CIRCL/vulnerability-severity-classification-roberta-base
Text Classification
•
0.1B
•
Updated
•
623
•
5
id
stringlengths 12
47
| title
stringlengths 0
664
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2016-10203
|
Cross-site scripting (XSS) vulnerability in Zoneminder 1.30 and earlier allows remote attackers to inject arbitrary web script or HTML via the name when creating a new monitor.
|
[
"cpe:2.3:a:zoneminder:zoneminder:*:*:*:*:*:*:*:*"
] | null | null | 6.1
| 4.3
| null |
|
GHSA-cpp2-q66x-fq44
|
Directory Traversal in jikes
|
Affected versions of `jikes` resolve relative file paths, resulting in a directory traversal vulnerability. A malicious actor can use this vulnerability to access files outside of the intended directory root, which may result in the disclosure of private files on the vulnerable system.**Example request:**RecommendationNo patch is available for this vulnerability.It is recommended that the package is only used for local development, and if the functionality is needed for production, a different package is used instead.
|
[] | null | null | null | null | null |
CVE-2016-4295
|
When opening a Hangul Hcell Document (.cell) and processing a particular record within the Workbook stream, an index miscalculation leading to a heap overlow can be made to occur in Hancom Office 2014. The vulnerability occurs when processing data for a formula used to render a chart via the HncChartPlugin.hplg library. Due to a lack of bounds-checking when incrementing an index that is used for writing into a buffer for formulae, the application can be made to write pointer data outside its bounds which can lead to code execution under the context of the application.
|
[
"cpe:2.3:a:hancom:hancom_office_2014:*:*:*:*:*:*:*:*"
] | null | null | 7.8
| 6.8
| null |
|
CVE-2024-6458
|
WooCommerce Product Table Lite <= 3.5.1 - Missing Authorization to (Subscriber+) Stored Cross-Site Scripting
|
The WooCommerce Product Table Lite plugin for WordPress is vulnerable to unauthorized post title modification due to a missing capability check on the wcpt_presets__duplicate_preset_to_table function in all versions up to, and including, 3.5.1. This makes it possible for authenticated attackers with subscriber access and above to change titles of arbitrary posts. Missing sanitization can lead to Stored Cross-Site Scripting when viewed by an admin via the WooCommerce Product Table.
|
[] | null | 6.4
| null | null | null |
GHSA-fg7f-vmj6-cm3r
|
Unspecified vulnerability in a Qualcomm component in Android before 2016-10-05 on Nexus 5X and 6P devices has unknown impact and attack vectors, aka internal bug 28823244.
|
[] | null | null | 9.8
| null | null |
|
CVE-2015-0633
|
The Integrated Management Controller (IMC) in Cisco Unified Computing System (UCS) 1.4(7h) and earlier on C-Series servers allows remote attackers to bypass intended access restrictions by sending crafted DHCP response packets on the local network, aka Bug ID CSCuf52876.
|
[
"cpe:2.3:a:cisco:unified_computing_system:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(1c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(2\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3c\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3c\\)2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3k\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3p\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3p\\)5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(3s\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(4a\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(4a\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5b\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5e\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5g\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5g\\)2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5h\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(5j\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(6c\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(6d\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(7b\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(7c\\)1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:unified_computing_system:1.4\\(7h\\):*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c200_m1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c200_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c210_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c22_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c220_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c220_m4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c24_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c240_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c240_m4:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c250_m1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c250_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c260_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c3160:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c420_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c420_m3:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c460_m1:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c460_m2:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:c460_m4:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
CVE-2014-6140
|
IBM Tivoli Endpoint Manager Mobile Device Management (MDM) before 9.0.60100 uses the same secret HMAC token across different customers' installations, which allows remote attackers to execute arbitrary code via crafted marshalled Ruby objects in cookies to (1) Enrollment and Apple iOS Management Extender, (2) Self-service portal, (3) Trusted Services provider, or (4) Admin Portal.
|
[
"cpe:2.3:a:ibm:tivoli_endpoint_manager_mobile_device_management:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3
| null |
|
GHSA-cjrw-wqcm-hrgm
|
Windows Distributed File System (DFS) Remote Code Execution Vulnerability
|
[] | null | 8
| null | null | null |
|
CVE-2022-32046
|
TOTOLINK T6 V4.1.9cu.5179_B20201015 was discovered to contain a stack overflow via the desc parameter in the function FUN_0041880c.
