cve_id
stringlengths
13
16
input_text
stringlengths
158
4.12k
sector
stringclasses
19 values
cross_border
bool
2 classes
cvss_score
float64
1.6
10
base_severity
stringclasses
4 values
contextual_severity
stringclasses
4 values
label
int64
0
3
deployment_scale
stringclasses
4 values
entity_type
stringclasses
8 values
CVE-2017-16320
Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd s_sonos, at 0x9d01ddd4, the value for the `s_sonos_cmd` key is copied using `strcpy` to the buffer at `$sp+0x290`.This buffer is 32 bytes large, sending anything longer will cause a buffer overflow. [SEP] sector: waste_management cross_border: true score: 8.5 deployment_scale: small_business entity_type: cloud_provider
waste_management
true
8.5
High
High
2
small_business
cloud_provider
CVE-2021-38957
IBM Security Verify 10.0.0, 10.0.1.0, and 10.0.2.0 could disclose sensitive information due to hazardous input validation during QR code generation. IBM X-Force ID: 212040. [SEP] sector: digital_providers cross_border: false score: 3.1 deployment_scale: enterprise entity_type: utility
digital_providers
false
3.1
Low
Low
0
enterprise
utility
CVE-2024-26519
An issue in Casa Systems NTC-221 version 2.0.99.0 and before allows a remote attacker to execute arbitrary code via a crafted payload to the /www/cgi-bin/nas.cgi component. [SEP] sector: ict_service_management cross_border: true score: 9.0 deployment_scale: critical_operator entity_type: bank
ict_service_management
true
9
Critical
Critical
3
critical_operator
bank
CVE-2017-20097
A vulnerability was found in WP-Filebase Download Manager Plugin 3.4.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to basic cross site scripting. The attack may be launched remotely. [SEP] sector: space cross_border: true score: 3.5 deployment_scale: individual entity_type: individual
space
true
3.5
Low
Low
0
individual
individual
CVE-2024-20899
Use of implicit intent for sensitive communication in RCS function in IMS service prior to SMR Jul-2024 Release 1 allows local attackers to get sensitive information. [SEP] sector: postal cross_border: false score: 4.0 deployment_scale: critical_operator entity_type: cloud_provider
postal
false
4
Medium
Medium
1
critical_operator
cloud_provider
CVE-2022-49517
In the Linux kernel, the following vulnerability has been resolved: ASoC: mediatek: Fix missing of_node_put in mt2701_wm8960_machine_probe This node pointer is returned by of_parse_phandle() with refcount incremented in this function. Calling of_node_put() to avoid the refcount leak. [SEP] sector: non_nis2 cross_border: false score: 5.5 deployment_scale: critical_operator entity_type: utility
non_nis2
false
5.5
Medium
Medium
1
critical_operator
utility
CVE-2020-1675
When Security Assertion Markup Language (SAML) authentication is enabled, Juniper Networks Mist Cloud UI might incorrectly process invalid authentication certificates which could allow a malicious network-based user to access unauthorized data. This issue affects all Juniper Networks Mist Cloud UI versions prior to September 2 2020. [SEP] sector: non_nis2 cross_border: true score: 8.3 deployment_scale: small_business entity_type: bank
non_nis2
true
8.3
High
Critical
3
small_business
bank
CVE-2026-1444
A vulnerability has been found in iJason-Liu Books_Manager up to 298ba736387ca37810466349af13a0fdf828e99c. This affects an unknown part of the file controllers/books_center/add_book_check.php. Such manipulation of the argument mark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. [SEP] sector: non_nis2 cross_border: false score: 2.4 deployment_scale: enterprise entity_type: utility
non_nis2
false
2.4
Low
Low
0
enterprise
utility
CVE-2023-31307
Improper validation of array index in Power Management Firmware (PMFW) may allow a privileged attacker to cause an out-of-bounds memory read within PMFW, potentially leading to a denial of service. [SEP] sector: public_administration cross_border: false score: 2.3 deployment_scale: critical_operator entity_type: cloud_provider
public_administration
false
2.3
Low
Medium
1
critical_operator
cloud_provider
CVE-2024-44139
The issue was addressed with improved checks. This issue is fixed in iOS 18 and iPadOS 18. An attacker with physical access may be able to access contacts from the lock screen. [SEP] sector: waste_management cross_border: true score: 2.4 deployment_scale: individual entity_type: sme
waste_management
true
2.4
Low
Low
0
individual
sme
CVE-2024-21130
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Optimizer). Supported versions that are affected are 8.0.37 and prior and 8.4.0 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). [SEP] sector: digital_infrastructure cross_border: true score: 4.9 deployment_scale: enterprise entity_type: sme
digital_infrastructure
true
4.9
Medium
Critical
3
enterprise
sme
CVE-2022-44393
Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/view_service&id=. [SEP] sector: manufacturing cross_border: false score: 7.2 deployment_scale: critical_operator entity_type: msp
manufacturing
false
7.2
High
High
2
critical_operator
msp
CVE-2023-32165
D-Link D-View TftpReceiveFileHandler Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of D-Link D-View. Authentication is not required to exploit this vulnerability. The specific flaw exists within the TftpReceiveFileHandler class. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-19497. [SEP] sector: digital_providers cross_border: false score: 9.8 deployment_scale: individual entity_type: individual
digital_providers
false
9.8
