
CIRCL/vulnerability-severity-classification-distilbert-base-uncased
Text Classification
•
Updated
•
199
•
1
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2024-28917 | Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability | Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability | [
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.azstackhci.operator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.azure.hybridnetwork:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.azurekeyvaultsecretsprovider:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.iotoperations.mq:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.networkfabricserviceextension:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.openservicemesh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:azure_arc_extension_microsoft.videoindexer:*:*:*:*:*:*:*:*"
] | null | 6.2 | null | null |
ICSA-21-112-02 | Mitsubishi Electric GOT (Update A) | A password authentication bypass vulnerability exists in the VNC function of the GOT2000 series and the GOT SIMPLE series due to improper authentication.CVE-2021-20590 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N). | [] | null | null | 5.9 | null |
CVE-2016-11022 | NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5.0.35 devices allow a remote attacker to execute code with root privileges via shell metacharacters in the reqMethod parameter to login_handler.php. | [
"cpe:2.3:o:netgear:prosafe_wc9500_firmware:5.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:prosafe_wc9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:prosafe_wc7600_firmware:5.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:prosafe_wc7600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:prosafe_wc7520_firmware:2.5.0.35:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:prosafe_wc7520:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2019-0549 | An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0554, CVE-2019-0569. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 5.5 | 2.1 |
|
GHSA-g33j-hgrw-88mh | pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system. | [] | null | null | null | null |
|
GHSA-cvx3-834p-cj35 | FineCMS 2.1.0 allows remote attackers to execute arbitrary PHP code by using a URL Manager "Add Site" action to enter this code after a ', sequence in a domain name, as demonstrated by the ',phpinfo() input value. | [] | null | null | 9.8 | null |
|
CVE-2016-10580 | nodewebkit is an installer for node-webkit. nodewebkit downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested zip file with an attacker controlled zip file if the attacker is on the network or positioned in between the user and the remote server. | [
"cpe:2.3:a:nodewebkit_project:nodewebkit:*:*:*:*:*:node.js:*:*"
] | null | null | 8.1 | 9.3 |
|
RHSA-2025:3837 | Red Hat Security Advisory: openssh security update | openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled | [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
] | null | 6.8 | null | null |
CVE-2023-52487 | net/mlx5e: Fix peer flow lists handling | In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix peer flow lists handling
The cited change refactored mlx5e_tc_del_fdb_peer_flow() to only clear DUP
flag when list of peer flows has become empty. However, if any concurrent
user holds a reference to a peer flow (for example, the neighbor update
workqueue task is updating peer flow's parent encap entry concurrently),
then the flow will not be removed from the peer list and, consecutively,
DUP flag will remain set. Since mlx5e_tc_del_fdb_peers_flow() calls
mlx5e_tc_del_fdb_peer_flow() for every possible peer index the algorithm
will try to remove the flow from eswitch instances that it has never peered
with causing either NULL pointer dereference when trying to remove the flow
peer list head of peer_index that was never initialized or a warning if the
list debug config is enabled[0].
Fix the issue by always removing the peer flow from the list even when not
releasing the last reference to it.
[0]:
[ 3102.985806] ------------[ cut here ]------------
[ 3102.986223] list_del corruption, ffff888139110698->next is NULL
[ 3102.986757] WARNING: CPU: 2 PID: 22109 at lib/list_debug.c:53 __list_del_entry_valid_or_report+0x4f/0xc0
[ 3102.987561] Modules linked in: act_ct nf_flow_table bonding act_tunnel_key act_mirred act_skbedit vxlan cls_matchall nfnetlink_cttimeout act_gact cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa openvswitch nsh xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcg
ss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core [last unloaded: bonding]
[ 3102.991113] CPU: 2 PID: 22109 Comm: revalidator28 Not tainted 6.6.0-rc6+ #3
[ 3102.991695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
[ 3102.992605] RIP: 0010:__list_del_entry_valid_or_report+0x4f/0xc0
[ 3102.993122] Code: 39 c2 74 56 48 8b 32 48 39 fe 75 62 48 8b 51 08 48 39 f2 75 73 b8 01 00 00 00 c3 48 89 fe 48 c7 c7 48 fd 0a 82 e8 41 0b ad ff <0f> 0b 31 c0 c3 48 89 fe 48 c7 c7 70 fd 0a 82 e8 2d 0b ad ff 0f 0b
[ 3102.994615] RSP: 0018:ffff8881383e7710 EFLAGS: 00010286
[ 3102.995078] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000
[ 3102.995670] RDX: 0000000000000001 RSI: ffff88885f89b640 RDI: ffff88885f89b640
[ 3102.997188] DEL flow 00000000be367878 on port 0
[ 3102.998594] RBP: dead000000000122 R08: 0000000000000000 R09: c0000000ffffdfff