|
[
"cpe:2.3:o:totolink:t6_firmware:4.1.9cu.5179_b20201015:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t6:-:*:*:*:*:*:*:*"
] | null | 7.5
| null | 5
| null |
|
CVE-2025-59536
|
Claude Code's startup trust dialog could lead to Command Execution attack
|
Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will have received this fix automatically. Users performing manual updates are advised to update to the latest version. This issue is fixed in version 1.0.111.
|
[] | 8.7
| null | null | null | null |
CVE-2014-0850
|
Cross-site scripting (XSS) vulnerability in IBM InfoSphere Master Data Management Reference Data Management (RDM) Hub 10.1 and 11.0 before 11.0.0.0-MDM-IF008 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:infosphere_master_data_management_reference_data_management_hub:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management_reference_data_management_hub:11.0:*:*:*:*:*:*:*"
] | null | null | null | 3.5
| null |
|
PYSEC-2022-97
| null |
Tensorflow is an Open Source Machine Learning Framework. A malicious user can cause a denial of service by altering a `SavedModel` such that Grappler optimizer would attempt to build a tensor using a reference `dtype`. This would result in a crash due to a `CHECK`-fail in the `Tensor` constructor as reference types are not allowed. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
|
[] | null | null | null | null | null |
GHSA-8w9v-5prf-r8mm
|
PHP remote file inclusion vulnerability in admin.tour_toto.php in the Tour de France Pool (com_tour_toto) 1.0.1 module for Joomla! allows remote attackers to execute arbitrary PHP code via a URL in the mosConfig_absolute_path parameter.
|
[] | null | null | null | null | null |
|
GHSA-2q3w-h8mm-q9v3
|
shadow: TOCTOU (time-of-check time-of-use) race condition when copying and removing directory trees
|
[] | null | 4.7
| null | null | null |
|
CVE-2023-23996
|
WordPress ProfilePress Plugin <= 4.5.3 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in ProfilePress Membership Team ProfilePress plugin <= 4.5.3 versions.
|
[
"cpe:2.3:a:properfraction:profilepress:*:*:*:*:*:wordpress:*:*"
] | null | 5.9
| null | null | null |
GHSA-pq57-7r6w-55gx
|
In the Android kernel in VPN routing there is a possible information disclosure. This could lead to remote information disclosure by an adjacent network attacker with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] | null | null | null | null | null |
|
CVE-2009-3407
|
Unspecified vulnerability in the Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 allows remote attackers to affect integrity via unknown vectors, a different vulnerability than CVE-2009-0974 and CVE-2009-0983.
|
[
"cpe:2.3:a:oracle:application_server:10.1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:10.1.4.2:*:*:*:*:*:*:*"
] | null | null | null | 4.3
| null |
|
CVE-2009-3117
|
SQL injection vulnerability in category.php in Snow Hall Silurus System 1.0 allows remote attackers to execute arbitrary SQL commands via the ID parameter.
|
[
"cpe:2.3:a:snowhall:silurus_system:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-4v35-rh24-xvq6
|
The sell function of a smart contract implementation for MoneyTree (TREE), an Ethereum token, has an integer overflow in which "amount * sellPrice" can be zero, consequently reducing a seller's assets.
|
[] | null | null | 7.5
| null | null |
|
CVE-2019-17240
|
bl-kernel/security.class.php in Bludit 3.9.2 allows attackers to bypass a brute-force protection mechanism by using many different forged X-Forwarded-For or Client-IP HTTP headers.
|
[
"cpe:2.3:a:bludit:bludit:3.9.2:*:*:*:*:*:*:*"
] | null | null | 3.7
| null | null |
|
GHSA-9w36-mccq-ph2c
|
The Starter Templates by Kadence WP WordPress plugin before 1.2.17 unserialises the content of an imported file, which could lead to PHP object injection issues when an admin import (intentionally or not) a malicious file and a suitable gadget chain is present on the blog.
|
[] | null | 8.8
| null | null | null |
|
CVE-2023-53145
|
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
|
In the Linux kernel, the following vulnerability has been resolved:
Bluetooth: btsdio: fix use after free bug in btsdio_remove due to race condition
In btsdio_probe, the data->work is bound with btsdio_work. It will be
started in btsdio_send_frame.
