VLAI for Severity
Collection
A collection of papers, models, and datasets supporting the AI and NLP components of the Vulnerability-Lookup project.
•
7 items
•
Updated
•
1
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
GHSA-rhm9-p9w5-fwm7
|
PyCA Cryptography symmetrically encrypting large values can lead to integer overflow
|
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. When certain sequences of `update()` calls with large values (multiple GBs) for symetric encryption or decryption occur, it's possible for an integer overflow to happen, leading to mishandling of buffers. This is patched in version 3.3.2 and newer.
|
[] | 8.8
| 9.1
| null | null | null |
CVE-2012-6532
|
(1) Zend_Dom, (2) Zend_Feed, (3) Zend_Soap, and (4) Zend_XmlRpc in Zend Framework 1.x before 1.11.13 and 1.12.x before 1.12.0 allow remote attackers to cause a denial of service (CPU consumption) via recursive or circular references in an XML entity definition in an XML DOCTYPE declaration, aka an XML Entity Expansion (XEE) attack.
|
[
"cpe:2.3:a:zend:zend_framework:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:zend:zend_framework:1.12.0:rc4:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2011-2417
|
Adobe Flash Player before 10.3.183.5 on Windows, Mac OS X, Linux, and Solaris and before 10.3.186.3 on Android, and Adobe AIR before 2.7.1 on Windows and Mac OS X and before 2.7.1.1961 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2011-2135, CVE-2011-2140, and CVE-2011-2425.
|
[
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:6.0.79:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.53.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.60.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.61.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.63:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.66.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.67.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.68.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.69.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.70.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.0.73.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.33.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.34.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.35.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.39.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:8.0.42.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.18d60:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.45.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.47.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.48.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.112.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.114.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.115.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.124.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.151.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.152.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.155.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.159.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.246.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.260.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.262.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.277.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.0.283.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:9.125.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.0.584:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.12.36:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.22.87:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.32.18:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.42.34:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.0.45.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.52.15:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.53.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.82.76:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.85.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.8:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.92.10:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.95.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.102.64:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.32:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.152.33:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.154.13:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.154.25:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.159.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.14:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.23:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.181.34:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.105.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.1.106.16:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.156.12:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.2.157.51:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.185.21:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:10.3.185.23:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:adobe_air:2.6:*:*:*:*:*:*:*"
] | null | null | null | 10
| null |
|
CVE-2023-21069
|
In wl_update_hidden_ap_ie of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-254029309References: N/A
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 6.7
| null | null | null |
|
GHSA-62wv-3jv2-v859
|
Buffer overflow in LogReceiver.exe in Rockwell Automation RSLinx Enterprise CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 allows remote attackers to cause a denial of service (daemon crash) or possibly execute arbitrary code via a UDP packet with a certain integer length value that is (1) too large or (2) too small, leading to improper handling by Logger.dll.
|
[] | null | null | null | null | null |
|
CVE-2006-2226
|
Buffer overflow in XM Easy Personal FTP Server 4.2 and 5.0.1 allows remote authenticated users to cause a denial of service via a long argument to the PORT command.
|
[
"cpe:2.3:a:dxmsoft:xm_easy_personal_ftp_server:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:dxmsoft:xm_easy_personal_ftp_server:5.0.1:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2020-7468
|
In FreeBSD 12.2-STABLE before r365772, 11.4-STABLE before r365773, 12.1-RELEASE before p10, 11.4-RELEASE before p4 and 11.3-RELEASE before p14 a ftpd(8) bug in the implementation of the file system sandbox, combined with capabilities available to an authenticated FTP user, can be used to escape the file system restriction configured in ftpchroot(5). Moreover, the bug allows a malicious client to gain root privileges.
|
[
"cpe:2.3:o:freebsd:freebsd:11.3:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p10:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p11:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p12:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p13:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.3:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:11.4:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:-:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p1:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p2:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p3:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p4:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p5:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p6:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p7:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p8:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.1:p9:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:12.2:-:*:*:*:*:*:*"
] | null | 8.8
| null | 9
| null |
|
GHSA-qj8p-hjm8-996j
|
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
|
[] | null | null | null | null | null |
|
GHSA-g2r8-292m-w5rg
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThinkUpThemes Consulting allows Stored XSS.This issue affects Consulting: from n/a through 1.5.0.
