Datasets:

Modalities:
Tabular
Text
Formats:
parquet
Libraries:
Datasets
pandas
Dataset Viewer
Auto-converted to Parquet
id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
139k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2024-28917
Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
Azure Arc-enabled Kubernetes Extension Cluster-Scope Elevation of Privilege Vulnerability
[ "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.azstackhci.operator:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.azure.hybridnetwork:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.azurekeyvaultsecretsprovider:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.iotoperations.mq:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.networkfabricserviceextension:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.openservicemesh:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:azure_arc_extension_microsoft.videoindexer:*:*:*:*:*:*:*:*" ]
null
6.2
null
null
ICSA-21-112-02
Mitsubishi Electric GOT (Update A)
A password authentication bypass vulnerability exists in the VNC function of the GOT2000 series and the GOT SIMPLE series due to improper authentication.CVE-2021-20590 has been assigned to this vulnerability. A CVSS v3 base score of 5.9 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
[]
null
null
5.9
null
CVE-2016-11022
NETGEAR Prosafe WC9500 5.1.0.17, WC7600 5.1.0.17, and WC7520 2.5.0.35 devices allow a remote attacker to execute code with root privileges via shell metacharacters in the reqMethod parameter to login_handler.php.
[ "cpe:2.3:o:netgear:prosafe_wc9500_firmware:5.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:prosafe_wc9500:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:prosafe_wc7600_firmware:5.1.0.17:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:prosafe_wc7600:-:*:*:*:*:*:*:*", "cpe:2.3:o:netgear:prosafe_wc7520_firmware:2.5.0.35:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:prosafe_wc7520:-:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2019-0549
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0536, CVE-2019-0554, CVE-2019-0569.
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
5.5
2.1
GHSA-g33j-hgrw-88mh
pt_chown in GNU C Library (aka glibc or libc6) before 2.18 does not properly check permissions for tty files, which allows local users to change the permission on the files and obtain access to arbitrary pseudo-terminals by leveraging a FUSE file system.
[]
null
null
null
null
GHSA-cvx3-834p-cj35
FineCMS 2.1.0 allows remote attackers to execute arbitrary PHP code by using a URL Manager "Add Site" action to enter this code after a ', sequence in a domain name, as demonstrated by the ',phpinfo() input value.
[]
null
null
9.8
null
CVE-2016-10580
nodewebkit is an installer for node-webkit. nodewebkit downloads zipped resources over HTTP, which leaves it vulnerable to MITM attacks. It may be possible to cause remote code execution (RCE) by swapping out the requested zip file with an attacker controlled zip file if the attacker is on the network or positioned in between the user and the remote server.
[ "cpe:2.3:a:nodewebkit_project:nodewebkit:*:*:*:*:*:node.js:*:*" ]
null
null
8.1
9.3
RHSA-2025:3837
Red Hat Security Advisory: openssh security update
openssh: Machine-in-the-middle attack if VerifyHostKeyDNS is enabled
[ "cpe:/a:redhat:rhel_eus:9.4::appstream", "cpe:/o:redhat:rhel_eus:9.4::baseos" ]
null
6.8
null
null
CVE-2023-52487
net/mlx5e: Fix peer flow lists handling
In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix peer flow lists handling The cited change refactored mlx5e_tc_del_fdb_peer_flow() to only clear DUP flag when list of peer flows has become empty. However, if any concurrent user holds a reference to a peer flow (for example, the neighbor update workqueue task is updating peer flow's parent encap entry concurrently), then the flow will not be removed from the peer list and, consecutively, DUP flag will remain set. Since mlx5e_tc_del_fdb_peers_flow() calls mlx5e_tc_del_fdb_peer_flow() for every possible peer index the algorithm will try to remove the flow from eswitch instances that it has never peered with causing either NULL pointer dereference when trying to remove the flow peer list head of peer_index that was never initialized or a warning if the list debug config is enabled[0]. Fix the issue by always removing the peer flow from the list even when not releasing the last reference to it. [0]: [ 3102.985806] ------------[ cut here ]------------ [ 3102.986223] list_del corruption, ffff888139110698->next is NULL [ 3102.986757] WARNING: CPU: 2 PID: 22109 at lib/list_debug.c:53 __list_del_entry_valid_or_report+0x4f/0xc0 [ 3102.987561] Modules linked in: act_ct nf_flow_table bonding act_tunnel_key act_mirred act_skbedit vxlan cls_matchall nfnetlink_cttimeout act_gact cls_flower sch_ingress mlx5_vdpa vringh vhost_iotlb vdpa openvswitch nsh xt_MASQUERADE nf_conntrack_netlink nfnetlink iptable_nat xt_addrtype xt_conntrack nf_nat br_netfilter rpcsec_gss_krb5 auth_rpcg ss oid_registry overlay rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm mlx5_ib ib_uverbs ib_core mlx5_core [last unloaded: bonding] [ 3102.991113] CPU: 2 PID: 22109 Comm: revalidator28 Not tainted 6.6.0-rc6+ #3 [ 3102.991695] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014 [ 3102.992605] RIP: 0010:__list_del_entry_valid_or_report+0x4f/0xc0 [ 3102.993122] Code: 39 c2 74 56 48 8b 32 48 39 fe 75 62 48 8b 51 08 48 39 f2 75 73 b8 01 00 00 00 c3 48 89 fe 48 c7 c7 48 fd 0a 82 e8 41 0b ad ff <0f> 0b 31 c0 c3 48 89 fe 48 c7 c7 70 fd 0a 82 e8 2d 0b ad ff 0f 0b [ 3102.994615] RSP: 0018:ffff8881383e7710 EFLAGS: 00010286 [ 3102.995078] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 0000000000000000 [ 3102.995670] RDX: 0000000000000001 RSI: ffff88885f89b640 RDI: ffff88885f89b640 [ 3102.997188] DEL flow 00000000be367878 on port 0 [ 3102.998594] RBP: dead000000000122 R08: 0000000000000000 R09: c0000000ffffdfff [ 3102.999604] R10: 0000000000000008 R11: ffff8881383e7598 R12: dead000000000100 [ 3103.000198] R13: 0000000000000002 R14: ffff888139110000 R15: ffff888101901240 [ 3103.000790] FS: 00007f424cde4700(0000) GS:ffff88885f880000(0000) knlGS:0000000000000000 [ 3103.001486] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 3103.001986] CR2: 00007fd42e8dcb70 CR3: 000000011e68a003 CR4: 0000000000370ea0 [ 3103.002596] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 3103.003190] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 3103.003787] Call Trace: [ 3103.004055] <TASK> [ 3103.004297] ? __warn+0x7d/0x130 [ 3103.004623] ? __list_del_entry_valid_or_report+0x4f/0xc0 [ 3103.005094] ? report_bug+0xf1/0x1c0 [ 3103.005439] ? console_unlock+0x4a/0xd0 [ 3103.005806] ? handle_bug+0x3f/0x70 [ 3103.006149] ? exc_invalid_op+0x13/0x60 [ 3103.006531] ? asm_exc_invalid_op+0x16/0x20 [ 3103.007430] ? __list_del_entry_valid_or_report+0x4f/0xc0 [ 3103.007910] mlx5e_tc_del_fdb_peers_flow+0xcf/0x240 [mlx5_core] [ 3103.008463] mlx5e_tc_del_flow+0x46/0x270 [mlx5_core] [ 3103.008944] mlx5e_flow_put+0x26/0x50 [mlx5_core] [ 3103.009401] mlx5e_delete_flower+0x25f/0x380 [mlx5_core] [ 3103.009901] tc_setup_cb_destroy+0xab/0x180 [ 3103.010292] fl_hw_destroy_filter+0x99/0xc0 [cls_flower] [ 3103.010779] __fl_delete+0x2d4/0x2f0 [cls_flower] [ 3103.0 ---truncated---
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:6.8:rc1:*:*:*:*:*:*" ]
null
5.5
null
null
CVE-2017-12298
A vulnerability in Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of an affected system. The vulnerability is due to insufficient input validation of some parameters that are passed to the web server of the affected system. An attacker could exploit this vulnerability by convincing a user to follow a malicious link or by intercepting a user request and injecting malicious code into the request. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected web interface or allow the attacker to access sensitive browser-based information. Cisco Bug IDs: CSCvf78615, CSCvf78628.
