a:bestwebsoft:relevant:*:*:*:*:*:wordpress:*:*"
] | null | 4.3
| 4.3
| 4
|
https://github.com/wp-plugins/relevant/commit/860d1891025548cf0f5f97364c1f51a888f523c3
|
CVE-2006-2911
|
SQL injection vulnerability in controlpanel/index.php in CMS Mundo before 1.0 build 008 allows remote attackers to execute arbitrary SQL commands via the username parameter.
|
[
"cpe:2.3:a:hotwebscripts:cms_mundo:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:hotwebscripts:cms_mundo:1.0_build_007:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-cjw9-x64q-vcrq
|
Off-by-one buffer overflow in Dnsmasq before 2.21 may allow attackers to execute arbitrary code via the DHCP lease file.
|
[] | null | null | null | null | null |
|
CVE-2006-7058
|
Multiple cross-site scripting (XSS) vulnerabilities in Sphider before 1.3.1c allow remote attackers to inject arbitrary web script or HTML via the catid parameter to (1) templates/standard/search_form.html and (2) templates/dark/search_form.html. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[
"cpe:2.3:a:sphider:sphider:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2012-0769
|
Adobe Flash Player before 10.3.183.16 and 11.x before 11.1.102.63 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.7 on Android 2.x and 3.x; and before 11.1.115.7 on Android 4.x does not properly handle integers, which allows attackers to obtain sensitive information via unspecified vectors.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.280:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.153.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.22:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.26:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.183.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.0.1.153:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.55:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:11.1.102.62:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.102.59:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.111.5:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_for_android:11.1.112.61:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2025-49669
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
|
[] | null | 8.8
| null | null | null |
CVE-2023-49738
|
An information disclosure vulnerability exists in the image404Raw.php functionality of WWBN AVideo dev master commit 15fed957fb. A specially crafted HTTP request can lead to arbitrary file read.
|
[
"cpe:2.3:a:wwbn:avideo:15fed957fb:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
|
CVE-2022-3558
|
Import and export users and customers < 1.20.5 - Subscriber+ CSV Injection
|
The Import and export users and customers WordPress plugin before 1.20.5 does not properly escape data when exporting it via CSV files.
|
[
"cpe:2.3:a:codection:import_and_export_users_and_customers:*:*:*:*:*:wordpress:*:*"
] | null | 8
| null | null | null |
GHSA-hfrc-jq43-4m6c
|
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
|
[] | null | 8.5
| null | null | null |
|
CVE-2023-28412
|
When supplied with a random MAC address, Snap One OvrC cloud servers will return information about the device. The MAC address of devices can be enumerated in an attack and the OvrC cloud will disclose their information.
|
[
"cpe:2.3:a:snapone:orvc:*:*:*:*:*:pro:*:*",
"cpe:2.3:h:control4:ca-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:control4:ca-10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:control4:ea-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:control4:ea-3:-:*:*:*:*:*:*:*",
"cpe:2.3:h:control4:ea-5:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:an-110-rt-2l1w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:an-110-rt-2l1w-wifi:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:an-310-rt-4l2w:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:ovrc-300-pro:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:pakedge_rk-1:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:pakedge_rt-3100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:snapone:pakedge_wr-1:-:*:*:*:*:*:*:*"
] | null | 5.3
| null | null | null |
|
GHSA-7xx8-q94h-j3c8
|
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field.
|
[] | null | null | 6.5
| null | null |
|
GHSA-8m7r-8qq7-44rp
|
TOTOlink A7100RU V7.4cu.2313_B20191024 is vulnerable to Command Injection Vulnerability in the httpd service. An attacker can obtain a stable root shell through a specially constructed payload.
|
[] | null | 9.8
| null | null | null |
|
GHSA-2pcp-v6xv-h7m7
|
The Migration component in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.25 and 7.0 before 7.0.0.5, when tracing is enabled and a 6.1 to 7.0 migration has occurred, allows remote authenticated users to obtain sensitive information by reading a Migration Trace file.