|
[] | null | 6.5
| null | null | null |
|
CVE-2025-11390
|
PHPGurukul Cyber Cafe Management System POST Parameter search.php cross site scripting
|
A weakness has been identified in PHPGurukul Cyber Cafe Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /search.php of the component POST Parameter Handler. Executing manipulation of the argument searchdata can lead to cross site scripting. The attack can be executed remotely. The exploit has been made available to the public and could be exploited.
|
[] | 5.3
| 4.3
| 4.3
| 5
| null |
GHSA-2ggv-mm3c-gqxm
|
72crm 9.0 has an Arbitrary file upload vulnerability.
|
[] | null | 9.8
| null | null | null |
|
GHSA-4mqr-xvcr-x642
|
PHP remote file inclusion vulnerability in .systeme/fonctions.php in phpLister 0.5-pre2 allows remote attackers to execute arbitrary PHP code via a URL in the nom_rep_systeme parameter.
|
[] | null | null | null | null | null |
|
GHSA-hc22-58vm-mg54
|
Rockwell Automation RSLinx Enterprise Software (LogReceiver.exe) CPR9, CPR9-SR1, CPR9-SR2, CPR9-SR3, CPR9-SR4, CPR9-SR5, CPR9-SR5.1, and CPR9-SR6 does not handle input correctly and results in a logic error if it receives a datagram with an incorrect value in the “Record Data Size” field. By sending a datagram to the service over Port 4444/UDP with the “Record Data Size” field modified to an oversized value, an attacker could cause an out-of-bounds read access violation that leads to a service crash. The service can be recovered with a manual reboot. The patches and details pertaining to this vulnerability can be found at the following Rockwell Automation Security Advisory link (login is required): https://rockwellautomation.custhelp.com/app/answers/detail/a_id/537599
|
[] | null | null | 7.5
| null | null |
|
GHSA-xchm-4wgc-jp23
|
Cross-site scripting (XSS) vulnerability in index.php in Pagetool 1.0.7 allows remote attackers to inject arbitrary web script or HTML via the search_term parameter in a pagetool_search action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-3w66-jjx9-6wph
|
Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Log Management). The supported version that is affected is 13.5.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Enterprise Manager Base Platform. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Enterprise Manager Base Platform, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Enterprise Manager Base Platform accessible data as well as unauthorized update, insert or delete access to some of Oracle Enterprise Manager Base Platform accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Enterprise Manager Base Platform. CVSS 3.1 Base Score 7.5 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L).
|
[] | null | 7.5
| null | null | null |
|
GHSA-49rh-g874-x54c
|
Cisco IOS before 15.3(2)T, when scansafe is enabled, allows remote attackers to cause a denial of service (latency) via SYN packets that are not accompanied by SYN-ACK packets from the Scan Safe Tower, aka Bug ID CSCub85451.
|
[] | null | null | null | null | null |
|
CVE-2022-36139
|
SWFMill commit 53d7690 was discovered to contain a heap-buffer overflow via SWF::Writer::writeByte(unsigned char).
|
[
"cpe:2.3:a:swfmill:swfmill:*:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
|
GHSA-3g8q-mgqw-7ch3
|
Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5
| null | null | null |
|
GHSA-2f6c-wrfr-f7rw
|
The monitor component in sshd in OpenSSH before 7.0 on non-OpenBSD platforms accepts extraneous username data in MONITOR_REQ_PAM_INIT_CTX requests, which allows local users to conduct impersonation attacks by leveraging any SSH login access in conjunction with control of the sshd uid to send a crafted MONITOR_REQ_PWNAM request, related to monitor.c and monitor_wrap.c.
|
[] | null | null | null | null | null |
|
cisco-sa-dcnm-stored-xss-eUyGPqxm
|
Cisco Data Center Network Manager Stored Cross-Site Scripting Vulnerability
|
A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.
The vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by interacting with the interface in a way that injects malicious content in a log file. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-stored-xss-eUyGPqxm ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dcnm-stored-xss-eUyGPqxm"]
|
[] | null | null | 6.1
| null | null |
CVE-2009-4672
|
Directory traversal vulnerability in main.php in the WP-Lytebox plugin 1.3 for WordPress allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the pg parameter.
|
[
"cpe:2.3:a:grupenet:wp-lytebox:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-xwcg-xmmg-hh8r
|
In JetBrains TeamCity before 2024.07 stored XSS was possible on the Code Inspection tab
|
[] | null | 4.6
| null | null | null |
|
CVE-2022-24481
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
Windows Common Log File System Driver Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | null | null |
CVE-2024-54139
|
Combodo iTop vulnerable to XSS leading to CSRF breach on _table_id parameter
|
Combodo iTop is an open source and web-based IT service management platform. Prior to versions 2.7.11, 3.1.2, and 3.2.0., iTop has a cross-site scripting vulnerability that can lead to cross-site request forgery on the `_table_id` parameter. Versions 2.7.11, 3.1.2, and 3.2.0 contain a patch for the issue.
|
[] | null | 7.9
| null | null | null |
CVE-2017-10358
|
Vulnerability in the Oracle Hyperion Financial Reporting component of Oracle Hyperion (subcomponent: Workspace). The supported version that is affected is 11.1.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Hyperion Financial Reporting. While the vulnerability is in Oracle Hyperion Financial Reporting, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Hyperion Financial Reporting accessible data as well as unauthorized read access to a subset of Oracle Hyperion Financial Reporting accessible data. CVSS 3.0 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N).
|
[
"cpe:2.3:a:oracle:hyperion_financial_reporting:11.1.2:*:*:*:*:*:*:*"
] | null | null | 6.4
| 5.5
| null |
|
GHSA-p6cf-jjrc-ff28
|
AMD processors may speculatively re-order load instructions which can result in stale data being observed when multiple processors are operating on shared memory, resulting in potential data leakage.
|
[] | null | 4
| null | null | null |
|
CVE-2020-1093
|
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1058, CVE-2020-1060.
|
[
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
] | null | 7.5
| null | 7.6
| null |
|
CVE-2012-0170
|
Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnReadyStateChange Remote Code Execution Vulnerability."
|
[
"cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-mhx4-mvfp-68gh
|
Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to "information leaks in mutable variables," aka Bug Id 6657026.
|
[] | null | null | null | null | null |
|
GHSA-8q5m-fc2m-6jrj
|
An issue was discovered in gpac before 1.0.1. The abst_box_read function in box_code_adobe.c has a heap-based buffer over-read.
|
[] | null | 7.1
| null | null | null |
|
CVE-2023-48535
|
Adobe Experience Manager | Cross-site Scripting (DOM-based XSS) (CWE-79)
|
Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
|
[
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
CVE-2023-46003
|
I-doit pro 25 and below is vulnerable to Cross Site Scripting (XSS) via index.php.
|
[
"cpe:2.3:a:i-doit:i-doit:*:*:*:*:pro:*:*:*"
] | null | 5.4
| null | null | null |
|
GHSA-2g74-jg6p-c4x3
|
Application Virtualization Remote Code Execution Vulnerability
|
[] | null | 7.8
| null | null | null |
|
GHSA-5wxj-v52j-4fmh
|
Members of the <code>DEVMODEW</code> struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.<br>*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox < 110, Thunderbird < 102.8, and Firefox ESR < 102.8.
|
[] | null | 6.5
| null | null | null |
|
GHSA-g9rc-p3rq-j6mc
|
bash-doc 3.2 allows local users to overwrite arbitrary files via a symlink attack on a /tmp/cb#####.? temporary file, related to the (1) aliasconv.sh, (2) aliasconv.bash, and (3) cshtobash scripts.
|
[] | null | null | null | null | null |
|
CVE-2014-9865
|
drivers/misc/qseecom.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not properly restrict user-space input, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28748271 and Qualcomm internal bug CR550013.
|
[
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 9.3
| null |
|
GHSA-x9w2-g9gv-85xr
|
Multiple PHP file inclusion vulnerabilities in WGS-PPC (aka PPC Search Engine), as distributed with other aliases, allow remote attackers to execute arbitrary PHP code via a URL in the INC parameter in (1) config_admin.php, (2) config_main.php, (3) config_member.php, and (4) mysql_config.php in config/; (5) admin.php and (6) index.php in admini/; (7) paypalipn/ipnprocess.php; (8) index.php and (9) registration.php in members/; and (10) ppcbannerclick.php and (11) ppcclick.php in main/.
|
[] | null | null | null | null | null |
|
CVE-2021-0269
|
Junos OS: J-Web can be compromised through reflected client-side HTTP parameter pollution attacks.