[ "cpe:2.3:a:cisco:webex_meeting_center:*:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
GHSA-8qm6-jxp9-c775
It was found that FreeIPA 4.2.0 and later could disclose password hashes to users having the 'System: Read Stage Users' permission. A remote, authenticated attacker could potentially use this flaw to disclose the password hashes belonging to Stage Users. This security issue does not result in disclosure of password hashes belonging to active standard users. NOTE: some developers feel that this report is a suggestion for a design change to Stage User activation, not a statement of a vulnerability.
[]
null
null
7.5
null
ICSA-23-199-01
Rockwell Automation Kinetix 5700 DC Bus Power Supply
The Kinetix 5700 DC Bus Power Supply Series A is vulnerable to CIP fuzzing. The new ENIP connections cannot be established if impacted by this vulnerability, which prohibits operational capabilities of the device resulting in a denial-of-service attack.
[]
null
null
7.5
null
GHSA-ggf5-r98h-6h5g
** DISPUTED ** Camunda Modeler (aka camunda-modeler) through 4.6.0 allows arbitrary file access. A remote attacker may send a crafted IPC message to the exposed vulnerable ipcRenderer IPC interface, which manipulates the readFile and writeFile APIs. NOTE: the vendor states "The way we secured the app is that it does not allow any remote scripts to be opened, no unsafe scripts to be evaluated, no remote sites to be browsed."
[]
null
9.1
null
null
CVE-2017-18110
The administration backup restore resource in Atlassian Crowd before version 3.0.2 and from version 3.1.0 before version 3.1.1 allows remote attackers to read files from the filesystem via a XXE vulnerability.
[ "cpe:2.3:a:atlassian:crowd:*:*:*:*:*:*:*:*", "cpe:2.3:a:atlassian:crowd:3.1.0:*:*:*:*:*:*:*" ]
null
null
6.5
4
CVE-2022-31971
ChatBot App with Suggestion v1.0 is vulnerable to SQL Injection via /simple_chat_bot/admin/?page=responses/view_response&id=.
[ "cpe:2.3:a:chatbot_app_with_suggestion_project:chatbot_app_with_suggestion:1.0:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
CVE-2019-15624
Improper Input Validation in Nextcloud Server 15.0.7 allows group admins to create users with IDs of system folders.
[ "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*", "cpe:2.3:o:suse:suse_linux_enterprise_server:12:-:*:*:*:*:*:*" ]
null
4.9
null
4
GHSA-m69p-8v8r-jhcc
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit the vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
[]
null
null
null
null
CVE-2013-2564
Mambo CMS 4.6.5 allows remote attackers to cause a denial of service (memory and bandwidth consumption) by uploading a crafted file.
[ "cpe:2.3:a:mambo-foundation:mambo_cms:4.6.5:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2004-1825
Cross-site scripting (XSS) vulnerability in index.php in Mambo Open Source 4.5 stable 1.0.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) return or (2) mos_change_template parameters.
[ "cpe:2.3:a:mambo:mambo_open_source:4.5_1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:mambo:mambo_open_source:4.5_1.0.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2007-0203
Multiple unspecified vulnerabilities in phpMyAdmin before 2.9.2-rc1 have unknown impact and attack vectors.
[ "cpe:2.3:a:phpmyadmin:phpmyadmin:*:*:*:*:*:*:*:*" ]
null
null
null
10
CVE-2009-1844
Multiple cross-site scripting (XSS) vulnerabilities in Drupal 5.x before 5.18 and 6.x before 6.12 allow (1) remote authenticated users to inject arbitrary web script or HTML via crafted UTF-8 byte sequences that are treated as UTF-7 by Internet Explorer 6 and 7, which are not properly handled in the "HTML exports of books" feature; and (2) allow remote authenticated users with administer taxonomy permissions to inject arbitrary web script or HTML via the help text of an arbitrary vocabulary. NOTE: vector 1 exists because of an incomplete fix for CVE-2009-1575.
[ "cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.2:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.3:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.4:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.5:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.6:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.7:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.8:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.9:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.10:*:*:*:*:*:*:*", "cpe:2.3:a:drupal:drupal:6.11:*:*:*:*:*:*:*" ]
null
null
null
3.5
GHSA-6882-cffw-fg5p
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
[]
null
8.8
null
null
CVE-2010-3262
Cross-site scripting (XSS) vulnerability in Flock Browser 3.x before 3.0.0.4114 allows remote attackers to inject arbitrary web script or HTML via a crafted RSS feed.
[ "cpe:2.3:a:flock:flock:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
CVE-2024-23717
In access_secure_service_from_temp_bond of btm_sec.cc, there is a possible way to achieve keystroke injection due to improper input validation. This could lead to remote (proximal/adjacent) escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
[ "cpe:2.3:o:google:android:*:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2018-6443
A vulnerability in Brocade Network Advisor Versions before 14.3.1 could allow an unauthenticated, remote attacker to log in to the JBoss Administration interface of an affected system using an undocumented user credentials and install additional JEE applications. A remote unauthenticated user who has access to Network Advisor client libraries and able to decrypt the Jboss credentials could gain access to the Jboss web console.