Critical
Critical
3
individual
individual
CVE-2025-1207
A vulnerability was found in phjounin TFTPD64 4.64. It has been declared as problematic. This vulnerability affects unknown code of the component DNS Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. [SEP] sector: space cross_border: false score: 3.1 deployment_scale: enterprise entity_type: sme
space
false
3.1
Low
Medium
1
enterprise
sme
CVE-2023-49799
`nuxt-api-party` is an open source module to proxy API requests. nuxt-api-party attempts to check if the user has passed an absolute URL to prevent the aforementioned attack. This has been recently changed to use the regular expression `^https?://`, however this regular expression can be bypassed by an absolute URL with leading whitespace. For example `\nhttps://whatever.com` which has a leading newline. According to the fetch specification, before a fetch is made the URL is normalized. "To normalize a byte sequence potentialValue, remove any leading and trailing HTTP whitespace bytes from potentialValue.". This means the final request will be normalized to `https://whatever.com` bypassing the check and nuxt-api-party will send a request outside of the whitelist. This could allow us to leak credentials or perform Server-Side Request Forgery (SSRF). This vulnerability has been addressed in version 0.22.1. Users are advised to upgrade. Users unable to upgrade should revert to the previous method of detecting absolute URLs. [SEP] sector: digital_infrastructure cross_border: true score: 7.5 deployment_scale: critical_operator entity_type: utility
digital_infrastructure
true
7.5
High
Critical
3
critical_operator
utility
CVE-2024-1722
A flaw was found in Keycloak. In certain conditions, this issue may allow a remote unauthenticated attacker to block other accounts from logging in. [SEP] sector: non_nis2 cross_border: true score: 3.7 deployment_scale: individual entity_type: utility
non_nis2
true
3.7
Low
Medium
1
individual
utility
CVE-2022-21443
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). [SEP] sector: food cross_border: true score: 3.7 deployment_scale: critical_operator entity_type: cloud_provider
food
true
3.7
Low
Low
0
critical_operator
cloud_provider
CVE-2025-32415
In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used. [SEP] sector: non_nis2 cross_border: false score: 2.9 deployment_scale: small_business entity_type: bank
non_nis2
false
2.9
Low
Low
0
small_business
bank
CVE-2022-42412
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PDF files. Crafted data in a PDF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18324. [SEP] sector: digital_providers cross_border: false score: 3.3 deployment_scale: small_business entity_type: government
digital_providers
false
3.3
Low
Low
0
small_business
government
CVE-2020-35787
Certain NETGEAR devices are affected by a buffer overflow by an authenticated user. This affects D3600 before 1.0.0.76, D6000 before 1.0.0.76, D6200 before 1.1.00.36, D7000 before 1.0.1.70, EX6200v2 before 1.0.1.78, EX7000 before 1.0.1.78, EX8000 before 1.0.1.186, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6020 before 1.0.0.42, R6050 before 1.0.1.18, R6080 before 1.0.0.42, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6300v2 before 1.0.4.34, R6700 before 1.0.2.6, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, R6900 before 1.0.2.4, R6900P before 1.3.1.64, R6900v2 before 1.2.0.36, R7000 before 1.0.9.42, R7000P before 1.3.1.64, R7800 before 1.0.2.60, R8900 before 1.0.4.12, R9000 before 1.0.4.12, and XR500 before 2.3.2.40. [SEP] sector: research cross_border: false score: 8.0 deployment_scale: enterprise entity_type: sme
research
false
8
High
High
2
enterprise
sme
CVE-2021-25516
An improper check or handling of exceptional conditions in Exynos baseband prior to SMR Dec-2021 Release 1 allows attackers to track locations. [SEP] sector: non_nis2 cross_border: true score: 6.4 deployment_scale: critical_operator entity_type: cloud_provider
non_nis2
true
6.4
Medium
Medium
1
critical_operator
cloud_provider
CVE-2026-25211
Llama Stack (aka llama-stack) before 0.4.0rc3 does not censor the pgvector password in the initialization log. [SEP] sector: non_nis2 cross_border: false score: 3.2 deployment_scale: small_business entity_type: utility
non_nis2
false
3.2
Low
Low
0
small_business
utility
CVE-2020-1595
<p>A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with specially-formatted input.</p> <p>The security update addresses the vulnerability by correcting how SharePoint handles deserialization of untrusted data.</p> [SEP] sector: manufacturing cross_border: true score: 9.9 deployment_scale: enterprise entity_type: msp
manufacturing
true
9.9
Critical
Critical
3
enterprise
msp
CVE-2024-42012
GRAU DATA Blocky before 3.1 stores passwords encrypted rather than hashed. At the login screen, the user's password is compared to the user's decrypted cleartext password. An attacker with Windows admin or debugging rights can therefore steal the user's Blocky password and from there impersonate that local user. [SEP] sector: non_nis2 cross_border: true score: 5.7 deployment_scale: critical_operator entity_type: cloud_provider
non_nis2
true
5.7
Medium
Medium
1
critical_operator
cloud_provider
CVE-2019-3801
Cloud Foundry cf-deployment, versions prior to 7.9.0, contain java components that are using an insecure protocol to fetch dependencies when building. A remote unauthenticated malicious attacker could hijack the DNS entry for the dependency, and inject malicious code into the component. [SEP] sector: financial_market cross_border: true score: 8.7 deployment_scale: individual entity_type: sme
