
CIRCL/vulnerability-severity-classification-distilbert-base-uncased
Text Classification
•
0.1B
•
Updated
•
343
•
2
id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2010-4496 | Multiple SQL injection vulnerabilities in Collaborative Information Manager server, as used in TIBCO Collaborative Information Manager before 8.1.0 and ActiveCatalog before 1.0.1, allow remote attackers to execute arbitrary SQL commands via unspecified vectors. | [
"cpe:2.3:a:tibco:activecatalog:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tibco:collaborative_information_manager:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-5hrc-f88x-6wm7 | The DoLogin Security WordPress plugin before 3.7 uses headers such as the X-Forwarded-For to retrieve the IP address of the request, which could lead to IP spoofing. | []
| null | 5.3 | null | null |
|
CVE-2005-2057 | Multiple cross-site scripting (XSS) vulnerabilities in Infopop UBB.Threads before 6.5.2 Beta allow remote attackers to inject arbitrary web script or HTML via the (1) Searchpage parameter to dosearch.php, (2) Number, (3) what, or (4) page parameter to newreply.php, (5) Number, (6) Board, or (7) what parameter to showprofile.php, (8) fpart or (9) page parameter to showflat.php, or (10) like parameter to showmembers.php. | [
"cpe:2.3:a:ubbcentral:ubb.threads:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ubbcentral:ubb.threads:6.5.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2024-37795 | A segmentation fault in CVC5 Solver v1.1.3 allows attackers to cause a Denial of Service (DoS) via a crafted SMT-LIB input file containing the `set-logic` command with specific formatting errors. | [
"cpe:2.3:a:cvc5:cvc5:1.1.3:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2020-17519 | Apache Flink directory traversal attack: reading remote files through the REST API | A change introduced in Apache Flink 1.11.0 (and released in 1.11.1 and 1.11.2 as well) allows attackers to read any file on the local filesystem of the JobManager through the REST interface of the JobManager process. Access is restricted to files accessible by the JobManager process. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink instance(s) are exposed. The issue was fixed in commit b561010b0ee741543c3953306037f00d7a9f0801 from apache/flink:master. | [
"cpe:2.3:a:apache:flink:1.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:apache:flink:*:*:*:*:*:*:*:*"
]
| null | 9.1 | null | 5 |
CVE-2002-0904 | SayText function in Kismet 2.2.1 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters (backtick or pipe) in the essid argument. | [
"cpe:2.3:a:kismet:kismet:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:kismet:kismet:2.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-95p9-9fgr-299p | Unspecified vulnerability in Oracle Application Server 9.0.4.3 and Collaboration Suite 9.0.4.2 has unknown impact and attack vectors related to Oracle Containers for J2EE, aka OC4J02. | []
| null | null | null | null |
|
CVE-2010-1996 | Multiple cross-site scripting (XSS) vulnerabilities in index.php in TomatoCMS before 2.0.5 allow remote authenticated users, with certain creation privileges, to inject arbitrary web script or HTML via the (1) content parameter in conjunction with a /admin/poll/add PATH_INFO, the (2) meta parameter in conjunction with a /admin/category/add PATH_INFO, and the (3) keyword parameter in conjunction with a /admin/tag/add PATH_INFO. | [
"cpe:2.3:a:tomatocms:tomatocms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:tomatocms:tomatocms:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:tomatocms:tomatocms:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:tomatocms:tomatocms:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:tomatocms:tomatocms:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:tomatocms:tomatocms:2.0.3.1430:*:*:*:*:*:*:*",
"cpe:2.3:a:tomatocms:tomatocms:2.0.3.1622:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
CVE-2017-18793 | NETGEAR R7800 devices before 1.0.2.36 are affected by command injection. | [
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*"
]
| null | null | 6.7 | null |
|
GHSA-6f2p-7488-r6j4 | Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. | []
| null | 5.4 | null | null |
|
CVE-2012-1527 | Integer underflow in Windows Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, Windows 8, and Windows Server 2012 allows local users to gain privileges via a crafted briefcase, aka "Windows Briefcase Integer Underflow Vulnerability." | [
"cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8:-:-:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2019-1827 | Cisco Small Business RV320 and RV325 Routers Online Help Reflected Cross-Site Scripting Vulnerability | A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22. | [
"cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*"
]
| null | null | 6.1 | null |
CVE-2023-47791 | WordPress Leadster Plugin <= 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in Leadster plugin <= 1.1.2 versions. | [
"cpe:2.3:a:leadster:leadster:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
CVE-2023-2281 | Archiving a team broadcasts unsanitized data over WebSockets | When archiving a team, Mattermost fails to sanitize the related Websocket event sent to currently connected clients. This allows the clients to see the name, display name, description, and other data about the archived team.