If the btsdio_remove runs with a unfinished work, there may be a race
condition that hdev is freed but used in btsdio_work. Fix it by
canceling the work before do cleanup in btsdio_remove.
|
[] | null | 7.8
| null | null | null |
CVE-2021-26216
|
SeedDMS 5.1.x is affected by cross-site request forgery (CSRF) in out.EditFolder.php.
|
[
"cpe:2.3:a:seeddms:seeddms:*:*:*:*:*:*:*:*"
] | null | 4.3
| null | 4.3
| null |
|
GHSA-fv9q-w2fc-m6jg
|
Buffer overflow in Adobe Reader and Acrobat 9.x before 9.3.3, and 8.x before 8.2.3 on Windows and Mac OS X, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via a PDF file containing Flash content with a crafted #1023 (3FFh) tag, a different vulnerability than CVE-2010-1295, CVE-2010-2202, CVE-2010-2207, CVE-2010-2209, CVE-2010-2210, and CVE-2010-2211.
|
[] | null | null | null | null | null |
|
GHSA-8624-hqvr-jpcf
|
A vulnerability has been found in code-projects College Notes Gallery 2.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file login.php. The manipulation of the argument user leads to sql injection. The exploit has been disclosed to the public and may be used. The identifier VDB-249133 was assigned to this vulnerability.
|
[] | null | 6.3
| null | null | null |
|
GHSA-6f7g-9q5v-x6x8
|
In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c.
|
[] | null | 7.5
| null | null | null |
|
GHSA-h7gg-c33j-63rm
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Link Whisper Link Whisper Free allows Reflected XSS.This issue affects Link Whisper Free: from n/a through 0.6.8.
|
[] | null | 7.1
| null | null | null |
|
CVE-2024-6852
|
WP MultiTasking <= 0.1.12 - Settings Update via CSRF
|
The WP MultiTasking WordPress plugin through 0.1.12 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack
|
[
"cpe:2.3:a:thangnv27:wp_multitasking:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ngothang:wp_multitasking:*:*:*:*:*:wordpress:*:*"
] | null | 6.5
| null | null | null |
GHSA-3gpv-j6x6-qq3j
|
Improper input validation for some Intel QuickAssist Technology before version 2.6.0 within Ring 3: User Applications may allow an escalation of privilege. System software adversary with an authenticated user combined with a low complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present without special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (high), integrity (high) and availability (high) of the vulnerable system, resulting in subsequent system confidentiality (none), integrity (none) and availability (none) impacts.
|
[] | 7.3
| 8.8
| null | null | null |
|
GHSA-cfj7-94v2-cwfv
|
Cross-site scripting (XSS) vulnerability in planetluc RateMe 1.3.3 allows remote attackers to inject arbitrary web script or HTML via the rate parameter in a submit rate action.
|
[] | null | null | null | null | null |
|
GHSA-cm9w-2x7j-gc65
|
In the Linux kernel, the following vulnerability has been resolved:powerpc/fixmap: Fix VM debug warning on unmapUnmapping a fixmap entry is done by calling __set_fixmap()
with FIXMAP_PAGE_CLEAR as flags.Today, powerpc __set_fixmap() calls map_kernel_page().map_kernel_page() is not happy when called a second time
for the same page.Implement unmap_kernel_page() which clears an existing pte.
|
[] | null | 5.5
| null | null | null |
|
GHSA-vw56-2pmm-v9m9
|
A information disclosure vulnerability in the Android framework (aosp email application). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-71814449.
|
[] | null | null | 5.3
| null | null |
|
CVE-2023-49444
|
An arbitrary file upload vulnerability in DoraCMS v2.1.8 allow attackers to execute arbitrary code via uploading a crafted HTML or image file to the user avatar.