[ 3102.999604] R10: 0000000000000008 R11: ffff8881383e7598 R12: dead000000000100
[ 3103.000198] R13: 0000000000000002 R14: ffff888139110000 R15: ffff888101901240
[ 3103.000790] FS: 00007f424cde4700(0000) GS:ffff88885f880000(0000) knlGS:0000000000000000
[ 3103.001486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 3103.001986] CR2: 00007fd42e8dcb70 CR3: 000000011e68a003 CR4: 0000000000370ea0
[ 3103.002596] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 3103.003190] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 3103.003787] Call Trace:
[ 3103.004055] <TASK>
[ 3103.004297] ? __warn+0x7d/0x130
[ 3103.004623] ? __list_del_entry_valid_or_report+0x4f/0xc0
[ 3103.005094] ? report_bug+0xf1/0x1c0
[ 3103.005439] ? console_unlock+0x4a/0xd0
[ 3103.005806] ? handle_bug+0x3f/0x70
[ 3103.006149] ? exc_invalid_op+0x13/0x60
[ 3103.006531] ? asm_exc_invalid_op+0x16/0x20
[ 3103.007430] ? __list_del_entry_valid_or_report+0x4f/0xc0
[ 3103.007910] mlx5e_tc_del_fdb_peers_flow+0xcf/0x240 [mlx5_core]
[ 3103.008463] mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]
[ 3103.008944] mlx5e_flow_put+0x26/0x50 [mlx5_core]
[ 3103.009401] mlx5e_delete_flower+0x25f/0x380 [mlx5_core]
[ 3103.009901] tc_setup_cb_destroy+0xab/0x180
[ 3103.010292] fl_hw_destroy_filter+0x99/0xc0 [cls_flower]
[ 3103.010779] __fl_delete+0x2d4/0x2f0 [cls_flower]
[ 3103.0
---truncated--- | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*"
] | null | 5.5 | null | null |
CVE-2017-12298 | A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf78615, CSCvf78628. | [
"cpe:2.3:a:cisco:webex_meeting_center:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-8qm6-jxp9-c775 | It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability. | [] | null | null | 7.5 | null |
|
ICSA-23-199-01 | Rockwell Automation Kinetix 5700 DC Bus Power Supply | The Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. The new ENIP connections cannot be established if impacted by this vulnerability, which prohibits operational capabilities of the device resulting in a denial-of-service attack. | [] | null | null | 7.5 | null |
GHSA-ggf5-r98h-6h5g | ** DISPUTED ** Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed." | [] | null | 9.1 | null | null |
|
CVE-2017-18110 | The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability. | [
"cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:atlassian:crowd:3.1.0:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 |
|
CVE-2022-31971 | ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /simple_chat_bot/admin/?page=responses/view_response&id=. | [
"cpe:2.3:a:chatbot_app_with_suggestion_project:chatbot_app_with_suggestion:1.0:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
CVE-2019-15624 | Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders. | [
"cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*"
] | null | 4.9 | null | 4 |
|
GHSA-m69p-8v8r-jhcc | Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. | [] | null | null | null | null |
|
CVE-2013-2564 | Mambo CMS 4.6.5 allows remote attackers to cause a denial of service (memory and bandwidth consumption) by uploading a crafted file. | [
"cpe:2.3:a:mambo-foundation:mambo_cms:4.6.5:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2004-1825 | Cross-site scripting (XSS) vulnerability in index.php in Mambo Open Source 4.5 stable 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) return or (2) mos_change_template parameters. | [
"cpe:2.3:a:mambo:mambo_open_source:4.5_1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo_open_source:4.5_1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2007-0203 | Multiple unspecified vulnerabilities in phpMyAdmin before 2.9.2-rc1 have unknown impact and attack vectors. | [
"cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2009-1844 | Multiple cross-site scripting (XSS) vulnerabilities in Drupal 5.x before 5.18 and 6.x before 6.12 allow (1) remote authenticated users to inject arbitrary web script or HTML via crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, which are not properly handled in the "HTML exports of books" feature; and (2) allow remote authenticated users with administer taxonomy permissions to inject arbitrary web script or HTML via the help text of an arbitrary vocabulary. NOTE: vector 1 exists because of an incomplete fix for CVE-2009-1575. | [
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*"
] | null | null | null | 3.5 |
|
GHSA-6882-cffw-fg5p | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
CVE-2010-3262 | Cross-site scripting (XSS) vulnerability in Flock Browser 3.x before 3.0.0.4114 allows remote attackers to inject arbitrary web script or HTML via a crafted RSS feed. | [
"cpe:2.3:a:flock:flock:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2024-23717 | In access_secure_service_from_temp_bond of btm_sec.cc, there is a possible way to achieve keystroke injection due to improper input validation. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*"
] | null | 9.1 | null | null |
|
CVE-2018-6443 | A vulnerability in Brocade Network Advisor Versions before 14.3.1 could allow an unauthenticated, remote attacker to log in to the JBoss Administration interface of an affected system using an undocumented user credentials and install additional JEE applications. A remote unauthenticated user who has access to Network Advisor client libraries and able to decrypt the Jboss credentials could gain access to the Jboss web console. | [