| [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
]
| null | 3.1 | null | null |
GHSA-8cgc-2rhf-p8q9 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 8.2.1.6871. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the print function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code under the context of the current process. Was ZDI-CAN-4722. | []
| null | null | 8.8 | null |
|
CVE-2007-2230 | SQL injection vulnerability in CA Clever Path Portal allows remote authenticated users to execute limited SQL commands and retrieve arbitrary database contents via (1) the ofinterest parameter in a light search query, (2) description parameter in the advanced search query, and possibly other vectors. | [
"cpe:2.3:a:broadcom:cleverpath_portal:*:*:*:*:*:*:*:*"
]
| null | null | null | 6.5 |
|
GHSA-p22v-rx27-49wx | Improper permissions in some Intel(R) High Definition Audio drivers before version 9.21.00.4561 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | null | null | null |
|
CVE-2022-33689 | Improper access control vulnerability in TelephonyUI prior to SMR Jul-2022 Release 1 allows attackers to change preferred network type by unprotected binder call. | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*"
]
| null | 6.2 | null | null |
|
GHSA-w97h-p5ff-7q69 | In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault in other cases resulting in denial of service. | []
| null | null | 9.1 | null |
|
GHSA-47hv-5382-6p3v | Cross-site scripting (XSS) vulnerability in HP OpenView Performance Insight 5.3, 5.31, 5.4, 5.41, 5.41.001, and 5.41.002 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | []
| null | null | null | null |
|
GHSA-876p-8259-xjgg | libp2p nodes vulnerable to attack using large RSA keys | ImpactA malicious peer can use large RSA keys to run a resource exhaustion attack & force a node to spend time doing signature verification of the large key. This vulnerability is present in the core/crypto module of go-libp2p and can occur during the Noise handshake and the libp2p x509 extension verification step.
To prevent this attack, go-libp2p now restricts RSA keys to <= 8192 bits.PatchesUsers should upgrade their go-libp2p versions to >=v0.27.8, >= v0.28.2, or >=v0.29.1
To protect your application, it's necessary to update to these patch releases **AND** to use the updated Go compiler (1.20.7 or 1.19.12, respectively)WorkaroundsThere are no known workaroundsReferencesThe Golang crypto/tls package also had this vulnerability ("verifying certificate chains containing large RSA keys is slow” https://github.com/golang/go/issues/61460)
Fix in golang/go crypto/tls: https://github.com/golang/go/commit/2350afd2e8ab054390e284c95d5b089c142db017
Fix in quic-go https://github.com/quic-go/quic-go/pull/4012 | []
| null | 7.5 | null | null |
GHSA-ppr2-p8gw-9gw3 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in totalsoft WooCommerce Pricing – Product Pricing allows Stored XSS. This issue affects WooCommerce Pricing – Product Pricing: from n/a through 1.0.9. | []
| null | 7.1 | null | null |
|
GHSA-h86m-jj8c-794w | An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in FortiManager 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiManager Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; FortiAnalyzer 7.6.0 through 7.6.1, 7.4.0 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions; and FortiAnalyzer Cloud 7.4.1 through 7.4.6, 7.2 all versions, 7.0 all versions, 6.4 all versions may allow an authenticated attacker with high privilege to extract database information via crafted requests. | []
| null | 2.7 | null | null |
|
GHSA-9qfw-q6c7-9cmx | D-Link N300 WI-FI Router DIR-605L v2.13B01 was discovered to contain a stack overflow via the wan_connected parameter at /goform/formEasySetupWizard3. | []
| null | 8.8 | null | null |
|
RHSA-2025:7462 | Red Hat Security Advisory: podman security update | golang.org/x/crypto/ssh: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh go-jose: Go JOSE's Parsing Vulnerable to Denial of Service | [
"cpe:/o:redhat:enterprise_linux:10.0"
]
| null | 7.5 | null | null |
CVE-2018-9191 | A local privilege escalation in Fortinet FortiClient for Windows 6.0.4 and earlier allows attackers to execute unauthorized code or commands via the named pipe responsible for Forticlient updates. | [
"cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*"
]
| null | null | 7.8 | 4.6 |
|
GHSA-m4h7-86xm-549j | The Uncanny Automator plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on multiple AJAX functions in versions up to, and including, 6.4.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions or above to update plugin settings. | []
| null | 5.4 | null | null |
|
CVE-2023-29737 | An issue found in Wave Animated Keyboard Emoji v.1.70.7 for Android allows a local attacker to cause a denial of service via the database files. | [
"cpe:2.3:a:wavekeyboard:wave_animated_keyboard_emoji:1.70.7:*:*:*:*:android:*:*"
]
| null | 5.5 | null | null |
|
CVE-2003-0291 | 3com OfficeConnect Remote 812 ADSL Router 1.1.7 does not properly clear memory from DHCP responses, which allows remote attackers to identify the contents of previous HTTP requests by sniffing DHCP packets. | [