[ "cpe:2.3:a:brocade:network_advisor:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:brocade_network_advisor:-:*:*:*:*:*:*:*" ]
null
null
8.1
4.3
CVE-2020-16920
Windows Application Compatibility Client Library Elevation of Privilege Vulnerability
<p>An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.</p> <p>To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application.</p> <p>The security update addresses the vulnerability by ensuring the Windows Application Compatibility Client Library properly handles registry operations.</p>
[ "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*" ]
null
7.8
null
null
CVE-2022-47007
An issue was discovered function stab_demangle_v3_arg in stabs.c in Binutils 2.34 thru 2.38, allows attackers to cause a denial of service due to memory leaks.
[ "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*" ]
null
5.5
null
null
RHSA-2013:0589
Red Hat Security Advisory: git security update
git: Incorrect IMAP server's SSL x509.v3 certificate validation in git-imap-send command
[ "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-r5hp-gwxj-3824
In the Linux kernel, the following vulnerability has been resolved:bonding: stop the device in bond_setup_by_slave()Commit 9eed321cde22 ("net: lapbether: only support ethernet devices") has been able to keep syzbot away from net/lapb, until today.In the following splat [1], the issue is that a lapbether device has been created on a bonding device without members. Then adding a non ARPHRD_ETHER member forced the bonding master to change its type.The fix is to make sure we call dev_close() in bond_setup_by_slave() so that the potential linked lapbether devices (or any other devices having assumptions on the physical device) are removed.A similar bug has been addressed in commit 40baec225765 ("bonding: fix panic on non-ARPHRD_ETHER enslave failure")[1] skbuff: skb_under_panic: text:ffff800089508810 len:44 put:40 head:ffff0000c78e7c00 data:ffff0000c78e7bea tail:0x16 end:0x140 dev:bond0 kernel BUG at net/core/skbuff.c:192 ! Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP Modules linked in: CPU: 0 PID: 6007 Comm: syz-executor383 Not tainted 6.6.0-rc3-syzkaller-gbf6547d8715b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/04/2023 pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : skb_panic net/core/skbuff.c:188 [inline] pc : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202 lr : skb_panic net/core/skbuff.c:188 [inline] lr : skb_under_panic+0x13c/0x140 net/core/skbuff.c:202 sp : ffff800096a06aa0 x29: ffff800096a06ab0 x28: ffff800096a06ba0 x27: dfff800000000000 x26: ffff0000ce9b9b50 x25: 0000000000000016 x24: ffff0000c78e7bea x23: ffff0000c78e7c00 x22: 000000000000002c x21: 0000000000000140 x20: 0000000000000028 x19: ffff800089508810 x18: ffff800096a06100 x17: 0000000000000000 x16: ffff80008a629a3c x15: 0000000000000001 x14: 1fffe00036837a32 x13: 0000000000000000 x12: 0000000000000000 x11: 0000000000000201 x10: 0000000000000000 x9 : cb50b496c519aa00 x8 : cb50b496c519aa00 x7 : 0000000000000001 x6 : 0000000000000001 x5 : ffff800096a063b8 x4 : ffff80008e280f80 x3 : ffff8000805ad11c x2 : 0000000000000001 x1 : 0000000100000201 x0 : 0000000000000086 Call trace: skb_panic net/core/skbuff.c:188 [inline] skb_under_panic+0x13c/0x140 net/core/skbuff.c:202 skb_push+0xf0/0x108 net/core/skbuff.c:2446 ip6gre_header+0xbc/0x738 net/ipv6/ip6_gre.c:1384 dev_hard_header include/linux/netdevice.h:3136 [inline] lapbeth_data_transmit+0x1c4/0x298 drivers/net/wan/lapbether.c:257 lapb_data_transmit+0x8c/0xb0 net/lapb/lapb_iface.c:447 lapb_transmit_buffer+0x178/0x204 net/lapb/lapb_out.c:149 lapb_send_control+0x220/0x320 net/lapb/lapb_subr.c:251 __lapb_disconnect_request+0x9c/0x17c net/lapb/lapb_iface.c:326 lapb_device_event+0x288/0x4e0 net/lapb/lapb_iface.c:492 notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461 call_netdevice_notifiers_info net/core/dev.c:1970 [inline] call_netdevice_notifiers_extack net/core/dev.c:2008 [inline] call_netdevice_notifiers net/core/dev.c:2022 [inline] __dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508 dev_close_many+0x1e0/0x470 net/core/dev.c:1559 dev_close+0x174/0x250 net/core/dev.c:1585 lapbeth_device_event+0x2e4/0x958 drivers/net/wan/lapbether.c:466 notifier_call_chain+0x1a4/0x510 kernel/notifier.c:93 raw_notifier_call_chain+0x3c/0x50 kernel/notifier.c:461 call_netdevice_notifiers_info net/core/dev.c:1970 [inline] call_netdevice_notifiers_extack net/core/dev.c:2008 [inline] call_netdevice_notifiers net/core/dev.c:2022 [inline] __dev_close_many+0x1b8/0x3c4 net/core/dev.c:1508 dev_close_many+0x1e0/0x470 net/core/dev.c:1559 dev_close+0x174/0x250 net/core/dev.c:1585 bond_enslave+0x2298/0x30cc drivers/net/bonding/bond_main.c:2332 bond_do_ioctl+0x268/0xc64 drivers/net/bonding/bond_main.c:4539 dev_ifsioc+0x754/0x9ac dev_ioctl+0x4d8/0xd34 net/core/dev_ioctl.c:786 sock_do_ioctl+0x1d4/0x2d0 net/socket.c:1217 sock_ioctl+0x4e8/0x834 net/socket.c:1322 vfs_ioctl fs/ioctl.c:51 [inline] __do_ ---truncated---
[]
null
null
null
null
GHSA-3575-hp8p-f32c
The Rockwell Automation Enhanced HIM software containsan API that the application uses that is not protected sufficiently and uses incorrect Cross-Origin Resource Sharing (CORS) settings and, as a result, is vulnerable to a Cross Site Request Forgery (CSRF) attack. To exploit this vulnerability, a malicious user would have to convince a user to click on an untrusted link through a social engineering attack or successfully perform a Cross Site Scripting Attack (XSS). Exploitation of a CSRF could potentially lead to sensitive information disclosure and full remote access to the affected products.
[]
null
9.6
null
null
GHSA-q66r-jxjv-9p52
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the string literal parser. A successful attack can lead to sensitive data exposure.