"cpe:2.3:a:brocade:network_advisor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:brocade_network_advisor:-:*:*:*:*:*:*:*"
] | null | null | 8.1 | 4.3 |
|
CVE-2020-16920 | Windows Application Compatibility Client Library Elevation of Privilege Vulnerability | <p>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p>
<p>To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.</p>
<p>The security update addresses the vulnerability by ensuring the Windows Application Compatibility Client Library properly handles registry operations.</p>
| [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] | null | 7.8 | null | null |
CVE-2022-47007 | An issue was discovered function stab_demangle_v3_arg in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks. | [
"cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
RHSA-2013:0589 | Red Hat Security Advisory: git security update | git: Incorrect IMAP server's SSL x509.v3 certificate validation in git-imap-send command | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-r5hp-gwxj-3824 | In the Linux kernel, the following vulnerability has been resolved:bonding: stop the device in bond_setup_by_slave()Commit 9eed321cde22 ("net: lapbether: only support ethernet devices")
has been able to keep syzbot away from net/lapb, until today.In the following splat [1], the issue is that a lapbether device has
been created on a bonding device without members. Then adding a non
ARPHRD_ETHER member forced the bonding master to change its type.The fix is to make sure we call dev_close() in bond_setup_by_slave()
so that the potential linked lapbether devices (or any other devices
having assumptions on the physical device) are removed.A similar bug has been addressed in commit 40baec225765
("bonding: fix panic on non-ARPHRD_ETHER enslave failure")[1]
skbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0
kernel BUG at net/core/skbuff.c:192 !
Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
Modules linked in:
CPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : skb_panic net/core/skbuff.c:188 [inline]
pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
lr : skb_panic net/core/skbuff.c:188 [inline]
lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
sp : ffff800096a06aa0
x29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000
x26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea
x23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140
x20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100
x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001
x14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00
x8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c
x2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086
Call trace:
skb_panic net/core/skbuff.c:188 [inline]
skb_under_panic+0x13c/0x140 net/core/skbuff.c:202
skb_push+0xf0/0x108 net/core/skbuff.c:2446
ip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384
dev_hard_header include/linux/netdevice.h:3136 [inline]
lapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257
lapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447
lapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149
lapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251
__lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326
lapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
lapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466
notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93
raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461
call_netdevice_notifiers_info net/core/dev.c:1970 [inline]
call_netdevice_notifiers_extack net/core/dev.c:2008 [inline]
call_netdevice_notifiers net/core/dev.c:2022 [inline]
__dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508
dev_close_many+0x1e0/0x470 net/core/dev.c:1559
dev_close+0x174/0x250 net/core/dev.c:1585
bond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332
bond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539
dev_ifsioc+0x754/0x9ac
dev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786
sock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217
sock_ioctl+0x4e8/0x834 net/socket.c:1322
vfs_ioctl fs/ioctl.c:51 [inline]
__do_
---truncated--- | [] | null | null | null | null |
|
GHSA-3575-hp8p-f32c | The Rockwell Automation Enhanced HIM software containsan API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products. | [] | null | 9.6 | null | null |
|
GHSA-q66r-jxjv-9p52 | An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the string literal parser. A successful attack can lead to sensitive data exposure. | [] | null | null | 6.5 | null |
|
GHSA-5qwh-5j36-wh9w | Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction. | [] | null | 9.8 | null | null |
|
GHSA-xvjw-g673-q26h | The QuickType feature in the Keyboards subsystem in Apple iOS before 8.3 allows physically proximate attackers to discover passcodes by reading the lock screen during use of a Bluetooth keyboard. | [] | null | null | null | null |
|
GHSA-g8wh-vch5-x6pw | The tutor_place_rating AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students. | [] | null | null | null | null |
|
CVE-2024-32866 | Conform contains Prototype Pollution Vulnerability in `parseWith...` function | Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.