|
[
"cpe:2.3:a:html-js:doracms:2.1.8:*:*:*:*:*:*:*"
] | null | 5.4
| null | null | null |
|
GHSA-rx2m-34rg-7763
|
Dell EMC iDRAC7/iDRAC8 versions prior to 2.61.60.60 and iDRAC9 versions prior to 3.20.21.20, 3.21.24.22, 3.21.26.22, and 3.23.23.23 contain a privilege escalation vulnerability. An authenticated malicious iDRAC user with operator privileges could potentially exploit a permissions check flaw in the Redfish interface to gain administrator access.
|
[] | null | null | 8.8
| null | null |
|
GHSA-j569-qvmh-9v59
|
CGIScript.net csPassword.cgi allows remote authenticated users to modify the .htaccess file and gain privileges via newlines in the title field of the edit page.
|
[] | null | null | null | null | null |
|
GHSA-8c7x-5xg2-cr7x
|
An exploitable stack buffer overflow vulnerability exists in the command line utility getcouplerdetails of WAGO PFC200 Firmware versions 03.01.07(13) and 03.00.39(12), and WAGO PFC100 Firmware version 03.00.39(12). A specially crafted set of packets sent to the iocheckd service "I/O-Check" can cause a stack buffer overflow in the sub-process getcouplerdetails, resulting in code execution. An attacker can send unauthenticated packets to trigger this vulnerability.
|
[] | null | null | null | null | null |
|
CVE-2022-26589
|
A Cross-Site Request Forgery (CSRF) in Pluck CMS v4.7.15 allows attackers to delete arbitrary pages.
|
[
"cpe:2.3:a:pluck-cms:pluck:4.7.15:-:*:*:*:*:*:*"
] | null | 6.5
| null | 4.3
| null |
|
GHSA-595v-6p68-9v59
|
Ardour v5.12 contains a use-after-free vulnerability in the component ardour/libs/pbd/xml++.cc when using xmlFreeDoc and xmlXPathFreeContext.
|
[] | null | null | null | null | null |
|
GHSA-vw7g-jq9m-3q9v
|
Unauthorized File Access in glance
|
Versions of `glance` prior to 3.0.7 are vulnerable to Unauthorized File Access. The package provides a `--nodot` option meant to hide files and directories with names that begin with a `.`, such as `.git` but fails to hide files inside a folder that begins with `.`.RecommendationUpgrade to version 3.0.7 or later.
|
[] | null | null | null | null | null |
GHSA-hcwf-6ghh-6m6f
|
BIND 9.6.0, 9.5.1, 9.5.0, 9.4.3, and earlier does not properly check the return value from the OpenSSL DSA_verify function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature, a similar vulnerability to CVE-2008-5077.
|
[] | null | null | null | null | null |
|
CVE-2008-3715
|
Cross-site scripting (XSS) vulnerability in inc-core-admin-editor-previouscolorsjs.php in the FlexCMS 2.5 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary web script or HTML via the PreviousColorsString parameter.
|
[
"cpe:2.3:a:flexcms:flexcms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:flexcms:flexcms:2.5:*:*:*:*:*:*:*"
] | null | null | null | 2.6
| null |
|
GHSA-cxx3-36xh-96f7
|
Cross-Site Request Forgery (CSRF) vulnerability in rafasashi User Session Synchronizer allows Stored XSS. This issue affects User Session Synchronizer: from n/a through 1.4.0.
|
[] | null | 7.1
| null | null | null |
|
GHSA-5mj2-m3hh-r2qm
|
A vulnerability was detected in itsourcecode Apartment Management System 1.0. The impacted element is an unknown function of the file /report/rented_info.php. The manipulation of the argument rsid results in sql injection. The attack may be launched remotely. The exploit is now public and may be used.
|
[] | 5.5
| 7.3
| null | null | null |
|
CVE-2024-33368
|
An issue in Plasmoapp RPShare Fabric mod v.1.0.0 allows a remote attacker to execute arbitrary code via the build method in DonwloadPromptScreen
|
[
"cpe:2.3:a:plasmoapp:rpshare:*:*:*:*:*:*:*:*"
] | null | 8.8
| null | null | null |
|
GHSA-pw8f-5vxw-hw2c
|
An elevation of privilege vulnerability in the Synaptics touchscreen driver in Android before 2016-11-05 could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Android ID: A-30937462.
|
[] | null | null | 7.8
| null | null |
|
CVE-2017-13158
|
An information disclosure vulnerability in the Android system (activitymanagerservice). Product: Android. Versions: 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0. Android ID A-32879915.