"cpe:2.3:h:3com:3cp4144:1.1.7:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2023-28509 | Weak encryption in UniRPC protocol | Rocket Software UniData versions prior to 8.2.4 build 3003 and UniVerse versions prior to 11.3.5 build 1001 or 12.2.1 build 2002 use weak encryption for packet-level security and passwords transferred on the wire. | [
"cpe:2.3:a:rocketsoftware:unidata:*:*:*:*:*:*:*:*",
"cpe:2.3:a:rocketsoftware:universe:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
GHSA-8r9q-hj74-v3rc | services/soundtrigger/SoundTriggerHwService.cpp in mediaserver in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 30148546. | []
| null | null | 7.8 | null |
|
PYSEC-2021-828 | null | TensorFlow is an open source platform for machine learning. In affected versions the shape inference code for the `Cudnn*` operations in TensorFlow can be tricked into accessing invalid memory, via a heap buffer overflow. This occurs because the ranks of the `input`, `input_h` and `input_c` parameters are not validated, but code assumes they have certain values. The fix will be included in TensorFlow 2.7.0. We will also cherrypick this commit on TensorFlow 2.6.1, TensorFlow 2.5.2, and TensorFlow 2.4.4, as these are also affected and still in supported range. | []
| null | null | null | null |
GHSA-jjhx-cwg5-7w4q | Zoo Management System v1.0 was discovered to contain an arbitrary file upload vulnerability via /public_html/apply_vacancy. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | []
| null | 9.8 | null | null |
|
GHSA-287x-c836-c4c9 | The default Flash cross-domain policy (crossdomain.xml) in Ubiquiti Networks UniFi Video (formerly AirVision aka AirVision Controller) before 3.0.1 does not restrict access to the application, which allows remote attackers to bypass the Same Origin Policy via a crafted SWF file. | []
| null | null | null | null |
|
CVE-2021-22920 | A vulnerability has been discovered in Citrix ADC (formerly known as NetScaler ADC) and Citrix Gateway (formerly known as NetScaler Gateway), and Citrix SD-WAN WANOP Edition models 4000-WO, 4100-WO, 5000-WO, and 5100-WO. These vulnerabilities, if exploited, could lead to a phishing attack through a SAML authentication hijack to steal a valid user session. | [
"cpe:2.3:a:citrix:application_delivery_management:12.1-62.25:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:application_delivery_management:13.0-82.42:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:gateway:12.1-62.25:*:*:*:*:*:*:*",
"cpe:2.3:a:citrix:gateway:13.0-82.42:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4.3 |
|
GHSA-h7pp-jw89-9v36 | DHCP Server Service Denial of Service Vulnerability | []
| null | 6.5 | null | null |
|
CVE-2005-3123 | Directory traversal vulnerability in GNUMP3D before 2.9.6 allows remote attackers to read arbitrary files via crafted sequences such as "/.//..//////././", which is collapsed into "/.././" after ".." and "//" sequences are removed. | [
"cpe:2.3:a:gnu:gnump3d:2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:gnump3d:2.9.5:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-qh9x-gcfh-pcrw | OpenZeppelin Contracts's ERC165Checker may revert instead of returning false | Impact`ERC165Checker.supportsInterface` is designed to always successfully return a boolean, and under no circumstance revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-165 as expected, specifically if it returns a value other than 0 or 1.The contracts that may be affected are those that use `ERC165Checker` to check for support for an interface and then handle the lack of support in a way other than reverting.PatchesThe issue was patched in 4.7.1.Referenceshttps://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552For more informationIf you have any questions or comments about this advisory, or need assistance deploying the fix, email us at [[email protected]](mailto:[email protected]). | []
| null | 7.5 | null | null |
GHSA-vrj4-6h4v-jh5g | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | []
| null | 5.4 | null | null |
|
CVE-2015-4758 | Unspecified vulnerability in the Oracle Data Integrator component in Oracle Fusion Middleware 11.1.1.3.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Data Quality based on Trillium, a different vulnerability than CVE-2015-0443, CVE-2015-0444, CVE-2015-0445, CVE-2015-0446, CVE-2015-2634, CVE-2015-2635, CVE-2015-2636, and CVE-2015-4759. | [
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.3.0:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-vrm6-xcmv-x82r | A flaw was found in ImageMagick in versions before 7.0.11. A potential cipher leak when the calculate signatures in TransformSignature is possible. The highest threat from this vulnerability is to data confidentiality. | []
| null | 7.5 | null | null |
|
GHSA-8gw4-r28f-7g55 | Memory leak in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local privileged guest OS users to cause a denial of service (host memory consumption and possibly QEMU process crash) by leveraging a missing cleanup operation in FileOperations. | []
| null | 6.5 | null | null |
|