| [
"cpe:2.3:a:edmundhung:conform:*:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
CVE-2005-3012 | The MasterDataCD::createImage function in masterdatacd.cpp for SimpleCDR-X 1.3.3 creates the .temp temporary directory with insecure permissions, which allows local users to read sensitive ISO images. | [
"cpe:2.3:a:simplecdr-x:simplecdr-x:1.3.3:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-2004-1450 | Unknown vulnerability in LiveConnect in Mozilla 1.7 beta allows remote attackers to read arbitrary files in known locations. | [
"cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2001-0387 | Format string vulnerability in hfaxd in HylaFAX before 4.1.b2_2 allows local users to gain privileges via the -q command line argument. | [
"cpe:2.3:a:hylafax:hylafax:4.0_pl0:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.0_pl1:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.0_pl2:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.1_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.1_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:hylafax:hylafax:4.1_beta3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2018-1140 | A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | null |
|
CVE-2024-11630 | E-Lins H685/H685f/H700/H720/H750/H820/H820Q/H820Q0/H900 OEM Backend hard-coded credentials | A vulnerability has been found in E-Lins H685, H685f, H700, H720, H750, H820, H820Q, H820Q0 and H900 up to 3.2 and classified as critical. This vulnerability affects unknown code of the component OEM Backend. The manipulation leads to hard-coded credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:a:e-lins:h685:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h685f:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h700:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h720:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h750:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h820:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h820q:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h820q0:*:*:*:*:*:*:*:*",
"cpe:2.3:a:e-lins:h900:*:*:*:*:*:*:*:*"
] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2009-0449 | Buffer overflow in klim5.sys in Kaspersky Anti-Virus for Workstations 6.0 and Anti-Virus 2008 allows local users to gain privileges via an IOCTL 0x80052110 call. | [
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0:*:workstations:*:*:*:*:*",
"cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:2008:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-2019-0640 | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0610, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655. | [
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 |
|
GHSA-mq7f-7h9f-7344 | Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution . | [] | null | null | null | null |
|
GHSA-pm9v-325f-5g74 | Malicious Package in saync | All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation. | [] | null | 9.8 | null | null |
CVE-2016-10527 | The riot-compiler version version 2.3.21 has an issue in a regex (Catastrophic Backtracking) thats make it unusable under certain conditions. | [
"cpe:2.3:a:riot.js:riot-compiler:2.3.21:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 |
|
CVE-2016-3038 | IBM Cognos TM1 10.1 and 10.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 114614. | [
"cpe:2.3:a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-3vq6-cwx3-x994 | regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free. | [] | null | null | 7.5 | null |
|
CVE-2005-0522 | Chat Anywhere 2.72a stores sensitive information such as passwords in plaintext in the .INI file for a chatroom, which allows local users to gain privileges. | [
"cpe:2.3:a:lionmax_software:chat_anywhere:2.72a:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
GHSA-7m68-gw28-j6h2 | Cross-site scripting (XSS) vulnerability in pfSense before 2.2.3 allows remote attackers to inject arbitrary web script or HTML via the descr parameter in a "new" action to system_authservers.php. | [] | null | null | null | null |
|
GHSA-xhmp-h8ff-8qf8 | The Grocery List - Tomatoes (aka com.meucarrinho) application 5.1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null |
|
RHSA-2011:0945 | Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.1 update | JBoss Seam EL interpolation in exception handling | [
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el4",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el5",
"cpe:/a:redhat:jboss_enterprise_web_platform:5::el6"
] | null | null | null | null |
GHSA-45hx-52x3-7mvr | Cross-site scripting (XSS) vulnerability in testcgi.exe in Lilikoi Software Ceilidh 2.70 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string. | [] | null | null | null | null |
|
RHSA-2020:5439 | Red Hat Security Advisory: samba security and bug fix update | samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | 5 | null | null |
CVE-2019-6012 | SQL injection vulnerability in the wpDataTables Lite Version 2.0.11 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:tms-outsource:wpdatatables_lite:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | 6.5 |
|
GHSA-4vg2-58j7-gmw7 | In the Linux kernel, the following vulnerability has been resolved:inet: inet_defrag: prevent sk release while still in useip_local_out() and other functions can pass skb->sk as function argument.If the skb is a fragment and reassembly happens before such function call
returns, the sk must not be released.This affects skb fragments reassembled via netfilter or similar
modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.Eric Dumazet made an initial analysis of this bug. Quoting Eric:
Calling ip_defrag() in output path is also implying skb_orphan(),
which is buggy because output path relies on sk not disappearing.A relevant old patch about the issue was :
8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()")[..]net/ipv4/ip_output.c depends on skb->sk being set, and probably to an
inet socket, not an arbitrary one.If we orphan the packet in ipvlan, then downstream things like FQ
packet scheduler will not work properly.We need to change ip_defrag() to only use skb_orphan() when really
needed, ie whenever frag_list is going to be used.Eric suggested to stash sk in fragment queue and made an initial patch.