|
[] | null | null | null | null | null |
|
CVE-2019-11599
|
The coredump implementation in the Linux kernel before 5.0.10 does not use locking or other mechanisms to prevent vma layout or vma flags changes while it runs, which allows local users to obtain sensitive information, cause a denial of service, or possibly have unspecified other impact by triggering a race condition with mmget_not_zero or get_task_mm calls. This is related to fs/userfaultfd.c, mm/mmap.c, fs/proc/task_mmu.c, and drivers/infiniband/core/uverbs_main.c.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | 7
| null | 6.9
| null |
|
GHSA-4rx6-g5vg-5f3j
|
Juniper is vulnerable to @DOS GraphQL Nested Fragments overflow
|
GraphQL behaviourNested fragment in GraphQL might be quite hard to handle depending on the implementation language.
Some language support natively a max recursion depth. However, on most compiled languages, you should add a threshold of recursion.POC TLDRWith max_size being the number of nested fragment generated.
At max_size=7500, it should instantly raise:However, with a lower size, you will overflow the memory after some iterations.Reproduction steps (Juniper)Save this POC as poc.pyCredits[@Escape-Technologies](https://escape.tech)@c3b5aw
@MdotTIM
@karimhreda
|
[] | null | 7.5
| null | null | null |
GHSA-6xc8-63f8-5g3w
|
SupportAssist for Home PCs versions 4.8.2 and prior and SupportAssist for Business PCs versions 4.5.3 and prior, contain an UNIX Symbolic Link (Symlink) following vulnerability. A low privileged attacker with local access to the system could potentially exploit this vulnerability to delete arbitrary files only in that affected system.
|
[] | null | 6.3
| null | null | null |
|
GHSA-wm9h-7495-f66q
|
A remote code execution vulnerability in the Android media framework. Product: Android. Versions: 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-34779227.
|
[] | null | null | 7.8
| null | null |
|
GHSA-pmrw-379c-rjhc
|
ServiceNow ITSM 2016-06-02 has XSS via the First Name or Last Name field of My Profile (aka navpage.do), or the Search bar of My Portal (aka search_results.do).
|
[] | null | null | 5.4
| null | null |
|
RHSA-2020:0027
|
Red Hat Security Advisory: kpatch-patch security update
|
Kernel: KVM: OOB memory access via mmio ring buffer kernel: local attacker can trigger multiple use-after-free conditions results in privilege escalation
|
[
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | null | 7.4
| null | null |
GHSA-p5cf-ff3x-jwfr
|
Cross-site scripting (XSS) vulnerability in the search feature in the Forum plugin before 2.7.1 for Geeklog allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably related to (1) public_html/index.php, (2) config.php, and (3) functions.inc.
|
[] | null | null | null | null | null |
|
GHSA-6x8h-r754-qv46
|
Apple Safari before 6.0.1 makes http requests for https URIs in certain circumstances involving a paste into the address bar, which allows user-assisted remote attackers to obtain sensitive information by sniffing the network.
|
[] | null | null | null | null | null |
|
GHSA-6x5j-5m95-64xw
|
In getNearbyNotificationStreamingPolicy of DevicePolicyManagerService.java, there is a possible way to learn about the notification streaming policy of other users due to a permissions bypass. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-235822336
|
[] | null | 5.5
| null | null | null |
|
CVE-2005-3291
|
Stani's Python Editor (SPE) 0.7.5 is installed with world-writable permissions, which allows local users to gain privileges by modifying executable files.
|
[
"cpe:2.3:a:stani:stanis_python_editor:0.7.5:*:*:*:*:*:*:*"
] | null | null | null | 4.6
| null |
|
CVE-2011-3447
|
CFNetwork in Apple Mac OS X 10.7.x before 10.7.3 does not properly construct request headers during parsing of URLs, which allows remote attackers to obtain sensitive information via a malformed URL.