CVE-2006-0850 | SQL injection vulnerability in include/includes/user/login.php in ilchClan before 1.05g allows remote attackers to execute arbitrary SQL commands via the login_name parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:ilch.de:ilchclan:0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilch.de:ilchclan:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ilch.de:ilchclan:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ilch.de:ilchclan:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ilch.de:ilchclan:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ilch.de:ilchclan:1.0.4:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-6m9p-3vwc-4p47 | Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured. | []
| null | null | null | null |
|
CVE-2007-5384 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Thomson/Alcatel SpeedTouch 7G router, as used for the BT Home Hub 6.2.6.B and earlier, allow remote attackers to perform actions as administrators via unspecified POST requests, as demonstrated by enabling an inbound remote-assistance HTTPS session on TCP port 51003. NOTE: an authentication bypass can be leveraged to exploit this in the absence of an existing administrative session. NOTE: SpeedTouch 780 might also be affected by some of these issues. | [
"cpe:2.3:h:alcatel:speedtouch_7g_router:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bt:home_hub:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2024-4424 | Stored XSS in CemiPark | The access control in CemiPark software does not properly validate user-entered data, which allows the stored cross-site scripting (XSS) attack. The parameters used to enter data into the system do not have appropriate validation, which makes possible to smuggle in HTML/JavaScript code. This code will be executed in the user's browser space.This issue affects CemiPark software: 4.5, 4.7, 5.03 and potentially others. The vendor refused to provide the specific range of affected products.
| []
| null | 6.1 | null | null |
GHSA-4wcc-xwq3-8v2h | Deserialization of Untrusted Data vulnerability in Mahmudul Hasan Arif FluentBoards allows Object Injection. This issue affects FluentBoards: from n/a through 1.47. | []
| null | 9.8 | null | null |
|
CVE-2016-0603 | Unspecified vulnerability in the Java SE component in Oracle Java SE 6u111, 7u95, 8u71, and 8u72, when running on Windows, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install. NOTE: the previous information is from Oracle's Security Alert for CVE-2016-0603. Oracle has not commented on third-party claims that this is an untrusted search path issue that allows local users to gain privileges via a Trojan horse dll in the "application directory." | [
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update71:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update72:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update111:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update95:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.8.0:update72:*:*:*:*:*:*"
]
| null | null | null | 7.6 |
|
GHSA-787m-83jr-r46c | Format string vulnerability in tcpflow, when used in a setuid context, allows local users to execute arbitrary code via the device name argument, as demonstrated in Sustworks IPNetSentryX and IPNetMonitorX the setuid program RunTCPFlow. | []
| null | null | null | null |
|
GHSA-wcw6-86f6-3583 | IBM API Connect's Developer Portal 2018.1 and 2018.4.1.3 is impacted by a privilege escalation vulnerability when integrated with an OpenID Connect (OIDC) user registry. IBM X-Force ID: 158544. | []
| null | null | 9.8 | null |
|
GHSA-rgg8-qhg9-q698 | NVIDIA GPU Display Driver for Linux contains a vulnerability in the kernel mode layer, where a NULL pointer dereference may lead to denial of service. | []
| null | 5.5 | null | null |
|
GHSA-9r4c-6g65-x8qw | This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request, aka 'Local Security Authority Subsystem Service Denial of Service Vulnerability'. | []
| null | null | 6.5 | null |
|
GHSA-876r-cqqg-qm3c | Unspecified vulnerability in Oracle MySQL 5.6.31 and earlier and 5.7.13 and earlier allows local users to affect availability via vectors related to Server: Replication. | []
| null | null | 1.8 | null |
|
RHSA-2025:8599 | Red Hat Security Advisory: thunderbird security update | firefox: thunderbird: Out-of-bounds access when resolving Promise objects firefox: thunderbird: Out-of-bounds access when optimizing linear sums firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content firefox: thunderbird: Potential local code execution in “Copy as cURL” command firefox: thunderbird: Script element events leaked cross-origin resource status firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details firefox: thunderbird: Memory safety bugs firefox: thunderbird: Memory safety bug libvpx: Double-free in libvpx encoder | [
"cpe:/a:redhat:rhel_eus:9.4::appstream"
]
| null | 8.1 | null | null |
CVE-2025-30758 | Vulnerability in the Siebel CRM End User product of Oracle Siebel CRM (component: User Interface). Supported versions that are affected are 25.0-25.5. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Siebel CRM End User. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Siebel CRM End User accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | []
| null | 5.3 | null | null |
|