financial_market
true
8.7
High
High
2
individual
sme
CVE-2023-52771
In the Linux kernel, the following vulnerability has been resolved: cxl/port: Fix delete_endpoint() vs parent unregistration race The CXL subsystem, at cxl_mem ->probe() time, establishes a lineage of ports (struct cxl_port objects) between an endpoint and the root of a CXL topology. Each port including the endpoint port is attached to the cxl_port driver. Given that setup, it follows that when either any port in that lineage goes through a cxl_port ->remove() event, or the memdev goes through a cxl_mem ->remove() event. The hierarchy below the removed port, or the entire hierarchy if the memdev is removed needs to come down. The delete_endpoint() callback is careful to check whether it is being called to tear down the hierarchy, or if it is only being called to teardown the memdev because an ancestor port is going through ->remove(). That care needs to take the device_lock() of the endpoint's parent. Which requires 2 bugs to be fixed: 1/ A reference on the parent is needed to prevent use-after-free scenarios like this signature: BUG: spinlock bad magic on CPU#0, kworker/u56:0/11 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20230524-3.fc38 05/24/2023 Workqueue: cxl_port detach_memdev [cxl_core] RIP: 0010:spin_bug+0x65/0xa0 Call Trace: do_raw_spin_lock+0x69/0xa0 __mutex_lock+0x695/0xb80 delete_endpoint+0xad/0x150 [cxl_core] devres_release_all+0xb8/0x110 device_unbind_cleanup+0xe/0x70 device_release_driver_internal+0x1d2/0x210 detach_memdev+0x15/0x20 [cxl_core] process_one_work+0x1e3/0x4c0 worker_thread+0x1dd/0x3d0 2/ In the case of RCH topologies, the parent device that needs to be locked is not always @port->dev as returned by cxl_mem_find_port(), use endpoint->dev.parent instead. [SEP] sector: non_nis2 cross_border: true score: 4.4 deployment_scale: small_business entity_type: sme
non_nis2
true
4.4
Medium
Medium
1
small_business
sme
CVE-2020-15707
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions. [SEP] sector: ict_service_management cross_border: true score: 5.7 deployment_scale: enterprise entity_type: individual
ict_service_management
true
5.7
Medium
High
2
enterprise
individual
CVE-2025-64244
Missing Authorization vulnerability in Codexpert, Inc Restrict Elementor Widgets, Columns and Sections restrict-elementor-widgets allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Restrict Elementor Widgets, Columns and Sections: from n/a through <= 1.12. [SEP] sector: postal cross_border: true score: 4.3 deployment_scale: critical_operator entity_type: msp
postal
true
4.3
Medium
Medium
1
critical_operator
msp
CVE-2023-26009
Improper Privilege Management vulnerability in Favethemes Houzez Login Register allows Privilege Escalation.This issue affects Houzez Login Register: from n/a through 2.6.3. [SEP] sector: chemicals cross_border: true score: 9.8 deployment_scale: individual entity_type: bank
chemicals
true
9.8
Critical
Critical
3
individual
bank
CVE-2021-23362
The package hosted-git-info before 3.0.8 are vulnerable to Regular Expression Denial of Service (ReDoS) via regular expression shortcutMatch in the fromUrl function in index.js. The affected regular expression exhibits polynomial worst-case time complexity. [SEP] sector: public_administration cross_border: true score: 5.3 deployment_scale: critical_operator entity_type: bank
public_administration
true
5.3
Medium
High
2
critical_operator
bank
CVE-2023-31939
SQL injection vulnerability found in Online Travel Agency System v.1.0 allows a remote attacker to execute arbitrary code via the costomer_id parameter at customer_edit.php. [SEP] sector: ict_service_management cross_border: true score: 7.2 deployment_scale: critical_operator entity_type: government
ict_service_management
true
7.2
High
Critical
3
critical_operator
government
CVE-2022-41659
Improper access control for some Intel Unison software may allow a privileged user to potentially enable denial of service via local access. [SEP] sector: waste_management cross_border: true score: 1.9 deployment_scale: individual entity_type: individual
waste_management
true
1.9
Low
Medium
1
individual
individual
CVE-2022-21210
An SQL injection vulnerability exists in the AssetActions.aspx functionality of Lansweeper lansweeper 9.1.20.2. A specially-crafted HTTP request can cause SQL injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. [SEP] sector: postal cross_border: true score: 6.6 deployment_scale: critical_operator entity_type: sme
postal
true
6.6
Medium
Medium
1
critical_operator
sme
CVE-2018-6686
Authentication Bypass vulnerability in TPM autoboot in McAfee Drive Encryption (MDE) 7.1.0 and above allows physically proximate attackers to bypass local security protection via specific set of circumstances. [SEP] sector: non_nis2 cross_border: true score: 7.0 deployment_scale: small_business entity_type: hospital
non_nis2
true
7
High
Critical
3
small_business
hospital
CVE-2025-1215
A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component. [SEP] sector: non_nis2 cross_border: false score: 2.8 deployment_scale: critical_operator entity_type: hospital
non_nis2
false
2.8
Low
Low
0
critical_operator
hospital
CVE-2017-18790
Certain NETGEAR devices are affected by disclosure of sensitive information. This affects R6700 before 1.0.1.26, R7000 before 1.0.9.10, R7100LG before 1.0.0.32, R7900 before 1.0.1.18, R8000 before 1.0.3.54, and R8500 before 1.0.2.100. [SEP] sector: research cross_border: true score: 6.2 deployment_scale: small_business entity_type: hospital