|
The improper handling of client-side parameters in J-Web of Juniper Networks Junos OS allows an attacker to perform a number of different malicious actions against a target device when a user is authenticated to J-Web. An attacker may be able to supersede existing parameters, including hardcoded parameters within the HTTP/S session, access and exploit variables, bypass web application firewall rules or input validation mechanisms, and otherwise alter and modify J-Web's normal behavior. An attacker may be able to transition victims to malicious web services, or exfiltrate sensitive information from otherwise secure web forms. This issue affects: Juniper Networks Junos OS: All versions prior to 17.4R3-S3; 18.1 versions prior to 18.1R3-S12; 18.2 versions prior to 18.2R3-S6; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R3-S1; 19.3 versions prior to 19.3R3-S1; 19.4 versions prior to 19.4R2-S2, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2.
|
[
"cpe:2.3:o:juniper:junos:17.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r2-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:17.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s10:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s11:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s8:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.1:r3-s9:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r2-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.2:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.3:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r1-s7:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r2-s6:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:18.4:r3-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.1:r3-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r1-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.2:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:-:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r2-s5:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.3:r3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:19.4:r2-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s3:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.1:r1-s4:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s1:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s2:*:*:*:*:*:*",
"cpe:2.3:o:juniper:junos:20.2:r1-s3:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
CVE-2021-31156
|
Allied Telesis AT-S115 1.2.0 devices before 1.00.024 with Boot Loader 1.00.006 allow Directory Traversal to achieve partial access to data.
|
[
"cpe:2.3:a:allied_telesis_at:s115_1.2.0:1.00.024_with_boot_loader_1.00.006:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
|
CVE-2020-36405
|
Keystone Engine 0.9.2 has a use-after-free in llvm_ks::X86Operand::getToken.
|
[
"cpe:2.3:a:keystone-engine:keystone_engine:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | 7.8
| null | 6.8
| null |
|
GHSA-q3r8-jh3w-qx76
|
XSS exists in FUEL CMS 1.4.3 via the Page title, Meta description, or Meta keywords during page data management, as demonstrated by the pages/edit/1?lang=english URI.
|
[] | null | null | 4.8
| null | null |
|
CVE-2018-15188
|
PHP Scripts Mall advanced-real-estate-script 4.0.9 allows remote attackers to cause a denial of service (page structure loss) via crafted JavaScript code in the Name field of a profile.
|
[
"cpe:2.3:a:advanced_real_estate_script_project:advanced_real_estate_script:4.0.9:*:*:*:*:*:*:*"
] | null | null | 6.5
| 5.5
| null |
|
ICSA-18-352-05
|
Siemens TIM 1531 IRC Modules
|
The device was missing proper authentication on port 102/tcp, although configured. Successful exploitation requires an attacker to be able to send packets to port 102/tcp of the affected device. No user interaction and no user privileges are required to exploit the vulnerability. At the time of advisory publication no public exploitation of this vulnerability was known.
|
[] | null | 10
| null | null | null |
PYSEC-2017-77
| null |
The swri_audio_convert function in audioconvert.c in FFmpeg libswresample through 3.0.101, as used in FFmpeg 3.4.1, aubio 0.4.6, and other products, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.
|
[] | null | null | null | null | null |
GHSA-8p6g-qcgj-whg4
|
An out-of-bounds read vulnerability exists in the IOCTL GetProcessCommand and B_03 of Webroot Secure Anywhere 21.4. A specially-crafted executable can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. An out-of-bounds read vulnerability exists in the IOCTL GetProcessCommand and B_03 of Webroot Secure Anywhere 21.4. An IOCTL_B03 request with specific invalid data causes a similar issue in the device driver WRCore_x64. An attacker can issue an ioctl to trigger this vulnerability.
|
[] | null | 6.5
| null | null | null |
|
CVE-2024-1168
|
SEOPress – On-site SEO <= 7.9 - Authenticated(Contributor+) Stored Cross-Site Scripting via Social Image URL
|
The SEOPress – On-site SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's social image URL in all versions up to, and including, 7.9 due to insufficient input sanitization and output escaping on user supplied image URLs. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:seopress:seopress:*:*:*:*:*:wordpress:*:*"
] | null | 6.4
| null | null | null |
GHSA-jpr7-q523-hx25
|
phpseclib vulnerable to denial of service
|
In Math/BinaryField.php in phpseclib 3 before 3.0.34, excessively large degrees in binary fields can lead to a denial of service.