[]
null
null
6.5
null
GHSA-5qwh-5j36-wh9w
Adobe Commerce versions 2.4.7-p2, 2.4.6-p7, 2.4.5-p9, 2.4.4-p10 and earlier are affected by an Improper Authentication vulnerability that could result in privilege escalation. An attacker could exploit this vulnerability to gain unauthorized access or elevated privileges within the application. Exploitation of this issue does not require user interaction.
[]
null
9.8
null
null
GHSA-xvjw-g673-q26h
The QuickType feature in the Keyboards subsystem in Apple iOS before 8.3 allows physically proximate attackers to discover passcodes by reading the lock screen during use of a Bluetooth keyboard.
[]
null
null
null
null
GHSA-g8wh-vch5-x6pw
The tutor_place_rating AJAX action from the Tutor LMS – eLearning and online course solution WordPress plugin before 1.7.7 was vulnerable to blind and time based SQL injections that could be exploited by students.
[]
null
null
null
null
CVE-2024-32866
Conform contains Prototype Pollution Vulnerability in `parseWith...` function
Conform, a type-safe form validation library, allows the parsing of nested objects in the form of `object.property`. Due to an improper implementation of this feature in versions prior to 1.1.1, an attacker can exploit the feature to trigger prototype pollution by passing a crafted input to `parseWith...` functions. Applications that use conform for server-side validation of form data or URL parameters are affected by this vulnerability. Version 1.1.1 contains a patch for the issue.
[ "cpe:2.3:a:edmundhung:conform:*:*:*:*:*:*:*:*" ]
null
8.6
null
null
CVE-2005-3012
The MasterDataCD::createImage function in masterdatacd.cpp for SimpleCDR-X 1.3.3 creates the .temp temporary directory with insecure permissions, which allows local users to read sensitive ISO images.
[ "cpe:2.3:a:simplecdr-x:simplecdr-x:1.3.3:*:*:*:*:*:*:*" ]
null
null
null
2.1
CVE-2004-1450
Unknown vulnerability in LiveConnect in Mozilla 1.7 beta allows remote attackers to read arbitrary files in known locations.
[ "cpe:2.3:a:mozilla:mozilla:1.7:beta:*:*:*:*:*:*" ]
null
null
null
5
CVE-2001-0387
Format string vulnerability in hfaxd in HylaFAX before 4.1.b2_2 allows local users to gain privileges via the -q command line argument.
[ "cpe:2.3:a:hylafax:hylafax:4.0_pl0:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.0_pl1:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.0_pl2:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.1_beta1:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.1_beta2:*:*:*:*:*:*:*", "cpe:2.3:a:hylafax:hylafax:4.1_beta3:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
[ "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*" ]
null
null
6.5
null
CVE-2024-11630
E-Lins H685/H685f/H700/H720/H750/H820/H820Q/H820Q0/H900 OEM Backend hard-coded credentials
A vulnerability has been found in E-Lins H685, H685f, H700, H720, H750, H820, H820Q, H820Q0 and H900 up to 3.2 and classified as critical. This vulnerability affects unknown code of the component OEM Backend. The manipulation leads to hard-coded credentials. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:e-lins:h685:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h685f:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h700:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h720:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h750:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h820:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h820q:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h820q0:*:*:*:*:*:*:*:*", "cpe:2.3:a:e-lins:h900:*:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
CVE-2009-0449
Buffer overflow in klim5.sys in Kaspersky Anti-Virus for Workstations 6.0 and Anti-Virus 2008 allows local users to gain privileges via an IOCTL 0x80052110 call.
[ "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:6.0:*:workstations:*:*:*:*:*", "cpe:2.3:a:kaspersky_lab:kaspersky_anti-virus:2008:*:*:*:*:*:*:*" ]
null
null
null
7.2
CVE-2019-0640
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0590, CVE-2019-0591, CVE-2019-0593, CVE-2019-0605, CVE-2019-0607, CVE-2019-0610, CVE-2019-0642, CVE-2019-0644, CVE-2019-0651, CVE-2019-0652, CVE-2019-0655.
[ "cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*" ]
null
null
7.5
7.6
GHSA-mq7f-7h9f-7344
Adobe Acrobat and Reader versions 2019.021.20061 and earlier, 2017.011.30156 and earlier, 2017.011.30156 and earlier, and 2015.006.30508 and earlier have a buffer error vulnerability. Successful exploitation could lead to arbitrary code execution .
[]
null
null
null
null
GHSA-pm9v-325f-5g74
Malicious Package in saync
All versions of `saync ` typosquatted a popular package of similar name and tracked users who had installed the incorrect package. The package uploaded information to a remote server including: name of the downloaded package, name of the intended package, the Node version and whether the process was running as sudo. There is no further compromise.RecommendationRemove the package from your dependencies and always ensure package names are typed correctly upon installation.
[]
null
9.8
null
null
CVE-2016-10527
The riot-compiler version version 2.3.21 has an issue in a regex (Catastrophic Backtracking) thats make it unusable under certain conditions.
[ "cpe:2.3:a:riot.js:riot-compiler:2.3.21:*:*:*:*:node.js:*:*" ]
null
null
7.5
5
CVE-2016-3038
IBM Cognos TM1 10.1 and 10.2 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 114614.
[ "cpe:2.3:a:ibm:cognos_business_intelligence:10.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_business_intelligence:10.2.2:*:*:*:*:*:*:*" ]
null
null
5.4
3.5
GHSA-3vq6-cwx3-x994
regex.c in GNU ed before 1.14.1 allows attackers to cause a denial of service (crash) via a malformed command, which triggers an invalid free.
[]
null
null
7.5
null
CVE-2005-0522
Chat Anywhere 2.72a stores sensitive information such as passwords in plaintext in the .INI file for a chatroom, which allows local users to gain privileges.
[ "cpe:2.3:a:lionmax_software:chat_anywhere:2.72a:*:*:*:*:*:*:*" ]
null
null
null
4.6
GHSA-7m68-gw28-j6h2
Cross-site scripting (XSS) vulnerability in pfSense before 2.2.3 allows remote attackers to inject arbitrary web script or HTML via the descr parameter in a "new" action to system_authservers.php.
[]
null
null
null
null
GHSA-xhmp-h8ff-8qf8
The Grocery List - Tomatoes (aka com.meucarrinho) application 5.1.4 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
null
null
null
null
RHSA-2011:0945
Red Hat Security Advisory: JBoss Enterprise Web Platform 5.1.1 update
JBoss Seam EL interpolation in exception handling
[ "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5", "cpe:/a:redhat:jboss_enterprise_web_platform:5::el6" ]
null
null
null
null
GHSA-45hx-52x3-7mvr
Cross-site scripting (XSS) vulnerability in testcgi.exe in Lilikoi Software Ceilidh 2.70 and earlier allows remote attackers to inject arbitrary web script or HTML via the query string.