research
true
6.2
Medium
High
2
small_business
hospital
CVE-2024-27242
Cross site scripting in Zoom Desktop Client for Linux before version 5.17.10 may allow an authenticated user to conduct a denial of service via network access. [SEP] sector: banking cross_border: false score: 4.1 deployment_scale: critical_operator entity_type: bank
banking
false
4.1
Medium
High
2
critical_operator
bank
CVE-2021-21915
An exploitable SQL injection vulnerability exist in the ‘group_list’ page of the Advantech R-SeeNet 2.4.15 (30.07.2021). A specially-crafted HTTP request at ‘company_filter’ parameter. An attacker can make authenticated HTTP requests to trigger this vulnerability. This can be done as any authenticated user or through cross-site request forgery. [SEP] sector: chemicals cross_border: true score: 7.7 deployment_scale: critical_operator entity_type: cloud_provider
chemicals
true
7.7
High
Critical
3
critical_operator
cloud_provider
CVE-2024-12983
A vulnerability classified as problematic has been found in code-projects Hospital Management System 1.0. This affects an unknown part of the file /hospital/hms/admin/manage-doctors.php of the component Edit Doctor Details Page. The manipulation of the argument Doctor Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. [SEP] sector: drinking_water cross_border: true score: 2.4 deployment_scale: critical_operator entity_type: bank
drinking_water
true
2.4
Low
Medium
1
critical_operator
bank
CVE-2024-26049
Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. [SEP] sector: non_nis2 cross_border: false score: 4.8 deployment_scale: individual entity_type: utility
non_nis2
false
4.8
Medium
Medium
1
individual
utility
CVE-2023-35901
IBM Robotic Process Automation 21.0.0 through 21.0.7.6 and 23.0.0 through 23.0.6 is vulnerable to client side validation bypass which could allow invalid changes or values in some fields. IBM X-Force ID: 259380. [SEP] sector: chemicals cross_border: true score: 2.7 deployment_scale: individual entity_type: sme
chemicals
true
2.7
Low
Low
0
individual
sme
CVE-2024-11053
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password. [SEP] sector: non_nis2 cross_border: true score: 3.4 deployment_scale: critical_operator entity_type: msp
non_nis2
true
3.4
Low
Low
0
critical_operator
msp
CVE-2025-25595
A lack of rate limiting in the login page of Safe App version a3.0.9 allows attackers to bypass authentication via a brute force attack. [SEP] sector: food cross_border: true score: 9.8 deployment_scale: enterprise entity_type: government
food
true
9.8
Critical
Critical
3
enterprise
government
CVE-2022-1720
Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. [SEP] sector: digital_infrastructure cross_border: false score: 6.6 deployment_scale: small_business entity_type: sme
digital_infrastructure
false
6.6
Medium
High
2
small_business
sme
CVE-2025-9720
A vulnerability was detected in Portabilis i-Educar up to 2.10. Impacted is an unknown function of the file /module/TabelaArredondamento/edit of the component Cadastrar tabela de arredondamento Page. The manipulation of the argument Nome results in cross site scripting. The attack may be performed from remote. The exploit is now public and may be used. [SEP] sector: non_nis2 cross_border: true score: 3.5 deployment_scale: critical_operator entity_type: government
non_nis2
true
3.5
Low
Medium
1
critical_operator
government
CVE-2025-50103
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: LDAP Auth). Supported versions that are affected are 9.0.0-9.3.0. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H). [SEP] sector: chemicals cross_border: false score: 4.4 deployment_scale: individual entity_type: utility
chemicals
false
4.4
Medium
Medium
1
individual
utility
CVE-2021-22260
A stored Cross-Site Scripting vulnerability in the DataDog integration in all versions of GitLab CE/EE starting from 13.7 before 14.0.9, all versions starting from 14.1 before 14.1.4, and all versions starting from 14.2 before 14.2.2 allows an attacker to execute arbitrary JavaScript code on the victim's behalf [SEP] sector: waste_water cross_border: true score: 7.7 deployment_scale: critical_operator entity_type: sme
waste_water
true
7.7
High
High
2
critical_operator
sme
CVE-2022-26308
Pandora FMS v7.0NG.760 and below allows an improper access control in Configuration (Credential store) where a user with the role of Operator (Write) could create, delete, view existing keys which are outside the intended role. [SEP] sector: non_nis2 cross_border: false score: 3.7 deployment_scale: critical_operator entity_type: bank
non_nis2
false
3.7
Low
Low
0
critical_operator
bank
CVE-2025-55708
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Systems Quiz And Survey Master allows SQL Injection. This issue affects Quiz And Survey Master: from n/a through 10.2.4. [SEP] sector: waste_management cross_border: false score: 8.5 deployment_scale: critical_operator entity_type: hospital
waste_management
false
8.5
High
High
2
critical_operator
hospital
CVE-2022-31810
A vulnerability has been identified in SiPass integrated (All versions < V2.90.3.8). Affected server applications improperly check the size of data packets received for the configuration client login, causing a stack-based buffer overflow. This could allow an unauthenticated remote attacker to crash the server application, creating a denial of service condition. [SEP] sector: health cross_border: false score: 7.5 deployment_scale: individual entity_type: utility