However there is a problem with this:If skb is refragmented again right after, ip_do_fragment() will copy
head->sk to the new fragments, and sets up destructor to sock_wfree.
IOW, we have no choice but to fix up sk_wmem accouting to reflect the
fully reassembled skb, else wmem will underflow.This change moves the orphan down into the core, to last possible moment.
As ip_defrag_offset is aliased with sk_buff->sk member, we must move the
offset into the FRAG_CB, else skb->sk gets clobbered.This allows to delay the orphaning long enough to learn if the skb has
to be queued or if the skb is completing the reasm queue.In the former case, things work as before, skb is orphaned. This is
safe because skb gets queued/stolen and won't continue past reasm engine.In the latter case, we will steal the skb->sk reference, reattach it to
the head skb, and fix up wmem accouting when inet_frag inflates truesize. | [] | null | null | null | null |
|
CVE-2025-21858 | geneve: Fix use-after-free in geneve_find_dev(). | In the Linux kernel, the following vulnerability has been resolved:
geneve: Fix use-after-free in geneve_find_dev().
syzkaller reported a use-after-free in geneve_find_dev() [0]
without repro.
geneve_configure() links struct geneve_dev.next to
net_generic(net, geneve_net_id)->geneve_list.
The net here could differ from dev_net(dev) if IFLA_NET_NS_PID,
IFLA_NET_NS_FD, or IFLA_TARGET_NETNSID is set.
When dev_net(dev) is dismantled, geneve_exit_batch_rtnl() finally
calls unregister_netdevice_queue() for each dev in the netns,
and later the dev is freed.
However, its geneve_dev.next is still linked to the backend UDP
socket netns.
Then, use-after-free will occur when another geneve dev is created
in the netns.
Let's call geneve_dellink() instead in geneve_destroy_tunnels().
[0]:
BUG: KASAN: slab-use-after-free in geneve_find_dev drivers/net/geneve.c:1295 [inline]
BUG: KASAN: slab-use-after-free in geneve_configure+0x234/0x858 drivers/net/geneve.c:1343
Read of size 2 at addr ffff000054d6ee24 by task syz.1.4029/13441
CPU: 1 UID: 0 PID: 13441 Comm: syz.1.4029 Not tainted 6.13.0-g0ad9617c78ac #24 dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3d
Hardware name: linux,dummy-virt (DT)
Call trace:
show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:466 (C)
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x16c/0x6f0 mm/kasan/report.c:489
kasan_report+0xc0/0x120 mm/kasan/report.c:602
__asan_report_load2_noabort+0x20/0x30 mm/kasan/report_generic.c:379
geneve_find_dev drivers/net/geneve.c:1295 [inline]
geneve_configure+0x234/0x858 drivers/net/geneve.c:1343
geneve_newlink+0xb8/0x128 drivers/net/geneve.c:1634
rtnl_newlink_create+0x23c/0x868 net/core/rtnetlink.c:3795
__rtnl_newlink net/core/rtnetlink.c:3906 [inline]
rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021
rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911
netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543
rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938
netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]
netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1348
netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1892
sock_sendmsg_nosec net/socket.c:713 [inline]
__sock_sendmsg net/socket.c:728 [inline]
____sys_sendmsg+0x410/0x6f8 net/socket.c:2568
___sys_sendmsg+0x178/0x1d8 net/socket.c:2622
__sys_sendmsg net/socket.c:2654 [inline]
__do_sys_sendmsg net/socket.c:2659 [inline]
__se_sys_sendmsg net/socket.c:2657 [inline]
__arm64_sys_sendmsg+0x12c/0x1c8 net/socket.c:2657
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132
do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151
el0_svc+0x4c/0xa8 arch/arm64/kernel/entry-common.c:744
el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762
el0t_64_sync+0x198/0x1a0 arch/arm64/kernel/entry.S:600
Allocated by task 13247:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x30/0x68 mm/kasan/common.c:68
kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__do_kmalloc_node mm/slub.c:4298 [inline]
__kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4304
__kvmalloc_node_noprof+0x9c/0x230 mm/util.c:645
alloc_netdev_mqs+0xb8/0x11a0 net/core/dev.c:11470
rtnl_create_link+0x2b8/0xb50 net/core/rtnetlink.c:3604
rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3780
__rtnl_newlink net/core/rtnetlink.c:3906 [inline]
rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021
rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911
netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543
rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938
netlink_unicast_kernel net/netlink/af_n
---truncated--- | [] | null | 7.8 | null | null |
GHSA-w2mr-h878-6344 | IBM Cognos Controller 11.0.0 and 11.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. | [] | null | 5.9 | null | null |
|
CVE-2015-4831 | Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2015-4822. | [
"cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*"
] | null | null | null | 4.9 |
|
CVE-2001-0897 | Cross-site scripting vulnerability in Infopop Ultimate Bulletin Board (UBB) before 5.47e allows remote attackers to steal user cookies via an [IMG] tag that references an about: URL with an onerror field. | [