GHSA-58pp-mqmq-89c9 | Improper cryptographic implementation in Samsung Flow for PC 4.9.14.0 allows adjacent attackers to decrypt encrypted messages or inject commands. | []
| null | 8.8 | null | null |
|
CVE-2007-3958 | Microsoft Windows Explorer (explorer.exe) allows user-assisted remote attackers to cause a denial of service via a certain GIF file, as demonstrated by Art.gif. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_me:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.1 |
|
CVE-2020-9869 | A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Catalina 10.15.6. A remote attacker may cause an unexpected application termination. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 5 |
|
GHSA-6x86-vh35-w9qc | The Hotel Story: Resort Simulation (aka com.happylabs.hotelstory) application 1.7.9B for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
GHSA-cfxc-ch9m-pr95 | A local privilege escalation vlnerability in the WatchGuard Mobile VPN with SSL client on Windows enables a local user to execute arbitrary commands with elevated privileged. | []
| null | 7.8 | null | null |
|
GHSA-7225-rpgx-xc83 | Rejected reason: Not used | []
| null | null | null | null |
|
GHSA-vpj6-g6hc-j3cp | In the Linux kernel, the following vulnerability has been resolved:bonding: Fix unnecessary warnings and logs from bond_xdp_get_xmit_slave()syzbot reported a WARNING in bond_xdp_get_xmit_slave. To reproduce
this[1], one bond device (bond1) has xdpdrv, which increases
bpf_master_redirect_enabled_key. Another bond device (bond0) which is
unsupported by XDP but its slave (veth3) has xdpgeneric that returns
XDP_TX. This triggers WARN_ON_ONCE() from the xdp_master_redirect().
To reduce unnecessary warnings and improve log management, we need to
delete the WARN_ON_ONCE() and add ratelimit to the netdev_err().[1] Steps to reproduce:
# Needs tx_xdp with return XDP_TX;
ip l add veth0 type veth peer veth1
ip l add veth3 type veth peer veth4
ip l add bond0 type bond mode 6 # BOND_MODE_ALB, unsupported by XDP
ip l add bond1 type bond # BOND_MODE_ROUNDROBIN by default
ip l set veth0 master bond1
ip l set bond1 up
# Increases bpf_master_redirect_enabled_key
ip l set dev bond1 xdpdrv object tx_xdp.o section xdp_tx
ip l set veth3 master bond0
ip l set bond0 up
ip l set veth4 up
# Triggers WARN_ON_ONCE() from the xdp_master_redirect()
ip l set veth3 xdpgeneric object tx_xdp.o section xdp_tx | []
| null | 5.5 | null | null |
|
GHSA-r3mq-x574-632m | An Untrusted Search Path vulnerability in the ServiceInstance.dll library versions 1.0.15.119 and lower, as used in Bitdefender Antivirus Free 2020 versions prior to 1.0.15.138, allows an attacker to load an arbitrary DLL file from the search path. | []
| null | null | 7.8 | null |
|
GHSA-7m3j-45xq-3xj9 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Content Planner allows Reflected XSS. This issue affects Content Planner: from n/a through 1.0. | []
| null | 7.1 | null | null |
|
GHSA-w5rr-mc9h-5xqw | The CRM Perks Forms plugin for WordPress is vulnerable to Stored Cross-Site Scripting via form settings in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | []
| null | 4.4 | null | null |
|
CVE-2006-3430 | SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and earlier, allows remote attackers to execute arbitrary SQL commands via the agentid parameter. | [
"cpe:2.3:a:lumension:patchlink_update_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:lumension:patchlink_update_server:6.2.0.181:*:*:*:*:*:*:*",
"cpe:2.3:a:lumension:patchlink_update_server:6.2.0.189:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:zenworks:*:sr1:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-9gwq-w6mg-j59q | Microsoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote attackers to bypass Security Zone restrictions via WebDAV requests. | []
| null | null | null | null |
|
GHSA-xj2p-4gc4-hvf5 | An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution. | []
| null | 8.8 | null | null |
|
GHSA-m2hp-89p5-rrf9 | In Messaging, there is a possible way to bypass attachment restrictions due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-209965112 | []
| null | 5.5 | null | null |
|
GHSA-x6wp-vgmq-cc83 | A vulnerability has been found in Surya2Developer Hostel Management Service 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /check_availability.php of the component HTTP POST Request Handler. The manipulation of the argument oldpassword leads to observable response discrepancy. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-256891. | []
| null | 3.7 | null | null |
|
CVE-2021-28590 | Adobe Media Encoder VOB File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability | Adobe Media Encoder version 15.2 (and earlier) is affected by an Out-of-bounds Read vulnerability when parsing a specially crafted file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [
"cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 3.3 | null | null |
cisco-sa-ucsi2-command-inject-CGyC8y2R | Cisco Intersight Virtual Appliance Command Injection Vulnerability | A vulnerability in the web-based management interface of Cisco Intersight Virtual Appliance could allow an authenticated, remote attacker to perform a command injection attack on an affected device.