|
[
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*"
] | null | null | 7.5
| 7.8
| null |
|
CVE-2012-1850
|
The Remote Administration Protocol (RAP) implementation in the LanmanWorkstation service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle RAP responses, which allows remote attackers to cause a denial of service (service hang) via crafted RAP packets, aka "Remote Administration Protocol Denial of Service Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_7:*:*:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:sp1:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:r2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:itanium:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x86:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] | null | null | null | 5
| null |
|
CVE-2015-3749
|
WebKit, as used in Apple iOS before 8.4.1 and Safari before 6.2.8, 7.x before 7.1.8, and 8.x before 8.0.8, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2015-08-13-1 and APPLE-SA-2015-08-13-3.
|
[
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*"
] | null | null | null | 6.8
| null |
|
GHSA-m8rg-chr9-q7gm
|
Directory traversal vulnerability in raidenhttpd-admin/workspace.php in RaidenHTTPD 2.0.19, when the WebAdmin function is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the ulang parameter.
|
[] | null | null | null | null | null |
|
CVE-2023-41790
|
Traversal Path on PHP file
|
Uncontrolled Search Path Element vulnerability in Pandora FMS on all allows Leveraging/Manipulating Configuration File Search Paths. This vulnerability allows to access the server configuration file and to compromise the database. This issue affects Pandora FMS: from 700 through 773.
|
[
"cpe:2.3:a:artica:pandora_fms:*:*:*:*:*:*:*:*"
] | null | 7.6
| null | null | null |
CVE-2014-4296
|
Unspecified vulnerability in the JPublisher component in Oracle Database Server 11.1.0.7, 11.2.0.3, 11.2.0.4, 12.1.0.1, and 12.1.0.2 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2014-4290, CVE-2014-4291, CVE-2014-4292, CVE-2014-4293, CVE-2014-4297, CVE-2014-4310, CVE-2014-6547, and CVE-2014-6477.
|
[
"cpe:2.3:a:oracle:database_server:11.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:11.2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:database_server:12.1.0.2:*:*:*:*:*:*:*"
] | null | null | null | 4
| null |
|
GHSA-c4gc-553p-f6w2
|
An out-of-bounds write vulnerability exists in VS6ComFile!CItemDraw::is_motion_tween of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
|
[] | 8.4
| 7.8
| null | null | null |
|
CVE-2018-10029
|
CMS Made Simple (aka CMSMS) 2.2.7 has Reflected XSS in admin/moduleinterface.php via the m1_name parameter, related to moduledepends, a different vulnerability than CVE-2017-16799.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:*:*:*:*:*:*:*:*"
] | null | null | 4.8
| 3.5
| null |
|
RHSA-2023:3379
|
Red Hat Security Advisory: Red Hat Advanced Cluster Security for Kubernetes 3.73 security update
|
golang: html/template: improper handling of JavaScript whitespace
|
[
"cpe:/a:redhat:advanced_cluster_security:3.73::el8"
] | null | 8.1
| null | null | null |
GHSA-6r2h-x874-8mcw
|
The copy_semid_to_user function in ipc/sem.c in the Linux kernel before 2.6.36 does not initialize a certain structure, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) IPC_INFO, (2) SEM_INFO, (3) IPC_STAT, or (4) SEM_STAT command in a semctl system call.
|
[] | null | null | null | null | null |
|
CVE-2008-2455
|
SQL injection vulnerability in comment.php in the MacGuru BLOG Engine plugin 2.2 for e107 allows remote attackers to execute arbitrary SQL commands via the rid parameter.
|
[
"cpe:2.3:a:e107coders:e107_blog_engine:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-vjgm-gc5x-m8hp
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeNectar Salient Shortcodes salient-shortcodes allows Stored XSS.This issue affects Salient Shortcodes: from n/a through <= 1.5.4.
|
[] | null | 6.5
| null | null | null |
|
CVE-2020-8577
|
SANtricity OS Controller Software versions 11.50.1 and higher are susceptible to a vulnerability which could allow an attacker to discover sensitive information by intercepting its transmission within an https session.