health
false
7.5
High
Critical
3
individual
utility
CVE-2022-49591
In the Linux kernel, the following vulnerability has been resolved: net: dsa: microchip: ksz_common: Fix refcount leak bug In ksz_switch_register(), we should call of_node_put() for the reference returned by of_get_child_by_name() which has increased the refcount. [SEP] sector: non_nis2 cross_border: true score: 5.5 deployment_scale: critical_operator entity_type: individual
non_nis2
true
5.5
Medium
Medium
1
critical_operator
individual
CVE-2023-2360
Sensitive information disclosure due to CORS misconfiguration. The following products are affected: Acronis Cyber Infrastructure (ACI) before build 5.2.0-135. [SEP] sector: energy cross_border: true score: 3.1 deployment_scale: critical_operator entity_type: hospital
energy
true
3.1
Low
Low
0
critical_operator
hospital
CVE-2025-6601
GitLab has remediated an issue in GitLab EE affecting all versions from 18.4 before 18.4.3, and 18.5 before 18.5.1 that under certain conditions could have allowed authenticated users to gain unauthorized project access by exploiting the access request approval workflow. [SEP] sector: financial_market cross_border: false score: 2.7 deployment_scale: small_business entity_type: utility
financial_market
false
2.7
Low
Low
0
small_business
utility
CVE-2024-8911
The LatePoint plugin for WordPress is vulnerable to Arbitrary User Password Change via SQL Injection in versions up to, and including, 5.0.11. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to change user passwords and potentially take over administrator accounts. Note that changing a WordPress user's password is only possible if the "Use WordPress users as customers" setting is enabled, which is disabled by default. Without this setting enabled, only the passwords of plugin customers, which are stored and managed in a separate database table, can be modified. [SEP] sector: postal cross_border: false score: 9.8 deployment_scale: enterprise entity_type: individual
postal
false
9.8
Critical
Critical
3
enterprise
individual
CVE-2023-40500
LG Simple Editor copyContent Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability. The specific flaw exists within the implementation of the copyContent command. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. . Was ZDI-CAN-19944. [SEP] sector: energy cross_border: true score: 9.8 deployment_scale: small_business entity_type: cloud_provider
energy
true
9.8
Critical
Critical
3
small_business
cloud_provider
CVE-2026-3170
A vulnerability was detected in SourceCodester/Patrick Mvuma Patients Waiting Area Queue Management System 1.0. Affected is an unknown function of the file /patient-search.php. The manipulation of the argument First Name/Last Name results in cross site scripting. The attack can be executed remotely. The exploit is now public and may be used. [SEP] sector: drinking_water cross_border: true score: 2.4 deployment_scale: small_business entity_type: msp
drinking_water
true
2.4
Low
Low
0
small_business
msp
CVE-2019-4103
IBM Tivoli Netcool/Impact 7.1.0 allows for remote execution of command by low privileged User. Remote code execution allow to execute arbitrary code on system which lead to take control over the system. IBM X-Force ID: 158094. [SEP] sector: drinking_water cross_border: false score: 8.0 deployment_scale: enterprise entity_type: utility
drinking_water
false
8
High
High
2
enterprise
utility
CVE-2021-3757
immer is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') [SEP] sector: space cross_border: false score: 7.5 deployment_scale: critical_operator entity_type: government
space
false
7.5
High
Critical
3
critical_operator
government
CVE-2021-43052
The Realm Server component of TIBCO Software Inc.'s TIBCO FTL - Community Edition, TIBCO FTL - Developer Edition, and TIBCO FTL - Enterprise Edition contains an easily exploitable vulnerability that allows authentication bypass due to a hard coded secret used in the default realm server of the affected system. Affected releases are TIBCO Software Inc.'s TIBCO FTL - Community Edition: versions 6.7.2 and below, TIBCO FTL - Developer Edition: versions 6.7.2 and below, and TIBCO FTL - Enterprise Edition: versions 6.7.2 and below. [SEP] sector: energy cross_border: true score: 9.3 deployment_scale: enterprise entity_type: hospital
energy
true
9.3
Critical
Critical
3
enterprise
hospital
CVE-2019-18276
An issue was discovered in disable_priv_mode in shell.c in GNU Bash through 5.0 patch 11. By default, if Bash is run with its effective UID not equal to its real UID, it will drop privileges by setting its effective UID to its real UID. However, it does so incorrectly. On Linux and other systems that support "saved UID" functionality, the saved UID is not dropped. An attacker with command execution in the shell can use "enable -f" for runtime loading of a new builtin, which can be a shared object that calls setuid() and therefore regains privileges. However, binaries running with an effective UID of 0 are unaffected. [SEP] sector: non_nis2 cross_border: true score: 7.8 deployment_scale: critical_operator entity_type: government
non_nis2
true
7.8
High
High
2
critical_operator
government
CVE-2020-24435
Acrobat Reader DC versions 2020.012.20048 (and earlier), 2020.001.30005 (and earlier) and 2017.011.30175 (and earlier) are affected by a heap-based buffer overflow vulnerability in the submitForm function, potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted .pdf file in Acrobat Reader. [SEP] sector: non_nis2 cross_border: false score: 7.8 deployment_scale: enterprise entity_type: hospital