[]
null
null
null
null
RHSA-2020:5439
Red Hat Security Advisory: samba security and bug fix update
samba: Netlogon elevation of privilege vulnerability (Zerologon) samba: Missing handle permissions check in SMB1/2/3 ChangeNotify samba: Unprivileged user can crash winbind
[ "cpe:/o:redhat:enterprise_linux:7::client", "cpe:/o:redhat:enterprise_linux:7::computenode", "cpe:/o:redhat:enterprise_linux:7::server", "cpe:/o:redhat:enterprise_linux:7::workstation" ]
null
5
null
null
CVE-2019-6012
SQL injection vulnerability in the wpDataTables Lite Version 2.0.11 and earlier allows remote authenticated attackers to execute arbitrary SQL commands via unspecified vectors.
[ "cpe:2.3:a:tms-outsource:wpdatatables_lite:*:*:*:*:*:*:*:*" ]
null
7.2
null
6.5
GHSA-4vg2-58j7-gmw7
In the Linux kernel, the following vulnerability has been resolved:inet: inet_defrag: prevent sk release while still in useip_local_out() and other functions can pass skb->sk as function argument.If the skb is a fragment and reassembly happens before such function call returns, the sk must not be released.This affects skb fragments reassembled via netfilter or similar modules, e.g. openvswitch or ct_act.c, when run as part of tx pipeline.Eric Dumazet made an initial analysis of this bug. Quoting Eric: Calling ip_defrag() in output path is also implying skb_orphan(), which is buggy because output path relies on sk not disappearing.A relevant old patch about the issue was : 8282f27449bf ("inet: frag: Always orphan skbs inside ip_defrag()")[..]net/ipv4/ip_output.c depends on skb->sk being set, and probably to an inet socket, not an arbitrary one.If we orphan the packet in ipvlan, then downstream things like FQ packet scheduler will not work properly.We need to change ip_defrag() to only use skb_orphan() when really needed, ie whenever frag_list is going to be used.Eric suggested to stash sk in fragment queue and made an initial patch. However there is a problem with this:If skb is refragmented again right after, ip_do_fragment() will copy head->sk to the new fragments, and sets up destructor to sock_wfree. IOW, we have no choice but to fix up sk_wmem accouting to reflect the fully reassembled skb, else wmem will underflow.This change moves the orphan down into the core, to last possible moment. As ip_defrag_offset is aliased with sk_buff->sk member, we must move the offset into the FRAG_CB, else skb->sk gets clobbered.This allows to delay the orphaning long enough to learn if the skb has to be queued or if the skb is completing the reasm queue.In the former case, things work as before, skb is orphaned. This is safe because skb gets queued/stolen and won't continue past reasm engine.In the latter case, we will steal the skb->sk reference, reattach it to the head skb, and fix up wmem accouting when inet_frag inflates truesize.
[]
null
null
null
null
CVE-2025-21858
geneve: Fix use-after-free in geneve_find_dev().
In the Linux kernel, the following vulnerability has been resolved: geneve: Fix use-after-free in geneve_find_dev(). syzkaller reported a use-after-free in geneve_find_dev() [0] without repro. geneve_configure() links struct geneve_dev.next to net_generic(net, geneve_net_id)->geneve_list. The net here could differ from dev_net(dev) if IFLA_NET_NS_PID, IFLA_NET_NS_FD, or IFLA_TARGET_NETNSID is set. When dev_net(dev) is dismantled, geneve_exit_batch_rtnl() finally calls unregister_netdevice_queue() for each dev in the netns, and later the dev is freed. However, its geneve_dev.next is still linked to the backend UDP socket netns. Then, use-after-free will occur when another geneve dev is created in the netns. Let's call geneve_dellink() instead in geneve_destroy_tunnels(). [0]: BUG: KASAN: slab-use-after-free in geneve_find_dev drivers/net/geneve.c:1295 [inline] BUG: KASAN: slab-use-after-free in geneve_configure+0x234/0x858 drivers/net/geneve.c:1343 Read of size 2 at addr ffff000054d6ee24 by task syz.1.4029/13441 CPU: 1 UID: 0 PID: 13441 Comm: syz.1.4029 Not tainted 6.13.0-g0ad9617c78ac #24 dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3d Hardware name: linux,dummy-virt (DT) Call trace: show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:466 (C) __dump_stack lib/dump_stack.c:94 [inline] dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:378 [inline] print_report+0x16c/0x6f0 mm/kasan/report.c:489 kasan_report+0xc0/0x120 mm/kasan/report.c:602 __asan_report_load2_noabort+0x20/0x30 mm/kasan/report_generic.c:379 geneve_find_dev drivers/net/geneve.c:1295 [inline] geneve_configure+0x234/0x858 drivers/net/geneve.c:1343 geneve_newlink+0xb8/0x128 drivers/net/geneve.c:1634 rtnl_newlink_create+0x23c/0x868 net/core/rtnetlink.c:3795 __rtnl_newlink net/core/rtnetlink.c:3906 [inline] rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938 netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline] netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1348 netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1892 sock_sendmsg_nosec net/socket.c:713 [inline] __sock_sendmsg net/socket.c:728 [inline] ____sys_sendmsg+0x410/0x6f8 net/socket.c:2568 ___sys_sendmsg+0x178/0x1d8 net/socket.c:2622 __sys_sendmsg net/socket.c:2654 [inline] __do_sys_sendmsg net/socket.c:2659 [inline] __se_sys_sendmsg net/socket.c:2657 [inline] __arm64_sys_sendmsg+0x12c/0x1c8 net/socket.c:2657 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline] invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49 el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132 do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151 el0_svc+0x4c/0xa8 arch/arm64/kernel/entry-common.c:744 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762 el0t_64_sync+0x198/0x1a0 arch/arm64/kernel/entry.S:600 Allocated by task 13247: kasan_save_stack mm/kasan/common.c:47 [inline] kasan_save_track+0x30/0x68 mm/kasan/common.c:68 kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568 poison_kmalloc_redzone mm/kasan/common.c:377 [inline] __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394 kasan_kmalloc include/linux/kasan.h:260 [inline] __do_kmalloc_node mm/slub.c:4298 [inline] __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4304 __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:645 alloc_netdev_mqs+0xb8/0x11a0 net/core/dev.c:11470 rtnl_create_link+0x2b8/0xb50 net/core/rtnetlink.c:3604 rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3780 __rtnl_newlink net/core/rtnetlink.c:3906 [inline] rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021 rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911 netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543 rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938 netlink_unicast_kernel net/netlink/af_n ---truncated---
[]
null
7.8
null
null
GHSA-w2mr-h878-6344
IBM Cognos Controller 11.0.0 and 11.0.1 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.