This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by using the web-based management interface to execute a command using crafted input. A successful exploit could allow the attacker to execute arbitrary commands using root-level privileges on an affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | 8.8 | null | null |
GHSA-5pxc-6jqh-5cc3 | Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806. | []
| null | 7.8 | null | null |
|
CVE-2019-17220 | Rocket.Chat before 2.1.0 allows XSS via a URL on a ![title] line. | [
"cpe:2.3:a:rocket.chat:rocket.chat:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-2cg6-w8mm-22rg | A vulnerability has been identified in SIMATIC CP 343-1 Advanced (All versions), SIMATIC CP 343-1 Standard (All versions), SIMATIC CP 443-1 Advanced (All versions), SIMATIC CP 443-1 Standard (All versions), SIMATIC S7-1500 Software Controller incl. F (All versions < V1.7.0), SIMATIC S7-1500 incl. F (All versions < V1.7.0), SIMATIC S7-300 incl. F and T (All versions < V3.X.16), SIMATIC S7-400 H V6 (All versions < V6.0.9), SIMATIC S7-400 PN/DP V6 Incl. F (All versions < V6.0.7), SIMATIC S7-400 PN/DP V7 Incl. F (All versions), SIMATIC S7-410 (All versions < V8.1), SIMATIC WinAC RTX (F) 2010 (All versions < SIMATIC WinAC RTX 2010 SP3), SINUMERIK 828D (All versions < V4.7 SP6 HF1), Softnet PROFINET IO for PC-based Windows systems (All versions). Responding to a PROFINET DCP request with a specially crafted PROFINET DCP packet could cause a Denial-of-Service condition of the requesting system. The security vulnerability could be exploited by an attacker located on the same Ethernet segment (OSI Layer 2) as the targeted device. Successful exploitation requires no user interaction or privileges and impacts the availability of core functionality of the affected device. A manual restart is required to recover the system. At the time of advisory publication no public exploitation of this security vulnerability is known. Siemens provides mitigations to resolve the security issue. PROFIBUS interfaces are not affected. | []
| null | null | 6.5 | null |
|
GHSA-28cv-g234-w9cx | A vulnerability has been identified in Polarion ALM (All versions < V2304.0). The application contains a XML External Entity Injection (XXE) vulnerability. This could allow an attacker to view files on the application server filesystem. | []
| null | 5.3 | null | null |
|
CVE-2021-45603 | Certain NETGEAR devices are affected by disclosure of sensitive information. A UPnP request reveals a device's serial number, which can be used for a password reset. This affects D7800 before 1.0.1.66, EX2700 before 1.0.1.68, WN3000RPv2 before 1.0.0.90, WN3000RPv3 before 1.0.2.100, LBR1020 before 2.6.5.20, LBR20 before 2.6.5.32, R6700AX before 1.0.10.110, R7800 before 1.0.2.86, R8900 before 1.0.5.38, R9000 before 1.0.5.38, RAX10 before 1.0.10.110, RAX120v1 before 1.2.3.28, RAX120v2 before 1.2.3.28, RAX70 before 1.0.10.110, RAX78 before 1.0.10.110, XR450 before 2.3.2.130, XR500 before 2.3.2.130, and XR700 before 1.0.1.46. | [
"cpe:2.3:o:netgear:d7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:d7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:ex2700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:ex2700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rpv2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rpv2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:wn3000rpv3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:wn3000rpv3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:lbr1020_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lbr1020:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:lbr20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:lbr20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r6700ax_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700ax:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r7800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r8900_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r8900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:r9000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r9000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120v1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120v1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax120v2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax120v2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax70_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax70:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:rax78_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:rax78:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr450_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr500_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:netgear:xr700_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:xr700:-:*:*:*:*:*:*:*"
]
| null | 6.1 | null | null |
|
RHSA-2019:1945 | Red Hat Security Advisory: keepalived security update | keepalived: Heap-based buffer overflow when parsing HTTP status codes allows for denial of service or possibly arbitrary code execution | [
"cpe:/o:redhat:rhel_eus:7.4::server"
]
| null | null | 8.1 | null |
CVE-2006-2080 | SQL injection vulnerability in portfolio_photo_popup.php in Verosky Media Instant Photo Gallery 1.0.2 allows remote attackers to execute arbitrary SQL commands via the id parameter, which is not cleansed before calling the count_click function in includes/functions/fns_std.php. NOTE: this issue could produce resultant XSS. | [
"cpe:2.3:a:verosky_media:instant_photo_gallery:1.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
CVE-2006-7029 | Microsoft Internet Explorer 6 SP2 and earlier allows remote attackers to cause a denial of service (crash) via a frameset with only one frame that calls resizeTo with certain arguments. NOTE: this issue might be related to CVE-2006-3637. | [
"cpe:2.3:a:microsoft:internet_explorer:*:sp2:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2025-38124 | net: fix udp gso skb_segment after pull from frag_list | In the Linux kernel, the following vulnerability has been resolved:
net: fix udp gso skb_segment after pull from frag_list
Commit a1e40ac5b5e9 ("net: gso: fix udp gso fraglist segmentation after
pull from frag_list") detected invalid geometry in frag_list skbs and
redirects them from skb_segment_list to more robust skb_segment. But some
packets with modified geometry can also hit bugs in that code. We don't
know how many such cases exist. Addressing each one by one also requires
touching the complex skb_segment code, which risks introducing bugs for
other types of skbs. Instead, linearize all these packets that fail the
basic invariants on gso fraglist skbs. That is more robust.