"cpe:2.3:a:infopop:ultimate_bulletin_board:-:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.04:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.05:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:3.75:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.03:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.04:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.05:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.06:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.07:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.50:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.51:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.52:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.53:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.75:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.80:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.81:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.82:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.83:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.84:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.85:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:4.86:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.00:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.08:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.09:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.19:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.20:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.25:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.26:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.28:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.31:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.32:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.33:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.35:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.37:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:d:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.40:*:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:d:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:-:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:a:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:b:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:c:*:*:*:*:*:*",
"cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:d:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-x2v8-652m-p279 | An issue was discovered in Kabona AB WebDatorCentral (WDC) application prior to Version 3.4.0. WDC does not limit authentication attempts that may allow a brute force attack method. | [] | null | null | 9.8 | null |
|
CVE-2019-10062 | The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attribute of various other elements. An attacker might also exploit a bug in how the SCRIPT string is processed by splitting and nesting them for example. | [
"cpe:2.3:a:bluespire:aurelia_framework:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
GHSA-8rvq-97mp-58qq | All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the index to an array, leading to denial of service or potential escalation of privileges. | [] | null | null | 7.8 | null |
|
CVE-2006-4043 | index.php in myWebland myBloggie 2.1.4 and earlier allows remote attackers to obtain sensitive information via a query that only specifies the viewdate mode, which reveals the table prefix in a SQL error message. | [
"cpe:2.3:a:mywebland:mybloggie:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebland:mybloggie:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebland:mybloggie:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebland:mybloggie:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mywebland:mybloggie:2.1.3_beta:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2022-29822 | Feathers - Improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection | Due to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection | [
"cpe:2.3:a:feathersjs:feathers-sequelize:*:*:*:*:*:node.js:*:*"
] | null | 10 | null | null |
GHSA-4f58-95gf-jhxr | A denial of service vulnerability exists when Windows Registry improperly handles filesystem operations, aka 'Windows Registry Denial of Service Vulnerability'. | [] | null | null | null | null |
|
RHSA-2011:0310 | Red Hat Security Advisory: firefox security and bug fix update | javascript: URLs in chrome documents (MFSA 2011-08) Mozilla recursive eval call causes confirm dialog to evaluate to true (MFSA 2011-02) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) Mozilla Buffer overflow in JavaScript upvarMap (MFSA 2011-04) Mozilla use-after-free error in JSON.stringify (MFSA2011-03) Mozilla Buffer overflow in JavaScript atom map (MFSA 2011-05) Mozilla use-after-free error using Web Workers (MFSA 2011-06) Mozilla memory corruption during text run construction (MFSA 2011-07) Mozilla CSRF risk with plugins and 307 redirects (MFSA 2011-10) Mozilla crash caused by corrupted JPEG image (MFSA 2011-09) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) | [
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::server",
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
GHSA-hh27-ffr2-f2jc | Open redirect in url-parse | OverviewAffected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.ImpactDepending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior. | [] | null | 6.1 | null | null |
GHSA-m93x-j22f-53v7 | A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/operations/expense_category.php of the component HTTP POST Request Handler. The manipulation of the argument status leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255678 is the identifier assigned to this vulnerability. | [] | null | 4.7 | null | null |
|
GHSA-p86m-fr3f-pv77 | DomainMOD through 4.11.01 has XSS via the admin/domain-fields/ notes field in an Add Custom Field action for Custom Domain Fields. | [] | null | null | 5.4 | null |