|
[
"cpe:2.3:o:apple:mac_os_x:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.7.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
GHSA-qxh8-mp37-jm94
|
Azure Bot Service Elevation of Privilege Vulnerability
|
[] | null | 9
| null | null | null |
|
GHSA-7fhj-9wp7-2477
|
When cpif handles probe failures, there is a possible out of bounds read due to a use after free. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-259323725References: N/A
|
[] | null | 4.4
| null | null | null |
|
CVE-2022-0138
|
Airspan Networks Mimosa Deserialization of Untrusted Data
|
MMP: All versions prior to v1.0.3, PTP C-series: Device versions prior to v2.8.6.1, and PTMP C-series and A5x: Device versions prior to v2.5.4.1 has a deserialization function that does not validate or check the data, allowing arbitrary classes to be created.
|
[
"cpe:2.3:a:airspan:mimosa_management_platform:*:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:c6x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:c6x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:c5x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:c5x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:c5c_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:c5c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:airspan:a5x_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:airspan:a5x:-:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
GHSA-56r8-63jp-jmf7
|
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Banking Trade Finance. CVSS 3.1 Base Score 5.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:H/A:L).
|
[] | null | 5.9
| null | null | null |
|
GHSA-vvfj-2jqx-52jm
|
JupyterLab LaTeX typesetter links did not enforce `noopener` attribute
|
Links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the `noopener` attribute.This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if:links generated by those extensions included `target=_blank` (no such extensions are known at time of writing) andthey were to click on a link generated in LaTeX (typically visibly different from other links).For consistency with handling on other links, new versions of JupyterLab will enforce `noopener` and `target=_blank` on all links generated by typesetters. The former will harden the resilience of JupyterLab to extensions with lack of secure defaults in link rendering, and the latter will improve user experience by preventing accidental state loss when clicking on links rendered by LaTeX typesetters.ImpactSince the official LaTeX typesetter extensions for JupyterLab: `jupyterlab-mathjax` (default), `jupyterlab-mathjax2` and `jupyterlab-katex` do not include the `target=_blank`, there is no impact for JupyterLab users.PatchesJupyterLab 4.4.8WorkaroundsNo workarounds are necessary.ReferencesNone
|
[] | 2.1
| null | null | null | null |
GHSA-2mq6-rxq2-qgxv
|
Portainer through 1.19.2 provides an API endpoint (/api/users/admin/check) to verify that the admin user is already created. This API endpoint will return 404 if admin was not created and 204 if it was already created. Attackers can set an admin password in the 404 case.
|
[] | null | null | 9.8
| null | null |
|
CVE-2020-3968
|
VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202004101-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds write vulnerability in the USB 3.0 controller (xHCI). A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to crash the virtual machine's vmx process leading to a denial of service condition or execute code on the hypervisor from a virtual machine. Additional conditions beyond the attacker's control must be present for exploitation to be possible.
|
[
"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*",
"cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*"
] | null | 8.2
| null | 4.6
| null |
|
GHSA-2x45-7fc3-mxwq
|
php-jwt v6.11.0 was discovered to contain weak encryption.
|
[] | null | 7.3
| null | null | null |
|
CVE-2023-43787
|
Libx11: integer overflow in xcreateimage() leading to a heap overflow
|
A vulnerability was found in libX11 due to an integer overflow within the XCreateImage() function. This flaw allows a local user to trigger an integer overflow and execute arbitrary code with elevated privileges.
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:2.3:a:x.org:libx11:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
GHSA-x7qv-mjw2-5rwx
|
A use after free in PDFium in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android allowed a remote attacker to have an unspecified impact via a crafted PDF file.
|
[] | null | 7.8
| null | null | null |
|
RHSA-2023:0466
|
Red Hat Security Advisory: Red Hat OpenShift GitOps security update
|
ArgoCD: JWT audience claim is not verified
|
[
"cpe:/a:redhat:openshift_gitops:1.6::el8"
] | null | 8.8
| null | null | null |
CVE-2020-7457
|
In FreeBSD 12.1-STABLE before r359565, 12.1-RELEASE before p7, 11.4-STABLE before r362975, 11.4-RELEASE before p1, and 11.3-RELEASE before p11, missing synchronization in the IPV6_2292PKTOPTIONS socket option set handler contained a race condition allowing a malicious application to modify memory after being freed, possibly resulting in code execution.
