id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-pm2f-9x7m-gcvg
|
Insufficient input validation in Kernel Mode Driver in Intel(R) Graphics Driver for Windows* before versions 10.18.x.5059 (aka 15.33.x.5059), 10.18.x.5057 (aka 15.36.x.5057), 20.19.x.5063 (aka 15.40.x.5063) 21.20.x.5064 (aka 15.45.x.5064) and 24.20.100.6373 potentially enables an unprivileged user to read memory via local access via local access.
|
[] | null | null | 5.5 | null | null |
|
GHSA-7m6v-v5x3-rc3h
|
Due to insufficient file type validation, SAP BusinessObjects Business Intelligence Platform (Web Intelligence HTML interface) - version 420, allows a report creator to upload files from local system into the report over the network. When uploading the image file, an authenticated attacker could intercept the request, modify the content type and the extension to read and modify sensitive data causing a high impact on confidentiality and integrity of the application.
|
[] | null | 7.3 | null | null | null |
|
CVE-2003-0944
|
Buffer overflow in the WAECHO default service in web-tools in SAP DB before 7.4.03.30 allows remote attackers to execute arbitrary code via a URL with a long requestURI.
|
[
"cpe:2.3:a:sap:sap_db:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-8gfg-pqqx-3q76
|
SQL injection vulnerability in action.php in Leed (Light Feed), possibly before 1.5 Stable, allows remote attackers to execute arbitrary SQL commands via the id parameter in a removeFolder action.
|
[] | null | null | null | null | null |
|
CVE-2013-3902
|
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2008 R2 SP1 and Windows 7 SP1 on 64-bit platforms allows local users to gain privileges via a crafted application, aka "Win32k Use After Free Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
RHSA-2024:5894
|
Red Hat Security Advisory: bind security update
|
bind: bind9: BIND's database will be slow if a very large number of RRs exist at the same nam bind9: bind: SIG(0) can be used to exhaust CPU resources
|
[
"cpe:/o:redhat:rhel_aus:7.7::server"
] | null | 7.5 | null | null | null |
GHSA-6j8f-88mh-r9vq
|
SQL injection in funadmin
|
Funadmin v5.0.2 has an arbitrary file read vulnerability in `/curd/index/editfile`.
|
[] | 7.7 | 7.5 | null | null | null |
GHSA-4cr4-x82x-hwm9
|
thorsten/phpmyfaq vulnerable to authentication bypass
|
thorsten/phpmyfaq prior to 3.1.12 is vulnerable to authentication bypass by capture-relay that allows unlimited comments to be sent. This has been fixed in 3.1.12.
|
[] | null | 7.3 | null | null | null |
RHSA-2020:0123
|
Red Hat Security Advisory: thunderbird security update
|
Mozilla: Bypass of @namespace CSS sanitization during pasting Mozilla: Type Confusion in XPCVariant.cpp Mozilla: CSS sanitization does not escape HTML tags Mozilla: Memory safety bugs fixed in Firefox 72 and Firefox ESR 68.4 Mozilla: IonMonkey type confusion with StoreElementHole and FallibleStoreElement
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | 8.8 | 8.8 | null | null |
CVE-2025-5156
|
H3C GR-5400AX aspForm EditWlanMacList buffer overflow
|
A vulnerability was found in H3C GR-5400AX up to 100R008 and classified as critical. Affected by this issue is the function EditWlanMacList of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 8.7 | 8.8 | 8.8 | 9 | null |
RHSA-2012:1174
|
Red Hat Security Advisory: kernel security and bug fix update
|
kernel: unfiltered netdev rio_ioctl access by users
|
[
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.