|
CVE-2020-20298 | Eval injection vulnerability in the parserCommom method in the ParserTemplate class in zzz_template.php in zzzphp 1.7.2 allows remote attackers to execute arbitrary commands. | [
"cpe:2.3:a:zzzcms:zzzphp:1.7.2:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-h3hw-g4hm-7gr4 | SQL injection without credentials in ming-soft MCMS | An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do. | [] | null | 9.8 | null | null |
CVE-2023-30785 | WordPress Video Grid Plugin <= 1.21 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Video Grid plugin <= 1.21 versions. | [
"cpe:2.3:a:i13websolution:video_grid:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-j3vp-x446-7989 | There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user. | [] | null | null | null | null |
|
CVE-2024-0237 | EventON (Free < 2.2.9, Premium <= 4.5.8) - Unauthenticated Virtual Event Settings Update | The EventON WordPress plugin through 4.5.8, EventON WordPress plugin before 2.2.7 do not have authorisation in some AJAX actions, allowing unauthenticated users to update virtual events settings, such as meeting URL, moderator, access details etc | [
"cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*"
] | null | 5.3 | null | null |
GHSA-fv3p-4w3p-jq53 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Local Shipping Labels for WooCommerce allows Reflected XSS. This issue affects Local Shipping Labels for WooCommerce: from n/a through 1.0.0. | [] | null | 7.1 | null | null |
|
CVE-2017-14299 | STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x000000000000384b." | [
"cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*"
] | null | null | 7.8 | 4.6 |
|
GHSA-fv75-hjwp-hmcm | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | 4.9 | null | null |
|
GHSA-xx9m-mmw4-chgv | Multiple heap-based buffer overflows in 3Com 3CServer allow remote authenticated users to execute arbitrary code via long FTP commands, as demonstrated using the STAT command. | [] | null | null | null | null |
|
GHSA-mq9p-qw76-q6h7 | wasm3 v0.5.0 was discovered to contain a heap buffer overflow which leads to segmentation fault via the function "DeallocateSlot" in wasm3/source/m3_compile.c. | [] | null | 9.8 | null | null |
|
CVE-2001-1557 | Buffer overflow in ftpd in IBM AIX 4.3 and 5.1 allows attackers to gain privileges. | [
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-6624 | JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation | The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed. | [
"cpe:2.3:a:parorrey:json_api_user:*:*:*:*:*:*:*:*",
"cpe:2.3:a:parorrey:json_api_user:*:*:*:*:*:wordpress:*:*"
] | null | 9.8 | null | null |
CVE-2019-9074 | An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c. | [
"cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-95rx-r6wx-gg6q | Format string vulnerability in BACnOPCServer.exe in the SOAP web interface in SCADA Engine BACnet OPC Server before 2.1.371.24 allows remote attackers to execute arbitrary code via format string specifiers in a request. | [] | null | null | null | null |
|
GHSA-6rjq-282f-p3mr | Missing Authorization vulnerability in Surfer Surfer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Surfer: from n/a through 1.3.2.357. | [] | null | 7.6 | null | null |
|
CVE-2019-18856 | A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled. | [
"cpe:2.3:a:drupal:svg_sanitizer:*:*:*:*:*:drupal:*:*",
"cpe:2.3:a:drupal:svg_sanitizer:8.x-1.0:alpha1:*:*:*:drupal:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-j22q-32g5-7c29 | www.modified-shop.org modified eCommerce Shopsoftware 2.0.2.2 rev 10690 has XXE in api/it-recht-kanzlei/api-it-recht-kanzlei.php. | [] | null | 10 | null | null |
|
GHSA-rp82-xvg3-727c | Jenkins Google Login Plugin Session Fixation vulnerability | A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session. Google Login Plugin 1.3.1 invalidates the previous session during login, and creates a new one. | [] | null | null | 5.9 | null |
RHSA-2024:0554 | Red Hat Security Advisory: kpatch-patch security update | kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: out-of-bounds write in qfq_change_class function kernel: IGB driver inadequate buffer size for frames larger than MTU | [
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 7.5 | null | null |
CVE-2023-25034 | WordPress WP Clean Up Plugin <= 1.2.3 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in BoLiQuan WP Clean Up plugin <= 1.2.3 versions. | [
"cpe:2.3:a:wp_clean_up_project:wp_clean_up:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
CVE-2005-3929 | Directory traversal vulnerability in the create function in xarMLSXML2PHPBackend.php in Xaraya 1.0 allows remote attackers to create directories and overwrite arbitrary files via ".." sequences in the module parameter to index.php. | [
"cpe:2.3:a:xaraya:xaraya:1.0_rc1:*:*:*:*:*:*:*",
"cpe:2.3:a:xaraya:xaraya:1.0_rc2:*:*:*:*:*:*:*",
"cpe:2.3:a:xaraya:xaraya:1.0_rc3:*:*:*:*:*:*:*",
"cpe:2.3:a:xaraya:xaraya:1.0_rc4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2023-30742 | Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI) | SAP CRM (WebClient UI) - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 700, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in a stored Cross-Site Scripting (XSS) vulnerability.An attacker could store a malicious URL and lure the victim to click, causing the script supplied by the attacker to execute in the victim user's session. The information from the victim's session could then be modified or read by the attacker.