non_nis2
false
7.8
High
High
2
enterprise
hospital
CVE-2022-30728
Information exposure vulnerability in ScanPool prior to SMR Jun-2022 Release 1 allows local attackers to get MAC address information. [SEP] sector: research cross_border: false score: 1.9 deployment_scale: critical_operator entity_type: government
research
false
1.9
Low
Low
0
critical_operator
government
CVE-2022-46676
Wyse Management Suite 3.8 and below contain an improper access control vulnerability. A malicious admin user can disable or delete users under administration and unassigned admins for which the group admin is not authorized. [SEP] sector: non_nis2 cross_border: false score: 4.9 deployment_scale: small_business entity_type: cloud_provider
non_nis2
false
4.9
Medium
Medium
1
small_business
cloud_provider
CVE-2020-10902
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.1.29511. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-10462. [SEP] sector: health cross_border: true score: 7.8 deployment_scale: critical_operator entity_type: individual
health
true
7.8
High
Critical
3
critical_operator
individual
CVE-2024-4648
A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /view/student_exam_mark_update_form.php. The manipulation of the argument std_index leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263492. [SEP] sector: digital_providers cross_border: false score: 3.5 deployment_scale: enterprise entity_type: hospital
digital_providers
false
3.5
Low
Low
0
enterprise
hospital
CVE-2025-3795
A vulnerability was found in DaiCuo 1.3.13. It has been rated as problematic. Affected by this issue is some unknown functionality of the component SEO Optimization Settings Section. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. [SEP] sector: non_nis2 cross_border: false score: 2.4 deployment_scale: individual entity_type: sme
non_nis2
false
2.4
Low
Low
0
individual
sme
CVE-2022-20595
In getWpcAuthChallengeResponse of WirelessCharger.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239700137References: N/A [SEP] sector: non_nis2 cross_border: true score: 4.4 deployment_scale: critical_operator entity_type: cloud_provider
non_nis2
true
4.4
Medium
High
2
critical_operator
cloud_provider
CVE-2023-43526
Memory corruption while querying module parameters from Listen Sound model client in kernel from user space. [SEP] sector: space cross_border: false score: 6.7 deployment_scale: small_business entity_type: individual
space
false
6.7
Medium
High
2
small_business
individual
CVE-2021-4428
A vulnerability has been found in what3words Autosuggest Plugin up to 4.0.0 on WordPress and classified as problematic. Affected by this vulnerability is the function enqueue_scripts of the file w3w-autosuggest/public/class-w3w-autosuggest-public.php of the component Setting Handler. The manipulation leads to information disclosure. The attack can be launched remotely. Upgrading to version 4.0.1 is able to address this issue. The patch is named dd59cbac5f86057d6a73b87007c08b8bfa0c32ac. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-234247. [SEP] sector: energy cross_border: false score: 2.7 deployment_scale: small_business entity_type: msp
energy
false
2.7
Low
Low
0
small_business
msp
CVE-2026-1326
A weakness has been identified in Totolink NR1800X 9.1.0u.6279_B20210910. This vulnerability affects the function setWanCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. This manipulation of the argument Hostname causes command injection. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. [SEP] sector: digital_infrastructure cross_border: true score: 6.3 deployment_scale: small_business entity_type: utility
digital_infrastructure
true
6.3
Medium
Medium
1
small_business
utility
CVE-2020-36248
The ownCloud application before 2.15 for Android allows attackers to use adb to include a PIN preferences value in a backup archive, and consequently bypass the PIN lock feature by restoring from this archive. [SEP] sector: non_nis2 cross_border: false score: 3.9 deployment_scale: critical_operator entity_type: cloud_provider
non_nis2
false
3.9
Low
Low
0
critical_operator
cloud_provider
CVE-2022-48426
In JetBrains TeamCity before 2022.10.3 stored XSS in Perforce connection settings was possible [SEP] sector: public_administration cross_border: false score: 4.6 deployment_scale: small_business entity_type: sme
public_administration
false
4.6
Medium
Medium
1
small_business
sme
CVE-2019-12591
NETGEAR Insight Cloud with firmware before Insight 5.6 allows remote authenticated users to achieve command injection. [SEP] sector: non_nis2 cross_border: false score: 6.8 deployment_scale: enterprise entity_type: individual
non_nis2
false
6.8
Medium
Medium
1
enterprise
individual
CVE-2024-38734
Unrestricted Upload of File with Dangerous Type vulnerability in SpreadsheetConverter Import Spreadsheets from Microsoft Excel allows Code Injection.This issue affects Import Spreadsheets from Microsoft Excel: from n/a through 10.1.4. [SEP] sector: non_nis2 cross_border: true score: 9.1 deployment_scale: enterprise entity_type: individual
non_nis2
true
9.1
Critical
Critical
3
enterprise
individual
CVE-2023-22601