|
[] | null | 7.5
| null | null | null |
GHSA-v4m4-f9f5-pvcm
|
mail/include.html in IceWarp Web Mail 5.5.1, as used by Merak Mail Server 8.3.0r and VisNetic Mail Server version 8.3.0 build 1, does not properly initialize the default_layout and layout_settings variables when an unrecognized HTTP_USER_AGENT string is provided, which allows remote attackers to access arbitrary files via a request with an unrecognized User Agent that also specifies the desired default_layout and layout_settings parameters.
|
[] | null | null | null | null | null |
|
CVE-2024-13360
|
AI Power: Complete AI Pack <= 1.8.96 - Authenticated (Subscriber+) Server-Side Request Forgery
|
The AI Power: Complete AI Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.8.96 via the wpaicg_troubleshoot_add_vector(). This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
|
[] | null | 5.4
| null | null | null |
GHSA-4p85-gw46-324c
|
An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won't be escaped.
|
[] | null | 6.1
| null | null | null |
|
GHSA-qq34-m9w6-mvqp
|
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: hci_uart: add missing NULL check in h5_enqueueSyzbot hit general protection fault in __pm_runtime_resume(). The problem
was in missing NULL check.hu->serdev can be NULL and we should not blindly pass &serdev->dev
somewhere, since it will cause GPF.
|
[] | null | 5.5
| null | null | null |
|
CVE-2009-0628
|
Memory leak in the SSLVPN feature in Cisco IOS 12.3 through 12.4 allows remote attackers to cause a denial of service (memory consumption and device crash) by disconnecting an SSL session in an abnormal manner, leading to a Transmission Control Block (TCB) leak.
|
[
"cpe:2.3:o:cisco:cisco_ios:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:b:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:bc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:bw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:eu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ja:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jea:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jeb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jec:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jl:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:jx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:t:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:tpc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:va:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xs:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:xy:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ya:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yh:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yi:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ym:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yq:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:ys:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yt:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yu:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.3:yz:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:ja:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jk:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jma:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jmb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jmc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:jx:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:md:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:mr:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:sw:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:t:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xa:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xb:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xc:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xd:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xe:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xf:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xg:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xj:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cisco_ios:12.4:xk:*:*:*:*:*:*"
] | null | null | null | 9
| null |
|
GHSA-v546-xgjm-f26m
|
SQL injection vulnerability in the Freestyle FAQs Lite (com_fsf) component, possibly 1.3, for Joomla! allows remote attackers to execute arbitrary SQL commands via the faqid parameter in an faq action to index.php.
|
[] | null | null | null | null | null |
|
CVE-2025-21407
|
Windows Telephony Service Remote Code Execution Vulnerability
|
Windows Telephony Service Remote Code Execution Vulnerability
|
[] | null | 8.8
| null | null | null |
CVE-2004-2067
|
SQL injection vulnerability in controlpanel.php in Jaws Framework and Content Management System 0.4 allows remote attackers to execute arbitrary SQL and bypass authentication via the (1) user, (2) password, or (3) crypted_password parameters.
|
[
"cpe:2.3:a:jaws:jaws:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:jaws:jaws:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:jaws:jaws:0.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
CVE-2022-24342
|
In JetBrains TeamCity before 2021.2.1, URL injection leading to CSRF was possible.
|
[
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | 6.8
| null |
|
GHSA-w2f6-jgw8-wpp3
|
The Dell Isilon OneFS versions 8.2.2 and earlier SSHD process improperly allows Transmission Control Protocol (TCP) and stream forwarding. This provides the remotesupport user and users with restricted shells more access than is intended.
|
[] | null | 4.3
| null | null | null |
|
CVE-2010-0264
|
Microsoft Office Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet, aka "Microsoft Office Excel DbOrParamQry Record Parsing Vulnerability."
|
[
"cpe:2.3:a:microsoft:excel:2002:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:excel:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2008:*:mac:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_compatibility_pack:2007:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_excel_viewer:*:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp1:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x32:*:*:*:*:*",
"cpe:2.3:a:microsoft:office_sharepoint_server:2007:sp2:x64:*:*:*:*:*",
"cpe:2.3:a:microsoft:open_xml_file_format_converter:*:*:mac:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
CVE-2012-0607
|
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
CVE-2001-1149
|
Panda Antivirus Platinum before 6.23.00 allows a remore attacker to cause a denial of service (crash) when a user selects an action for a malformed UPX packed executable file.