| [
"cpe:2.3:a:sap:customer_relationship_management_s4fnd:102:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_s4fnd:103:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_s4fnd:104:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_s4fnd:105:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_s4fnd:106:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_s4fnd:107:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
GHSA-8f48-fw8q-f35r | Unspecified vulnerability in the Oracle Business Intelligence Enterprise Edition component in Oracle Fusion Middleware 10.1.3.4.1 and 11.1.1.3 allows remote attackers to affect availability via unknown vectors related to Analytics Server. | [] | null | null | null | null |
|
CVE-2022-1992 | Path Traversal in gogs/gogs | Path Traversal in GitHub repository gogs/gogs prior to 0.12.9. | [
"cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 10 | null |
CVE-2015-3251 | Apache CloudStack before 4.5.2 might allow remote authenticated administrators to obtain sensitive password information for root accounts of virtual machines via unspecified vectors related to API calls. | [
"cpe:2.3:a:apache:cloudstack:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:cloudstack:4.5.1:*:*:*:*:*:*:*"
] | null | null | 4.9 | 4 |
|
CVE-2008-1089 | Unspecified vulnerability in Microsoft Visio 2002 SP2, 2003 SP2 and SP3, and 2007 up to SP1 allows user-assisted remote attackers to execute arbitrary code via a Visio file containing crafted object header data, aka "Visio Object Header Vulnerability." | [
"cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:2007_sp1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2003:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2003_sp3:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:visio:2007_sp1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-3368-gjw8-34fq | The Service Component Architecture (SCA) feature pack for IBM WebSphere Application Server (WAS) SCA 1.0 before 1.0.0.3 allows remote authenticated users to bypass intended authentication.transport access restrictions and obtain unspecified access via unknown vectors. | [] | null | null | null | null |
|
GHSA-76mf-5jv7-5mr2 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Table Builder plugin <= 1.4.6 versions. | [] | null | 5.9 | null | null |
|
CVE-2011-0939 | Unspecified vulnerability in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (device reload) via a crafted SIP message, aka Bug ID CSCth03022. | [
"cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2020-8320 | An internal shell was included in BIOS image in some ThinkPad models that could allow escalation of privilege. | [
"cpe:2.3:o:lenovo:thinkpad_11e_yoga_gen_6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_11e_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_11e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_4th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_4th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_11e_5th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_11e_5th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_13_2nd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13_2nd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a275_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a275:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a285_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a285:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a475_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_a485_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_a485:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e15_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e15:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_r14_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r14:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s3_gen_2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3_gen_2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e455_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e555_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e555:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e465_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e465:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e565_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e565:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e475_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e575_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e575:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e485_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e485:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e585_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e585:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e490s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e490s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_r490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_r590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_r590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l13_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l1415_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l1415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l380_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s3_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s3_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l380_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s2_yoga_3rd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_3rd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l390_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s2_yoga_4th_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s2_yoga_4th_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_l570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_l570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p43s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p43s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p50s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p50s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p51_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p51s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p52s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p53_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p53s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p53s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p70:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p71_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p72_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_p73_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_p73:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s5_2nd_gen_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5_2nd_gen:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_e560p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_e560p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t25:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t460s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t460s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t470_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t470p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t470s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t470s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t480_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t480s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t480s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t490_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t490s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t490s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t560_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t560:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t570_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t580_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t580:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t590_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t590:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_carbon_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_carbon:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_extreme_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_extreme:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x1_tablet_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x1_tablet:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x270_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x280_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x280:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x380_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x390_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x390_yoga_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x390_yoga:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_x395_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_x395:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_260_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_260:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_yoga_370_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_s1_3rd_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_s1_3rd:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t495_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t495:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkpad_t495s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkpad_t495s:-:*:*:*:*:*:*:*"
] | null | 6.4 | null | null |
|
GHSA-x5xq-hf4g-4cgq | The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94. | [] | null | null | null | null |
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))