InHand Networks InRouter 302, prior to version IR302 V3.5.56, and InRouter 615, prior to version InRouter6XX-S-V2.3.0.r5542, contain vulnerability CWE-330: Use of Insufficiently Random Values. They do not properly randomize MQTT ClientID parameters. An unauthorized user could calculate this parameter and use it to gather additional information about other InHand devices managed on the same cloud platform. [SEP] sector: digital_infrastructure cross_border: true score: 10.0 deployment_scale: individual entity_type: hospital
digital_infrastructure
true
10
Critical
Critical
3
individual
hospital
CVE-2024-8590
A maliciously crafted 3DM file when parsed in atf_api.dll through Autodesk AutoCAD can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process. [SEP] sector: drinking_water cross_border: false score: 7.8 deployment_scale: critical_operator entity_type: individual
drinking_water
false
7.8
High
Critical
3
critical_operator
individual
CVE-2023-29086
An issue was discovered in Samsung Exynos Mobile Processor, Automotive Processor and Modem for Exynos Modem 5123, Exynos Modem 5300, Exynos 980, Exynos 1080, Exynos 9110, and Exynos Auto T5123. Memory corruption can occur due to insufficient parameter validation while decoding an SIP Min-SE header. [SEP] sector: space cross_border: false score: 6.8 deployment_scale: critical_operator entity_type: utility
space
false
6.8
Medium
High
2
critical_operator
utility
CVE-2023-27162
openapi-generator up to v6.4.0 was discovered to contain a Server-Side Request Forgery (SSRF) via the component /api/gen/clients/{language}. This vulnerability allows attackers to access network resources and sensitive information via a crafted API request. [SEP] sector: research cross_border: false score: 9.1 deployment_scale: individual entity_type: msp
research
false
9.1
Critical
Critical
3
individual
msp
CVE-2025-25813
SeaCMS v13.3 was discovered to contain a remote code execution (RCE) vulnerability via the component admin_files.php. [SEP] sector: non_nis2 cross_border: false score: 5.1 deployment_scale: critical_operator entity_type: government
non_nis2
false
5.1
Medium
Medium
1
critical_operator
government
CVE-2024-24780
Remote Code Execution with untrusted URI of UDF vulnerability in Apache IoTDB. The attacker who has privilege to create UDF can register malicious function from untrusted URI. This issue affects Apache IoTDB: from 1.0.0 before 1.3.4. Users are recommended to upgrade to version 1.3.4, which fixes the issue. [SEP] sector: ict_service_management cross_border: true score: 9.8 deployment_scale: individual entity_type: msp
ict_service_management
true
9.8
Critical
Critical
3
individual
msp
CVE-2026-2831
The MailArchiver plugin for WordPress is vulnerable to SQL Injection via the ‘logid’ parameter in all versions up to, and including, 4.5.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. [SEP] sector: digital_providers cross_border: true score: 4.9 deployment_scale: small_business entity_type: msp
digital_providers
true
4.9
Medium
High
2
small_business
msp
CVE-2019-25514
Jettweb PHP Hazir Haber Sitesi Scripti V3 contains an SQL injection vulnerability that allows attackers to inject malicious SQL commands through the kelime parameter in POST requests. Attackers can manipulate the kelime parameter with UNION-based SQL injection payloads to extract sensitive data from the database or bypass authentication controls. [SEP] sector: health cross_border: true score: 8.2 deployment_scale: individual entity_type: bank
health
true
8.2
High
Critical
3
individual
bank
CVE-2023-43043
IBM Maximo Application Suite - Maximo Mobile for EAM 8.10 and 8.11 could disclose sensitive information to a local user. IBM X-Force ID: 266875. [SEP] sector: financial_market cross_border: true score: 5.1 deployment_scale: individual entity_type: msp
financial_market
true
5.1
Medium
High
2
individual
msp
CVE-2023-2527
The Integration for Contact Form 7 and Zoho CRM, Bigin WordPress plugin before 1.2.4 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by high privilege users such as admin [SEP] sector: non_nis2 cross_border: false score: 4.8 deployment_scale: individual entity_type: utility
non_nis2
false
4.8
Medium
Medium
1
individual
utility
CVE-2023-0972
Description: A vulnerability in SiLabs Z/IP Gateway 7.18.01 and earlier allows an unauthenticated attacker within Z-Wave range to overflow a stack buffer, leading to arbitrary code execution. [SEP] sector: postal cross_border: true score: 9.6 deployment_scale: small_business entity_type: bank
postal
true
9.6
Critical
Critical
3
small_business
bank
CVE-2024-56250
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in GregRoss Just Writing Statistics allows SQL Injection.This issue affects Just Writing Statistics: from n/a through 4.7. [SEP] sector: digital_providers cross_border: false score: 7.6 deployment_scale: enterprise entity_type: utility
digital_providers
false
7.6
High
High
2
enterprise
utility
CVE-2024-42333
The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c [SEP] sector: non_nis2 cross_border: false score: 2.7 deployment_scale: individual entity_type: government
non_nis2
false
2.7
Low
Low
0
individual
government
CVE-2026-22688
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.2.5, there is a command injection vulnerability that allows authenticated users to inject stdio_config.command/args into MCP stdio settings, causing the server to execute subprocesses using these injected values. This issue has been patched in version 0.2.5. [SEP] sector: space cross_border: true score: 10.0 deployment_scale: small_business entity_type: government
space
true
10
Critical
Critical
3
small_business
government
CVE-2025-14651