If only part of the fraglist payload is pulled into head_skb, it will
always cause exception when splitting skbs by skb_segment. For detailed
call stack information, see below.
Valid SKB_GSO_FRAGLIST skbs
- consist of two or more segments
- the head_skb holds the protocol headers plus first gso_size
- one or more frag_list skbs hold exactly one segment
- all but the last must be gso_size
Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can
modify fraglist skbs, breaking these invariants.
In extreme cases they pull one part of data into skb linear. For UDP,
this causes three payloads with lengths of (11,11,10) bytes were
pulled tail to become (12,10,10) bytes.
The skbs no longer meets the above SKB_GSO_FRAGLIST conditions because
payload was pulled into head_skb, it needs to be linearized before pass
to regular skb_segment.
skb_segment+0xcd0/0xd14
__udp_gso_segment+0x334/0x5f4
udp4_ufo_fragment+0x118/0x15c
inet_gso_segment+0x164/0x338
skb_mac_gso_segment+0xc4/0x13c
__skb_gso_segment+0xc4/0x124
validate_xmit_skb+0x9c/0x2c0
validate_xmit_skb_list+0x4c/0x80
sch_direct_xmit+0x70/0x404
__dev_queue_xmit+0x64c/0xe5c
neigh_resolve_output+0x178/0x1c4
ip_finish_output2+0x37c/0x47c
__ip_finish_output+0x194/0x240
ip_finish_output+0x20/0xf4
ip_output+0x100/0x1a0
NF_HOOK+0xc4/0x16c
ip_forward+0x314/0x32c
ip_rcv+0x90/0x118
__netif_receive_skb+0x74/0x124
process_backlog+0xe8/0x1a4
__napi_poll+0x5c/0x1f8
net_rx_action+0x154/0x314
handle_softirqs+0x154/0x4b8
[118.376811] [C201134] rxq0_pus: [name:bug&]kernel BUG at net/core/skbuff.c:4278!
[118.376829] [C201134] rxq0_pus: [name:traps&]Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
[118.470774] [C201134] rxq0_pus: [name:mrdump&]Kernel Offset: 0x178cc00000 from 0xffffffc008000000
[118.470810] [C201134] rxq0_pus: [name:mrdump&]PHYS_OFFSET: 0x40000000
[118.470827] [C201134] rxq0_pus: [name:mrdump&]pstate: 60400005 (nZCv daif +PAN -UAO)
[118.470848] [C201134] rxq0_pus: [name:mrdump&]pc : [0xffffffd79598aefc] skb_segment+0xcd0/0xd14
[118.470900] [C201134] rxq0_pus: [name:mrdump&]lr : [0xffffffd79598a5e8] skb_segment+0x3bc/0xd14
[118.470928] [C201134] rxq0_pus: [name:mrdump&]sp : ffffffc008013770 | []
| null | null | null | null |
GHSA-wc9r-fhpg-5627 | Multiple unspecified vulnerabilities in Google Chrome before 17.0.963.27 on the Acer AC700, Samsung Series 5, and Cr-48 Chromebook platforms have unknown impact and attack vectors. | []
| null | null | null | null |
|
CVE-2024-4635 | Menu Icons by ThemeIsle <= 0.13.13 - Authenticated (Author+) Stored Cross-Site Scripting via SVG Upload | The Menu Icons by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘add_mime_type’ function in versions up to, and including, 0.13.13 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with author-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | []
| null | 6.4 | null | null |
ICSA-14-254-01 | Schneider Electric VAMPSET Buffer Overflow | Multiple stack-based buffer overflows in Schneider Electric VAMPSET 2.2.136 and earlier allow local users to cause a denial of service (application halt) via a malformed (1) setting file or (2) disturbance recording file. | []
| null | null | null | null |
GHSA-g2pq-7p3f-25jp | Missing Authorization vulnerability in slui Media Hygiene allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Media Hygiene: from n/a through 4.0.1. | []
| null | 4.3 | null | null |
|
GHSA-qq86-2628-gqpg | Vulnerability in the Oracle Applications Framework product of Oracle E-Business Suite (component: Page Request). Supported versions that are affected are 12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Applications Framework. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Applications Framework accessible data. CVSS 3.1 Base Score 2.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N). | []
| null | null | null | null |
|
GHSA-vhj2-pggv-wgpc | The IPSec implementation in Apple Mac OS X before 10.8.5, when Hybrid Auth is used, does not verify X.509 certificates from security gateways, which allows man-in-the-middle attackers to spoof security gateways and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