[]
null
5.9
null
null
CVE-2015-4831
Unspecified vulnerability in Oracle Sun Solaris 11.2 allows local users to affect availability via unknown vectors related to Solaris Kernel Zones, a different vulnerability than CVE-2015-4822.
[ "cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*" ]
null
null
null
4.9
CVE-2001-0897
Cross-site scripting vulnerability in Infopop Ultimate Bulletin Board (UBB) before 5.47e allows remote attackers to steal user cookies via an [IMG] tag that references an about: URL with an onerror field.
[ "cpe:2.3:a:infopop:ultimate_bulletin_board:-:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.03:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.04:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.05:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.10:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:2.11:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.5:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.6:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.7:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:3.75:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.03:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.04:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.05:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.06:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.07:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.50:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.51:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.52:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.53:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.75:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.80:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.81:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.82:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.83:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.84:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.85:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:4.86:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.00:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.01:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.02:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.05:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.06:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.08:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.09:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.10:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.11:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.12:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.13:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.14:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.15:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.16:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.17:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.18:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.19:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.20:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.25:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.26:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.27:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.28:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.29:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.30:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.31:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.32:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.33:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.34:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.35:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.36:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.37:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.38:d:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.39:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.40:*:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.41:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.42:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:d:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.44:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.45:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.46:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:-:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:a:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:b:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:c:*:*:*:*:*:*", "cpe:2.3:a:infopop:ultimate_bulletin_board:5.47:d:*:*:*:*:*:*" ]
null
null
null
5
GHSA-x2v8-652m-p279
An issue was discovered in Kabona AB WebDatorCentral (WDC) application prior to Version 3.4.0. WDC does not limit authentication attempts that may allow a brute force attack method.
[]
null
null
9.8
null
CVE-2019-10062
The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attribute of various other elements. An attacker might also exploit a bug in how the SCRIPT string is processed by splitting and nesting them for example.
[ "cpe:2.3:a:bluespire:aurelia_framework:*:*:*:*:*:*:*:*" ]
null
6.1
null
4.3
GHSA-8rvq-97mp-58qq
All versions of NVIDIA Windows GPU Display Driver contain a vulnerability in the kernel mode layer (nvlddmkm.sys) handler for DxgDdiEscape where a value passed from a user to the driver is used without validation as the index to an array, leading to denial of service or potential escalation of privileges.
[]
null
null
7.8
null
CVE-2006-4043
index.php in myWebland myBloggie 2.1.4 and earlier allows remote attackers to obtain sensitive information via a query that only specifies the viewdate mode, which reveals the table prefix in a SQL error message.
[ "cpe:2.3:a:mywebland:mybloggie:*:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:mybloggie:2.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:mybloggie:2.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:mybloggie:2.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mywebland:mybloggie:2.1.3_beta:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2022-29822
Feathers - Improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection
Due to improper parameter filtering in the Feathers js library, which may ultimately lead to SQL injection
[ "cpe:2.3:a:feathersjs:feathers-sequelize:*:*:*:*:*:node.js:*:*" ]
null
10
null
null
GHSA-4f58-95gf-jhxr
A denial of service vulnerability exists when Windows Registry improperly handles filesystem operations, aka 'Windows Registry Denial of Service Vulnerability'.
[]
null
null
null
null
RHSA-2011:0310
Red Hat Security Advisory: firefox security and bug fix update
javascript: URLs in chrome documents (MFSA 2011-08) Mozilla recursive eval call causes confirm dialog to evaluate to true (MFSA 2011-02) Mozilla miscellaneous memory safety hazards (MFSA 2011-01) Mozilla Buffer overflow in JavaScript upvarMap (MFSA 2011-04) Mozilla use-after-free error in JSON.stringify (MFSA2011-03) Mozilla Buffer overflow in JavaScript atom map (MFSA 2011-05) Mozilla use-after-free error using Web Workers (MFSA 2011-06) Mozilla memory corruption during text run construction (MFSA 2011-07) Mozilla CSRF risk with plugins and 307 redirects (MFSA 2011-10) Mozilla crash caused by corrupted JPEG image (MFSA 2011-09) Mozilla miscellaneous memory safety hazards (MFSA 2011-01)
[ "cpe:/o:redhat:enterprise_linux:4::as", "cpe:/o:redhat:enterprise_linux:4::desktop", "cpe:/o:redhat:enterprise_linux:4::es", "cpe:/o:redhat:enterprise_linux:4::ws", "cpe:/o:redhat:enterprise_linux:5::server", "cpe:/o:redhat:enterprise_linux:6::client", "cpe:/o:redhat:enterprise_linux:6::computenode", "cpe:/o:redhat:enterprise_linux:6::server", "cpe:/o:redhat:enterprise_linux:6::workstation" ]
null
null
null
null
GHSA-hh27-ffr2-f2jc
Open redirect in url-parse
OverviewAffected versions of npm `url-parse` are vulnerable to URL Redirection to Untrusted Site.ImpactDepending on library usage and attacker intent, impacts may include allow/block list bypasses, SSRF attacks, open redirects, or other undesired behavior.
[]
null
6.1
null
null
GHSA-m93x-j22f-53v7
A vulnerability was found in SourceCodester Online Tours & Travels Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/operations/expense_category.php of the component HTTP POST Request Handler. The manipulation of the argument status leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-255678 is the identifier assigned to this vulnerability.
[]
null
4.7
null
null
GHSA-p86m-fr3f-pv77
DomainMOD through 4.11.01 has XSS via the admin/domain-fields/ notes field in an Add Custom Field action for Custom Domain Fields.
[]
null
null
5.4
null
CVE-2020-20298
Eval injection vulnerability in the parserCommom method in the ParserTemplate class in zzz_template.php in zzzphp 1.7.2 allows remote attackers to execute arbitrary commands.
[ "cpe:2.3:a:zzzcms:zzzphp:1.7.2:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
GHSA-h3hw-g4hm-7gr4
SQL injection without credentials in ming-soft MCMS
An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do.
[]
null
9.8
null
null
CVE-2023-30785
WordPress Video Grid Plugin <= 1.21 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in I Thirteen Web Solution Video Grid plugin <= 1.21 versions.
[ "cpe:2.3:a:i13websolution:video_grid:*:*:*:*:*:wordpress:*:*" ]
null
7.1
null
null
GHSA-j3vp-x446-7989
There is a Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability in Huawei Smartphone. Successful exploitation of these vulnerabilities may escalate the permission to that of the root user.