A vulnerability has been found in MartialBE one-hub up to 0.14.27. This vulnerability affects unknown code of the file docker-compose.yml. The manipulation of the argument SESSION_SECRET leads to use of hard-coded cryptographic key . The attack may be initiated remotely. The complexity of an attack is rather high. It is stated that the exploitability is difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The code maintainer recommends (translated from Chinese): "The default docker-compose example file is not recommended for production use. If you intend to use it in production, please carefully check and modify every configuration and environment variable yourself!" [SEP] sector: research cross_border: false score: 3.7 deployment_scale: small_business entity_type: cloud_provider
research
false
3.7
Low
Low
0
small_business
cloud_provider
CVE-2025-20234
A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software. For a description of this vulnerability, see the . [SEP] sector: non_nis2 cross_border: false score: 5.3 deployment_scale: enterprise entity_type: sme
non_nis2
false
5.3
Medium
Medium
1
enterprise
sme
CVE-2021-30661
A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.1, iOS 12.5.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5, macOS Big Sur 11.3. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.. [SEP] sector: health cross_border: false score: 8.8 deployment_scale: enterprise entity_type: msp
health
false
8.8
High
Critical
3
enterprise
msp
CVE-2024-2317
A vulnerability was found in Bdtask Hospital AutoManager up to 20240227 and classified as problematic. This issue affects some unknown processing of the file /prescription/prescription/delete/ of the component Prescription Page. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256271. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. [SEP] sector: digital_infrastructure cross_border: false score: 3.8 deployment_scale: critical_operator entity_type: sme
digital_infrastructure
false
3.8
Low
Low
0
critical_operator
sme
CVE-2025-23118
An Improper Certificate Validation vulnerability could allow an authenticated malicious actor with access to UniFi Protect Cameras adjacent network to make unsupported changes to the camera system. [SEP] sector: public_administration cross_border: true score: 6.4 deployment_scale: individual entity_type: individual
public_administration
true
6.4
Medium
High
2
individual
individual
CVE-2023-38521
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Exifography plugin <= 1.3.1 versions. [SEP] sector: non_nis2 cross_border: false score: 5.9 deployment_scale: small_business entity_type: individual
non_nis2
false
5.9
Medium
Medium
1
small_business
individual
CVE-2024-7916
A vulnerability classified as problematic was found in nafisulbari/itsourcecode Insurance Management System 1.0. Affected by this vulnerability is an unknown functionality of the file addNominee.php of the component Add Nominee Page. The manipulation of the argument Nominee-Client ID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. [SEP] sector: non_nis2 cross_border: false score: 3.5 deployment_scale: individual entity_type: sme
non_nis2
false
3.5
Low
Low
0
individual
sme
CVE-2023-31756
A command injection vulnerability exists in the administrative web portal in TP-Link Archer VR1600V devices running firmware Versions <= 0.1.0. 0.9.1 v5006.0 Build 220518 Rel.32480n which allows remote attackers, authenticated to the administrative web portal as an administrator user to open an operating system level shell via the 'X_TP_IfName' parameter. [SEP] sector: postal cross_border: false score: 6.7 deployment_scale: individual entity_type: sme
postal
false
6.7
Medium
Medium
1
individual
sme
CVE-2022-44455
The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. [SEP] sector: public_administration cross_border: false score: 6.8 deployment_scale: individual entity_type: sme
public_administration
false
6.8
Medium
High
2
individual
sme
CVE-2025-9422
A vulnerability was found in oitcode samarium up to 0.9.6. This impacts an unknown function of the file /dashboard/team of the component Team Image Handler. The manipulation results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. [SEP] sector: non_nis2 cross_border: false score: 2.4 deployment_scale: individual entity_type: cloud_provider
non_nis2
false
2.4
Low
Low
0
individual
cloud_provider
CVE-2018-25146
Microhard Systems IPn4G 1.1.0 contains an undocumented vulnerability that allows authenticated attackers to list and manipulate running system processes. Attackers can send arbitrary signals to kill background processes and system services through a hidden feature, potentially causing service disruption and requiring device restart. [SEP] sector: health cross_border: true score: 8.1 deployment_scale: critical_operator entity_type: individual
health
true
8.1
High
Critical
3
critical_operator
individual
CVE-2013-10021
A vulnerability was found in dd32 Debug Bar Plugin up to 0.8 on WordPress. It has been declared as problematic. Affected by this vulnerability is the function render of the file panels/class-debug-bar-queries.php. The manipulation leads to cross site scripting. The attack can be launched remotely. Upgrading to version 0.8.1 is able to address this issue. The patch is named 0842af8f8a556bc3e39b9ef758173b0a8a9ccbfc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-222739. [SEP] sector: non_nis2 cross_border: false score: 3.5 deployment_scale: critical_operator entity_type: government
non_nis2
false
3.5
Low
Low
0
critical_operator
government