|
[
"cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:beta1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:rc2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*"
] | null | 8.1
| null | 6.8
| null |
|
CVE-2022-34555
|
TP-LINK TL-R473G 2.0.1 Build 220529 Rel.65574n was discovered to contain a remote code execution vulnerability which is exploited via a crafted packet.
|
[
"cpe:2.3:o:tp-link:tl-r473g_firmware:2.0.1:build_220529_rel.65574n:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:tl-r473g:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
|
GHSA-5r3x-p7xx-x6q5
|
Comrak AST node data is not validated (GHSL-2023-049)
|
ImpactA Comrak AST can be constructed manually by a program instead of parsing a Markdown document with `parse_document`. This AST can then be converted to HTML via `html::format_document_with_plugins`. However, the HTML formatting code assumes that the AST is well-formed. For example, many AST notes contain `[u8]` fields which the formatting code assumes is valid UTF-8 data. Several bugs can be triggered if this is not the case.Patches0.17.0 contains adjustments to the AST, storing strings instead of unvalidated byte arrays.WorkaroundsValidate UTF-8 correctness of all data when assigning to `&[u8]` and `Vec<u8>` fields in the AST.Referencesn/a
|
[] | null | 5.3
| null | null | null |
CVE-2024-13610
|
Simple Social Media Share Buttons < 6.0.0 - Admin+ Stored XSS
|
The Simple Social Media Share Buttons WordPress plugin before 6.0.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
|
[] | null | 4.8
| null | null | null |
CVE-2022-24484
|
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
|
Windows Cluster Shared Volume (CSV) Denial of Service Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
CVE-2024-7983
|
Denial of Service in open-webui/open-webui
|
In version 0.3.8 of open-webui, an endpoint for converting markdown to HTML is exposed without authentication. A maliciously crafted markdown payload can cause the server to spend excessive time converting it, leading to a denial of service. The server becomes unresponsive to other requests until the conversion is complete.
|
[] | null | null | 7.5
| null | null |
CVE-2023-25833
|
BUG-000155004 HTML injection issue in Portal for ArcGIS.
|
There is an HTML injection vulnerability in Esri Portal for ArcGIS versions 11.0 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked could render arbitrary HTML in the victim’s browser (no stateful change made or customer data rendered).
|
[
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
CVE-2019-19499
|
Grafana <= 6.4.3 has an Arbitrary File Read vulnerability, which could be exploited by an authenticated attacker that has privileges to modify the data source configurations.
|
[
"cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | 4
| null |
|
CVE-2022-3962
|
Kiali: error message spoofing in kiali ui
|
A content spoofing vulnerability was found in Kiali. It was discovered that Kiali does not implement error handling when the page or endpoint being accessed cannot be found. This issue allows an attacker to perform arbitrary text injection when an error response is retrieved from the URL being accessed.
|
[
"cpe:2.3:a:kiali:kiali:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_service_mesh:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.0:*:*:*:*:*:*:*",
"cpe:/a:redhat:service_mesh:2.3::el8",
"cpe:/a:redhat:service_mesh:2.1"
] | null | 4.3
| null | null | null |
ICSA-25-240-02
|
Mitsubishi Electric MELSEC iQ-F Series CPU Module
|
An information disclosure vulnerability exists in MELSEC iQ-F series CPU module due to cleartext transmission of sensitive information. An attacker may obtain credential information by intercepting SLMP communication messages and using the obtained credentials to read or write the device values. Additionally, the attacker may be able to stop the operation of programs.
|
[] | null | 7.5
| null | null | null |
GHSA-qj84-c93x-hc23
|
Improper access control in Report log filters feature in Devolutions Server 2023.2.10.0 and earlier allows attackers to retrieve logs from vaults or entries they are not allowed to access via the report request url query parameters.
|
[] | null | 5.3
| null | null | null |
|
CVE-2020-16236
|
anasonic FPWIN Pro
|
FPWIN Pro is vulnerable to an out-of-bounds read vulnerability when a user opens a maliciously crafted project file, which may allow an attacker to remotely execute arbitrary code.