[]
null
null
null
null
CVE-2024-0237
EventON (Free < 2.2.9, Premium <= 4.5.8) - Unauthenticated Virtual Event Settings Update
The EventON WordPress plugin through 4.5.8, EventON WordPress plugin before 2.2.7 do not have authorisation in some AJAX actions, allowing unauthenticated users to update virtual events settings, such as meeting URL, moderator, access details etc
[ "cpe:2.3:a:myeventon:eventon:*:*:*:*:*:wordpress:*:*" ]
null
5.3
null
null
GHSA-fv3p-4w3p-jq53
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Local Shipping Labels for WooCommerce allows Reflected XSS. This issue affects Local Shipping Labels for WooCommerce: from n/a through 1.0.0.
[]
null
7.1
null
null
CVE-2017-14299
STDU Viewer 1.6.375 allows attackers to execute arbitrary code or cause a denial of service via a crafted .jb2 file, related to "Data from Faulting Address controls subsequent Write Address starting at STDUJBIG2File!DllGetClassObject+0x000000000000384b."
[ "cpe:2.3:a:stdutility:stdu_viewer:1.6.375:*:*:*:*:*:*:*" ]
null
null
7.8
4.6
GHSA-fv75-hjwp-hmcm
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
[]
null
4.9
null
null
GHSA-xx9m-mmw4-chgv
Multiple heap-based buffer overflows in 3Com 3CServer allow remote authenticated users to execute arbitrary code via long FTP commands, as demonstrated using the STAT command.
[]
null
null
null
null
GHSA-mq9p-qw76-q6h7
wasm3 v0.5.0 was discovered to contain a heap buffer overflow which leads to segmentation fault via the function "DeallocateSlot" in wasm3/source/m3_compile.c.
[]
null
9.8
null
null
CVE-2001-1557
Buffer overflow in ftpd in IBM AIX 4.3 and 5.1 allows attackers to gain privileges.
[ "cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*", "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2024-6624
JSON API User <= 3.9.3 - Unauthenticated Privilege Escalation
The JSON API User plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.9.3. This is due to improper controls on custom user meta fields. This makes it possible for unauthenticated attackers to register as administrators on the site. The plugin requires the JSON API plugin to also be installed.
[ "cpe:2.3:a:parorrey:json_api_user:*:*:*:*:*:*:*:*", "cpe:2.3:a:parorrey:json_api_user:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
CVE-2019-9074
An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.32. It is an out-of-bounds read leading to a SEGV in bfd_getl32 in libbfd.c, when called from pex64_get_runtime_function in pei-x86_64.c.
[ "cpe:2.3:a:gnu:binutils:2.32:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*" ]
null
5.5
null
4.3
GHSA-95rx-r6wx-gg6q
Format string vulnerability in BACnOPCServer.exe in the SOAP web interface in SCADA Engine BACnet OPC Server before 2.1.371.24 allows remote attackers to execute arbitrary code via format string specifiers in a request.
[]
null
null
null
null
GHSA-6rjq-282f-p3mr
Missing Authorization vulnerability in Surfer Surfer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Surfer: from n/a through 1.3.2.357.
[]
null
7.6
null
null
CVE-2019-18856
A Denial Of Service vulnerability exists in the SVG Sanitizer module through 8.x-1.0-alpha1 for Drupal because access to external resources with an SVG use element is mishandled.
[ "cpe:2.3:a:drupal:svg_sanitizer:*:*:*:*:*:drupal:*:*", "cpe:2.3:a:drupal:svg_sanitizer:8.x-1.0:alpha1:*:*:*:drupal:*:*" ]
null
7.5
null
5
GHSA-j22q-32g5-7c29
www.modified-shop.org modified eCommerce Shopsoftware 2.0.2.2 rev 10690 has XXE in api/it-recht-kanzlei/api-it-recht-kanzlei.php.
[]
null
10
null
null
GHSA-rp82-xvg3-727c
Jenkins Google Login Plugin Session Fixation vulnerability
A session fixaction vulnerability exists in Jenkins Google Login Plugin 1.3 and older in GoogleOAuth2SecurityRealm.java that allows unauthorized attackers to impersonate another user if they can control the pre-authentication session. Google Login Plugin 1.3.1 invalidates the previous session during login, and creates a new one.
[]
null
null
5.9
null
RHSA-2024:0554
Red Hat Security Advisory: kpatch-patch security update
kernel: bpf: Incorrect verifier pruning leads to unsafe code paths being incorrectly marked as safe kernel: net/sched: sch_qfq component can be exploited if in qfq_change_agg function happens qfq_enqueue overhead kernel: tun: bugs for oversize packet when napi frags enabled in tun_napi_alloc_frags kernel: use after free in unix_stream_sendpage kernel: net/sched: sch_hfsc UAF kernel: use after free in nvmet_tcp_free_crypto in NVMe kernel: out-of-bounds write in qfq_change_class function kernel: IGB driver inadequate buffer size for frames larger than MTU
[ "cpe:/o:redhat:rhel_eus:8.8::baseos" ]
null
7.5
null
null
CVE-2023-25034
WordPress WP Clean Up Plugin <= 1.2.3 is vulnerable to Cross Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) vulnerability in BoLiQuan WP Clean Up plugin <= 1.2.3 versions.
[ "cpe:2.3:a:wp_clean_up_project:wp_clean_up:*:*:*:*:*:wordpress:*:*" ]
null
4.3
null
null
CVE-2005-3929
Directory traversal vulnerability in the create function in xarMLSXML2PHPBackend.php in Xaraya 1.0 allows remote attackers to create directories and overwrite arbitrary files via ".." sequences in the module parameter to index.php.
[ "cpe:2.3:a:xaraya:xaraya:1.0_rc1:*:*:*:*:*:*:*", "cpe:2.3:a:xaraya:xaraya:1.0_rc2:*:*:*:*:*:*:*", "cpe:2.3:a:xaraya:xaraya:1.0_rc3:*:*:*:*:*:*:*", "cpe:2.3:a:xaraya:xaraya:1.0_rc4:*:*:*:*:*:*:*" ]
null
null
null
5
CVE-2023-30742
Cross-Site Scripting (XSS) vulnerability in SAP CRM (WebClient UI)
SAP CRM (WebClient UI) - versions S4FND 102, S4FND 103, S4FND 104, S4FND 105, S4FND 106, S4FND 107, WEBCUIF 700, WEBCUIF 701, WEBCUIF 731, WEBCUIF 746, WEBCUIF 747, WEBCUIF 748, WEBCUIF 800, WEBCUIF 801, does not sufficiently encode user-controlled inputs, resulting in a stored Cross-Site Scripting (XSS) vulnerability.An attacker could store a malicious URL and lure the victim to click, causing the script supplied by the attacker to execute in the victim user's session. The information from the victim's session could then be modified or read by the attacker.