GHSA-9p3j-mhgp-fq28 | Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in Service Account Auditing reports. | []
| null | 8.3 | null | null |
|
GHSA-f4f5-49rv-w5xh | Windows Network Address Translation (NAT) Denial of Service Vulnerability | []
| null | 7.5 | null | null |
|
RHSA-2024:1060 | Red Hat Security Advisory: python-pillow security update | pillow: Arbitrary Code Execution via the environment parameter | [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/a:redhat:rhel_e4s:8.4::appstream",
"cpe:/a:redhat:rhel_tus:8.4::appstream"
]
| null | 8.1 | null | null |
GHSA-6fmj-cv39-m2r9 | admin.php in Arz Development The Gemini Portal 4.7 and earlier allows remote attackers to bypass authentication and gain administrator privileges by setting the user cookie to "admin" and setting the name parameter to "users." | []
| null | null | null | null |
|
CVE-2025-46883 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | []
| null | 5.4 | null | null |
CVE-2020-11945 | An issue was discovered in Squid before 5.0.2. A remote attacker can replay a sniffed Digest Authentication nonce to gain access to resources that are otherwise forbidden. This occurs because the attacker can overflow the nonce reference counter (a short integer). Remote code execution may occur if the pooled token credentials are freed (instead of replayed as valid credentials). | [
"cpe:2.3:a:squid-cache:squid:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-572h-h6vj-p4c7 | SQL injection vulnerability in default.asp in ActiveWebSoftwares Active Auction Pro 7.1 allows remote attackers to execute arbitrary SQL commands via the catid parameter. | []
| null | null | null | null |
|
GHSA-mc44-gpw6-529m | Multiple persistent cross-site scripting (XSS) flaws were found in the way Aerogear handled certain user-supplied content. A remote attacker could use these flaws to compromise the application with specially crafted input. | []
| null | 5.4 | null | null |
|
ICSA-24-067-01 | Chirp Systems Chirp Access (Update C) | The Chirp Access app contains a hard-coded password, BEACON_PASSWORD. An attacker within Bluetooth range could change configuration settings within the Bluetooth beacon, effectively disabling the application's ability to notify users when they are near a Beacon-enabled access point. This variable cannot be used to change the configuration settings of the door readers or locksets and does not affect the ability for authorized users of the mobile application to lock or unlock access points. | []
| null | 4.3 | null | null |
GHSA-2rhg-qq9v-fjp8 | A code execution vulnerability exists in the Nef polygon-parsing functionality of CGAL libcgal CGAL-5.1.1. An oob read vulnerability exists in Nef_S2/SNC_io_parser.h SNC_io_parser::read_sloop() slh->twin() An attacker can provide malicious input to trigger this vulnerability. | []
| null | 9.8 | null | null |
|
GHSA-3j6m-cq99-v646 | A vulnerability in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface of an affected device. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface, or access sensitive, browser-based information. | []
| null | 6.1 | null | null |
|
GHSA-pwqr-fp7x-9xcp | An Out-of-bounds Write vulnerability in the connectivity fault management (CFM) daemon of Juniper Networks Junos OS on MX Series with MPC-BUILTIN, MPC1 through MPC9 line cards allows an unauthenticated adjacent attacker to send a malformed packet to the device, leading to an FPC crash and restart, resulting in a Denial of Service (DoS).Continued receipt and processing of this packet will create a sustained Denial of Service (DoS) condition.This issue affects Juniper Networks:
Junos OS:All versions before 22.2R3-S1,from 22.4 before 22.4R2.This feature is not enabled by default. | []
| 7.1 | 6.5 | null | null |
|
CVE-2007-1444 | netserver in netperf 2.4.3 allows local users to overwrite arbitrary files via a symlink attack on /tmp/netperf.debug. | [
"cpe:2.3:a:netperf:netperf:2.4.3:*:*:*:*:*:*:*"
]
| null | null | null | 4.4 |
This dataset, CIRCL/vulnerability-scores
, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))