|
[
"cpe:2.3:a:panasonic:fpwin_pro:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | 6.8
| null |
CVE-2025-32778
|
Web-Check allows command Injection via Unvalidated URL in Screenshot API
|
Web-Check is an all-in-one OSINT tool for analyzing any website. A command injection vulnerability exists in the screenshot API of the Web Check project (Lissy93/web-check). The issue stems from user-controlled input (url) being passed unsanitized into a shell command using exec(), allowing attackers to execute arbitrary system commands on the underlying host. This could be exploited by sending crafted url parameters to extract files or even establish remote access. The vulnerability has been patched by replacing exec() with execFile(), which avoids using a shell and properly isolates arguments.
|
[] | 9.3
| null | null | null | null |
CVE-2007-3371
|
PHP remote file inclusion vulnerability in plugins/widgets/htmledit/htmledit.php in Powl 0.94 allows remote attackers to execute arbitrary PHP code via a URL in the _POWL[installPath] parameter.
|
[
"cpe:2.3:a:powl:powl:0.94:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2019-2633
|
Vulnerability in the Oracle Work in Process component of Oracle E-Business Suite (subcomponent: Messages). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6, 12.2.7 and 12.2.8. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Work in Process. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Work in Process accessible data as well as unauthorized access to critical data or complete access to all Oracle Work in Process accessible data. CVSS 3.0 Base Score 9.9 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L).
|
[
"cpe:2.3:a:oracle:work_in_process:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:work_in_process:12.2.8:*:*:*:*:*:*:*"
] | null | 9.9
| null | 6.5
| null |
|
GHSA-r9pc-m5v5-x22j
|
Missing Authorization vulnerability in Paid Memberships Pro.This issue affects Paid Memberships Pro: from n/a through 1.2.3.
|
[] | null | 5.4
| null | null | null |
|
CVE-2017-2983
|
Adobe Shockwave versions 12.2.7.197 and earlier have an insecure library loading (DLL hijacking) vulnerability. Successful exploitation could lead to escalation of privilege.
|
[
"cpe:2.3:a:adobe:shockwave_player:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
GHSA-44mf-mmxh-h2w7
|
Stack-based buffer overflow in Lattice Semiconductor PAC-Designer 6.2.1344 allows remote attackers to execute arbitrary code via a long string in a Value tag in a SymbolicSchematicData definition tag in PAC Design (.pac) file.
|
[] | null | null | null | null | null |
|
CVE-2023-2601
|
WP Brutal AI < 2.0.0 - SQL Injection via CSRF
|
The wpbrutalai WordPress plugin before 2.0.0 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by admin via CSRF.
|
[
"cpe:2.3:a:wp_brutal_ai_project:wp_brutal_ai:*:*:*:*:*:wordpress:*:*"
] | null | 9.8
| null | null | null |
GHSA-gwjp-78rh-pcgc
|
IBM Power9 Self Boot Engine(SBE) could allow a privileged user to inject malicious code and compromise the integrity of the host firmware bypassing the host firmware signature verification process.
|
[] | null | null | null | null | null |
|
GHSA-6659-x3qw-v7p5
|
A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'. This CVE ID is unique from CVE-2018-12207.
|
[] | null | null | null | null | null |
|
GHSA-23g7-p8vx-g5m2
|
Mozilla Thunderbird before 1.5.0.7 and SeaMonkey before 1.0.5, with "Load Images" enabled, allows remote user-assisted attackers to bypass settings that disable JavaScript via a remote XBL file in a message that is loaded when the user views, forwards, or replies to the original message.
|
[] | null | null | null | null | null |
|
CVE-2022-37459
|
Ampere Altra devices before 1.08g and Ampere Altra Max devices before 2.05a allow attackers to control the predictions for return addresses and potentially hijack code flow to execute arbitrary code via a side-channel attack, aka a "Retbleed" issue.
|
[
"cpe:2.3:o:amperecomputing:ampere_altra_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amperecomputing:ampere_altra:-:*:*:*:*:*:*:*",
"cpe:2.3:o:amperecomputing:ampere_altra_max_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:amperecomputing:ampere_altra_max:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
GHSA-mj6r-fxqr-4c2f
|
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnerability," as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2012.