[ "cpe:2.3:a:sap:customer_relationship_management_s4fnd:102:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_s4fnd:103:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_s4fnd:104:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_s4fnd:105:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_s4fnd:106:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_s4fnd:107:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:700:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:701:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:731:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:746:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:747:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:748:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:800:*:*:*:*:*:*:*", "cpe:2.3:a:sap:customer_relationship_management_webclient_ui:801:*:*:*:*:*:*:*" ]
null
6.1
null
null
GHSA-8f48-fw8q-f35r
Unspecified vulnerability in the Oracle Business Intelligence Enterprise Edition component in Oracle Fusion Middleware 10.1.3.4.1 and 11.1.1.3 allows remote attackers to affect availability via unknown vectors related to Analytics Server.
[]
null
null
null
null
CVE-2022-1992
Path Traversal in gogs/gogs
Path Traversal in GitHub repository gogs/gogs prior to 0.12.9.
[ "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
10
null
CVE-2015-3251
Apache CloudStack before 4.5.2 might allow remote authenticated administrators to obtain sensitive password information for root accounts of virtual machines via unspecified vectors related to API calls.
[ "cpe:2.3:a:apache:cloudstack:4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:cloudstack:4.5.1:*:*:*:*:*:*:*" ]
null
null
4.9
4
CVE-2008-1089
Unspecified vulnerability in Microsoft Visio 2002 SP2, 2003 SP2 and SP3, and 2007 up to SP1 allows user-assisted remote attackers to execute arbitrary code via a Visio file containing crafted object header data, aka "Visio Object Header Vulnerability."
[ "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2007_sp1:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2003:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2003_sp3:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2007:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:visio:2007_sp1:*:*:*:*:*:*:*" ]
null
null
null
9.3
GHSA-3368-gjw8-34fq
The Service Component Architecture (SCA) feature pack for IBM WebSphere Application Server (WAS) SCA 1.0 before 1.0.0.3 allows remote authenticated users to bypass intended authentication.transport access restrictions and obtain unspecified access via unknown vectors.
[]
null
null
null
null
GHSA-76mf-5jv7-5mr2
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WP Table Builder plugin <= 1.4.6 versions.
[]
null
5.9
null
null
CVE-2011-0939
Unspecified vulnerability in Cisco IOS 12.4, 15.0, and 15.1, and IOS XE 2.5.x through 3.2.x, allows remote attackers to cause a denial of service (device reload) via a crafted SIP message, aka Bug ID CSCth03022.
[ "cpe:2.3:o:cisco:ios:12.4:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:2.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1.2s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1.3s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.1.4s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.0s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.1s:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:ios_xe:3.2.2s:*:*:*:*:*:*:*" ]
null
null
null
7.8
CVE-2020-8320
An internal shell was included in BIOS image in some ThinkPad models that could allow escalation of privilege.
[ "cpe:2.3:o:lenovo:thinkpad_11e_yoga_gen_6_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_11e_yoga_gen_6:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_11e_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_11e:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_yoga_11e_3rd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_11e_3rd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_yoga_11e_4th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_11e_4th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_yoga_11e_5th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_11e_5th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_13_2nd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_13_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_13:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_a275_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a275:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_a285_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a285:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_a475_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a475:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_a485_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_a485:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e14:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e15:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_r14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_r14:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s3_gen_2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s3_gen_2:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e455_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e455:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e555_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e555:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e460:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e560:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e465_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e465:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e565_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e565:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e470:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e570:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e475_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e475:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e575_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e575:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e480:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e580:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e485_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e485:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e585_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e585:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e490s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e490s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s3:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e490:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e590:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_r490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_r490:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_r590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_r590:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l13:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l1415_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l1415:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l380_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l380:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s3_3rd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s3_3rd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l380_yoga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l380_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s2_yoga_3rd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_yoga_3rd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l390_yoga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l390_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s2_yoga_4th_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s2_yoga_4th_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l460:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l470:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l480:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l580:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l490:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l590:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l560:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_l570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_l570:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p43s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p43s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p50_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p50:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p50s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p50s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p51_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p51:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p51s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p51s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p52_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p52:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p52s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p52s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p53_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p53:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p53s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p53s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p70_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p70:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p71_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p71:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p72_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p72:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_p73_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_p73:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s5_2nd_gen_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s5_2nd_gen:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s5_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s5:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_e560p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_e560p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t25_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t25:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t460_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t460:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t460p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t460p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t460s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t460s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t470_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t470:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t470p_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t470p:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t470s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t470s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t480_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t480:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t480s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t480s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t490_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t490:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t490s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t490s:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t560_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t560:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t570_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t570:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t580_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t580:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t590_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t590:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_carbon_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_carbon:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_yoga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_extreme_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_extreme:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x1_tablet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x1_tablet:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x260:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x270_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x270:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x280_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x280:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x380_yoga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x380_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x390_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x390:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x390_yoga_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x390_yoga:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_x395_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_x395:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_yoga_260_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_260:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s1:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_yoga_370_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_yoga_370:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_s1_3rd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_s1_3rd:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t495_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t495:-:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:thinkpad_t495s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:lenovo:thinkpad_t495s:-:*:*:*:*:*:*:*" ]
null
6.4
null
null
GHSA-x5xq-hf4g-4cgq
The 'Copy Image Link' context menu action would copy the final image URL after redirects. By embedding an image that triggered authentication flows - in conjunction with a Content Security Policy that stopped a redirection chain in the middle - the final image URL could be one that contained an authentication token used to takeover a user account. If a website tricked a user into copy and pasting the image link back to the page, the page would be able to steal the authentication tokens. This was fixed by making the action return the original URL, before any redirects. This vulnerability affects Firefox < 94.
[]
null
null
null
null
End of preview. Expand in Data Studio

Sources of the data

  • CVE Program (enriched with data from vulnrichment and Fraunhofer FKIE)
  • GitHub Security Advisories
  • PySec advisories
  • CSAF Red Hat
  • CSAF Cisco
  • CSAF CISA

Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.

Query with datasets

import json
from datasets import load_dataset

dataset = load_dataset("CIRCL/vulnerability-scores")

vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]

filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)

for entry in filtered_entries["train"]:
    print(json.dumps(entry, indent=4))
Downloads last month
239

Models trained or fine-tuned on CIRCL/vulnerability-scores