|
[
"cpe:2.3:a:panda:panda_antivirus_platinum:*:*:*:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-2998-9vr3-8cqh
|
Multiple buffer overflow vulnerabilities exist in the internet.cgi set_qos() functionality of Wavlink AC3000 M33A8.V5030.210505. A specially crafted HTTP request can lead to stack-based buffer overflow. An attacker can make an authenticated HTTP request to trigger these vulnerabilities.This vulnerability exists in the `cli_mac` POST parameter.
|
[] | null | 9.1
| null | null | null |
|
GHSA-wg25-j79r-v5wp
|
Magento Cross-Site Scripting via Signifyd Guarantee Option Translation Override
|
A stored cross-site scripting (XSS) vulnerability exists in Magento 2.2 prior to 2.2.10, Magento 2.3 prior to 2.3.3 or 2.3.2-p1. An authenticated user can exploit it by injecting an embedded expression into a translation.
|
[] | null | 5.4
| null | null | null |
GHSA-c483-26fv-jphv
|
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'.
|
[] | null | 7.5
| null | null | null |
|
GHSA-f7q5-qg45-7vm8
|
A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly.
|
[] | null | 5.3
| null | null | null |
|
CVE-2017-5496
|
Sawmill Enterprise 8.7.9 allows remote attackers to gain login access by leveraging knowledge of a password hash.
|
[
"cpe:2.3:a:sawmill:sawmill:8.7.9:*:*:*:*:enterprise:*:*"
] | null | null | 9.8
| 5
| null |
|
GHSA-8j2c-wgm2-c4h8
|
A vulnerability was found in Tenda AC10U 15.03.06.49_multi_TDE01. It has been rated as critical. Affected by this issue is the function fromNatStaticSetting. The manipulation of the argument page leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-252134 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | null | 4.7
| null | null | null |
|
CVE-2019-10846
|
Computrols CBAS 18.0.0 allows Unauthenticated Reflected Cross-Site Scripting vulnerabilities in the login page and password reset page via the username GET parameter.
|
[
"cpe:2.3:a:computrols:computrols_building_automation_system:*:*:*:*:*:*:*:*"
] | null | 6.1
| null | 4.3
| null |
|
CVE-2023-52859
|
perf: hisi: Fix use-after-free when register pmu fails
|
In the Linux kernel, the following vulnerability has been resolved:
perf: hisi: Fix use-after-free when register pmu fails
When we fail to register the uncore pmu, the pmu context may not been
allocated. The error handing will call cpuhp_state_remove_instance()
to call uncore pmu offline callback, which migrate the pmu context.
Since that's liable to lead to some kind of use-after-free.
Use cpuhp_state_remove_instance_nocalls() instead of
cpuhp_state_remove_instance() so that the notifiers don't execute after
the PMU device has been failed to register.
|
[] | null | 7.8
| null | null | null |
GHSA-j2fc-j5qr-63jr
|
Directory Traversal vulnerability in Punkbuster pbsv.d64 2.351, allows remote attackers to execute arbitrary code.
|
[] | null | 7.6
| null | null | null |
|
GHSA-fh8c-9pw4-5fjj
|
Dev blog v1.0 allows to exploit an XSS through an unrestricted file upload, together with a bad entropy of filenames. With this an attacker can upload a malicious HTML file, then guess the filename of the uploaded file and send it to a potential victim.
|
[] | null | 6.4
| null | null | null |
|
CVE-2025-32926
|
WordPress Grand Restaurant WordPress theme <= 7.0 - Path Traversal to PHP Object Injection vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in ThemeGoods Grand Restaurant WordPress allows Path Traversal.This issue affects Grand Restaurant WordPress: from n/a through 7.0.
|
[] | null | 9.8
| null | null | null |
GHSA-48c6-58v7-72hf
|
SQL injection vulnerability in listtest.php in YourFreeWorld Apartment Search Script allows remote attackers to execute arbitrary SQL commands via the r parameter.