|
[] | null | null | null | null | null |
|
RHSA-2016:0346
|
Red Hat Security Advisory: postgresql security update
|
postgresql: case insensitive range handling integer overflow leading to buffer overflow
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | null | null | null |
GHSA-wp3v-g466-8g44
|
Regular expression denial of service in Rapid7 Metasploit
|
By sending a specially crafted HTTP GET request to a listening Rapid7 Metasploit HTTP handler, an attacker can register an arbitrary regular expression. When evaluated, this malicious handler can either prevent new HTTP handler sessions from being established, or cause a resource exhaustion on the Metasploit server.
|
[] | null | 7.5
| null | null | null |
GHSA-fqh7-jg58-45rw
|
An issue was discovered on Samsung mobile devices with P(9.0) and Q(10.0) (Exynos 9610 chipsets) software. There is an arbitrary kfree in the vipx and vertex drivers. The Samsung ID is SVE-2019-16294 (February 2020).
|
[] | null | null | null | null | null |
|
CVE-2019-13652
|
TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow serviceName OS Command Injection (issue 4 of 5).
|
[
"cpe:2.3:o:tp-link:m7350_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:m7350:-:*:*:*:*:*:*:*"
] | null | 9.8
| null | 10
| null |
|
CVE-2007-6472
|
Multiple SQL injection vulnerabilities in phpMyRealty (PMR) 1.0.9 allow (1) remote attackers to execute arbitrary SQL commands via the type parameter to search.php and (2) remote authenticated administrators to execute arbitrary SQL commands via the listing_updated_days parameter to admin/findlistings.php. NOTE: some of these details are obtained from third party information.
|
[
"cpe:2.3:a:phpmyrealty:phpmyrealty:1.0.9:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2025-39723
|
netfs: Fix unbuffered write error handling
|
In the Linux kernel, the following vulnerability has been resolved:
netfs: Fix unbuffered write error handling
If all the subrequests in an unbuffered write stream fail, the subrequest
collector doesn't update the stream->transferred value and it retains its
initial LONG_MAX value. Unfortunately, if all active streams fail, then we
take the smallest value of { LONG_MAX, LONG_MAX, ... } as the value to set
in wreq->transferred - which is then returned from ->write_iter().
LONG_MAX was chosen as the initial value so that all the streams can be
quickly assessed by taking the smallest value of all stream->transferred -
but this only works if we've set any of them.
Fix this by adding a flag to indicate whether the value in
stream->transferred is valid and checking that when we integrate the
values. stream->transferred can then be initialised to zero.
This was found by running the generic/750 xfstest against cifs with
cache=none. It splices data to the target file. Once (if) it has used up
all the available scratch space, the writes start failing with ENOSPC.
This causes ->write_iter() to fail. However, it was returning
wreq->transferred, i.e. LONG_MAX, rather than an error (because it thought
the amount transferred was non-zero) and iter_file_splice_write() would
then try to clean up that amount of pipe bufferage - leading to an oops
when it overran. The kernel log showed:
CIFS: VFS: Send error in write = -28
followed by:
BUG: kernel NULL pointer dereference, address: 0000000000000008
with:
RIP: 0010:iter_file_splice_write+0x3a4/0x520
do_splice+0x197/0x4e0
or:
RIP: 0010:pipe_buf_release (include/linux/pipe_fs_i.h:282)
iter_file_splice_write (fs/splice.c:755)
Also put a warning check into splice to announce if ->write_iter() returned
that it had written more than it was asked to.
|
[] | null | 7.8
| null | null | null |
CVE-2006-0025
|
Stack-based buffer overflow in Microsoft Windows Media Player 9 and 10 allows remote attackers to execute arbitrary code via a PNG image with a large chunk size.
|
[
"cpe:2.3:a:microsoft:windows_media_player:9:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:windows_media_player:10:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
This dataset, CIRCL/vulnerability-scores, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))