|
[] | null | null | null | null | null |
|
GHSA-6wr4-gf2h-68p5
|
The Featured Image from URL (FIFU) plugin for WordPress is vulnerable to SQL Injection via the get_posts_with_internal_featured_image() function in all versions up to, and including, 5.2.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
|
[] | null | 4.9
| null | null | null |
|
CVE-2019-12970
|
XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
|
[
"cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-37xf-px7h-945g
|
Missing Authorization vulnerability in Ram Segev Leader allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Leader: from n/a through 2.6.1.
|
[] | null | 4.3
| null | null | null |
|
GHSA-77rh-fhxx-8gwg
|
TOTOLINK A3100R V4.1.2cu.5050_B20200504 and V4.1.2cu.5247_B20211129 were discovered to contain a command injection vulnerability via the magicid parameter in the function uci_cloudupdate_config.
|
[] | null | 8.1
| null | null | null |
|
GHSA-g3v5-cgpf-rr2h
|
Lanscope Endpoint Manager (On-Premises) (Client program (MR) and Detection agent (DA)) improperly verifies the origin of incoming requests, allowing an attacker to execute arbitrary code by sending specially crafted packets.
|
[] | 9.3
| null | 9.8
| null | null |
|
GHSA-9fjc-6jmw-8r3m
|
Race condition in bzip2 1.0.2 and earlier allows local users to modify permissions of arbitrary files via a hard link attack on a file while it is being decompressed, whose permissions are changed by bzip2 after the decompression is complete.
|
[] | null | null | null | null | null |
|
GHSA-4359-9c9p-4q45
|
router.php in the Harmis Ek rishta (aka ek-rishta) 2.10 component for Joomla! allows SQL Injection via the PATH_INFO to a home/requested_user/Sent%20interest/ URI.
|
[] | null | null | 8.8
| null | null |
|
CVE-2022-2726
|
SEMCMS Ant_Check.php sql injection
|
A vulnerability classified as critical has been found in SEMCMS. This affects an unknown part of the file Ant_Check.php. The manipulation of the argument DID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205839.
|
[
"cpe:2.3:a:sem-cms:semcms:-:*:*:*:*:*:*:*"
] | null | 6.3
| null | null | null |
CVE-2021-47442
|
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
|
In the Linux kernel, the following vulnerability has been resolved:
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
'skb' is allocated in digital_in_send_sdd_req(), but not free when
digital_in_send_cmd() failed, which will cause memory leak. Fix it
by freeing 'skb' if digital_in_send_cmd() return failed.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.15:rc5:*:*:*:*:*:*"
] | null | 5.5
| null | null | null |
GHSA-h646-78fm-58fg
|
In Delta Industrial Automation DOPSoft, Version 4.00.06.15 and prior, processing a specially crafted project file may trigger a use-after-free vulnerability, which may allow information disclosure, remote code execution, or crash of the application.
|
[] | null | 7.8
| null | null | null |
|
GHSA-44mp-2g68-7wvv
|
In libavif before 1.3.0, avifImageRGBToYUV in reformat.c has integer overflows in multiplications involving rgbRowBytes, yRowBytes, uRowBytes, and vRowBytes.
|
[] | null | 4.5
| null | null | null |
|
GHSA-rfwj-hvcp-2885
|
This issue was addressed with improved validation of symlinks. This issue is fixed in macOS Sonoma 14.8.2, macOS Sequoia 15.7.2. An app may be able to modify protected parts of the file system.
|
[] | null | 5.5
| null | null | null |
|
GHSA-9r4g-gmfh-6gxg
|
The WordPress WP YouTube Live Plugin is vulnerable to Reflected Cross-Site Scripting via POST data found in the ~/inc/admin.php file which allows unauthenticated attackers to inject arbitrary web scripts in versions up to, and including, 1.7.21.
|
[] | null | 6.1
| null | null | null |
|
GHSA-vr73-4h65-j4pm
|
SQL injection vulnerability in kategorix.asp in Haberx 1.02 through 1.1 allows remote attackers to execute arbitrary SQL commands via the id parameter in kategorihaberx.asp.
|
[] | null | null | null | null | null |
|
GHSA-4mwf-jv6c-g6rm
|
Microsoft Cryptographic Services Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2023-21561, CVE-2023-21730.
|
[] | null | 7.8
| null | null | null |
|
GHSA-42g6-c5f2-p9f3
|
Stack-based buffer overflow in the ir_fetch_seq function in balsa before 2.3.20 might allow remote IMAP servers to execute arbitrary code via a long response to a FETCH command.
|
[] | null | null | null | null | null |
|
GHSA-7r7f-rxmv-c4j3
|
The Stetic WordPress plugin is vulnerable to Cross-Site Request Forgery due to missing nonce validation via the stats_page function found in the ~/stetic.php file, which made it possible for attackers to inject arbitrary web scripts in versions up to, and including 1.0.6.
|
[] | null | null | null | null | null |
|
GHSA-2xjf-f4mq-m3q5
|
The KiviCare WordPress plugin before 3.2.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as administrator
|
[] | null | 6.1
| null | null | null |
|
CVE-2023-42788
|
An improper neutralization of special elements used in an os command ('OS Command Injection') vulnerability [CWE-78] in FortiManager & FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3, version 7.0.0 through 7.0.8, version 6.4.0 through 6.4.12 and version 6.2.0 through 6.2.11 may allow a local attacker with low privileges to execute unauthorized code via specifically crafted arguments to a CLI command
|
[
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*"
] | null | 7.6
| null | null | null |
|
GHSA-h9gg-52h2-vqv9
|
Heap-based buffer overflow in Trend Micro AntiVirus Library VSAPI before 7.510, as used in multiple Trend Micro products, allows remote attackers to execute arbitrary code via a crafted ARJ file with long header file names that modify pointers within a structure.
|
[] | null | null | null | null | null |
|
CVE-2024-1898
|
Improper access control in the notification feature in Devolutions Server 2023.3.14.0 and earlier allows a low privileged user to change notifications settings configured by an administrator.
|
[] | null | 3.9
| null | null | null |
|
GHSA-h83f-mvv6-mg63
|
An elevation of privilege vulnerability in the Broadcom wifi driver. Product: Android. Versions: Android kernel. Android ID: A-37622847. References: B-V2017063001.
|
[] | null | null | 9.8
| null | null |
|
GHSA-vxqj-cqqr-q9rw
|
The Eventin – Event Manager, Events Calendar, Event Tickets and Registrations plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'post_settings' function in all versions up to, and including, 4.0.51. This makes it possible for unauthenticated attackers to modify plugin settings. Furthermore, due to insufficient input sanitization and output escaping on the 'etn_primary_color' setting, this enables unauthenticated attackers to inject arbitrary web scripts that will execute whenever a user accesses a page where Eventin styles are loaded.
|
[] | null | 7.2
| null | null | null |
|
GHSA-85m9-wggc-372h
|
A vulnerability has been identified in JT2Go (All versions < V13.3.0.3), Teamcenter Visualization V13.3 (All versions < V13.3.0.3), Teamcenter Visualization V14.0 (All versions < V14.0.0.1). The CGM_NIST_Loader.dll library contains a double free vulnerability while parsing specially crafted CGM files. An attacker could leverage this vulnerability to execute code in the context of the current process.
|
[] | null | 7.8
| null | null | null |
|
GHSA-r4jv-xp6w-68qp
|
The kadm_ser_in function in (1) the Kerberos v4compatibility administration daemon (kadmind4) in the MIT Kerberos 5 (krb5) krb5-1.2.6 and earlier, (2) kadmind in KTH Kerberos 4 (eBones) before 1.2.1, and (3) kadmind in KTH Kerberos 5 (Heimdal) before 0.5.1 when compiled with Kerberos 4 support, does not properly verify the length field of a request, which allows remote attackers to execute arbitrary code via a buffer overflow attack.
|
[] | null | null | null | null | null |
|
GHSA-g27q-hphj-9pm4
|
SQL injection vulnerability in the Photo Gallery plugin 1.2.7 for WordPress allows remote attackers to execute arbitrary SQL commands via the order_by parameter in a GalleryBox action to wp-admin/admin-ajax.php.
|
[] | null | null | null | null | null |
|
GHSA-rcv7-m37q-g2mp
|
HTML injection vulnerability in Perfex CRM v3.2.1 consisting of a
stored HTML injection due to lack of proper validation of user input by
sending a POST request in the parameters 'subject' at the endpoint 'knoewledge_base/article'.
|
[] | 5.3
| 6.1
| null | null | null |
|
CVE-2025-1598
|
SourceCodester Best Church Management Software asset_crud.php unrestricted upload
|
A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/asset_crud.php. The manipulation of the argument photo1 leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3
| 6.3
| 6.3
| 6.5
| null |
This dataset, CIRCL/vulnerability-scores, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))