|
[
"cpe:2.3:a:netapp:e-series_santricity_os_controller:*:*:*:*:*:*:*:*"
] | null | 5.9
| null | 4.3
| null |
|
GHSA-fcqc-4825-4p6v
|
A vulnerability classified as critical has been found in xxyopen Novel-Plus 3.5.0. This affects an unknown part of the file /api/front/search/books. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 5.3
| 6.3
| null | null | null |
|
GHSA-57qm-97m4-7q67
|
A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3
| 6.3
| null | null | null |
|
GHSA-59c3-pj39-54fg
|
The Watertools package in PyPI v0.0.0 was discovered to contain a code execution backdoor via the request package. This vulnerability allows attackers to access sensitive user information and digital currency keys, as well as escalate privileges.
|
[] | null | 9.8
| null | null | null |
|
CVE-2018-15142
|
Directory traversal in portal/import_template.php in versions of OpenEMR before 5.0.1.4 allows a remote attacker authenticated in the patient portal to execute arbitrary PHP code by writing a file with a PHP extension via the "docid" and "content" parameters and accessing it in the traversed directory.
|
[
"cpe:2.3:a:open-emr:openemr:*:*:*:*:*:*:*:*"
] | null | null | 8.8
| 6.5
| null |
|
GHSA-m93f-6f68-7r3h
|
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. When processing the launch method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability execute code in the context of the current process. Was ZDI-CAN-7250.
|
[] | null | null | null | null | null |
|
GHSA-3c45-wgjp-7v9r
|
Python Twisted trustRoot is not respected in HTTP client
|
Python Twisted 14.0.0 `trustRoot` is not respected in HTTP client
|
[] | 8.7
| 7.5
| null | null | null |
RHSA-2019:1667
|
Red Hat Security Advisory: qemu-kvm-rhev security update
|
QEMU: device_tree: heap buffer overflow while loading device tree blob
|
[
"cpe:/a:redhat:openstack:14::el7"
] | null | null | 7
| null | null |
GHSA-cprg-r8c2-9m62
|
The xz_decomp function in xzlib.c in libxml2 2.9.1 does not properly detect compression errors, which allows context-dependent attackers to cause a denial of service (process hang) via crafted XML data.
|
[] | null | null | null | null | null |
|
GHSA-vr5q-rw5h-fh9q
|
Openshift has shell command injection flaws due to unsanitized data being passed into shell commands.
|
[] | null | 8.8
| null | null | null |
|
GHSA-mj96-jcmr-6947
|
VTiger CRM <= 8.1.0 does not correctly check user privileges. A low-privileged user can interact directly with the "Migration" administrative module to disable arbitrary modules.
|
[] | null | 8.3
| null | null | null |
|
GHSA-35mj-p5wm-c7vw
|
Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by a Memory corruption vulnerability when parsing a specially crafted PDF file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8
| null | null | null |
|
GHSA-h3f6-5p9v-rcxm
|
** DISPUTED ** SQL injection vulnerability in index.cfm in SpireMedia mx7 allows remote attackers to execute arbitrary SQL commands via the cid parameter. NOTE: the vendor has disputed this issue, stating "This information is incorrect, unproven, and potentially slanderous." However, CVE and OSVDB have both performed additional research that suggests that this might be path disclosure from invalid SQL syntax.
|
[] | null | null | null | null | null |
|
CVE-2008-6232
|
Pre Shopping Mall allows remote attackers to bypass authentication and gain administrative access by setting the (1) adminname and the (2) adminid cookies to "admin".
|
[
"cpe:2.3:a:preprojects:pre_shopping_mall:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5
| null |
|
GHSA-cwhj-qw67-h9cc
|
A vulnerability has been found in PHPGurukul Dairy Farm Shop Management System 1.3 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sales-report-details.php. The manipulation of the argument fromdate/todate leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9
| 7.3
| null | null | null |
|
GHSA-6wq6-4gh5-p7r9
|
Stormshield Network Security (SNS) VPN SSL Client 2.1.0 through 2.8.0 has Insecure Permissions.
|
[] | null | 7.8
| null | null | null |
|
GHSA-7gcr-m3c2-5x75
|
TOTOLINK X18 V9.1.0cu.2024_B20220329 was discovered to contain a command injection vulnerability via the command parameter in the setTracerouteCfg function.
|
[] | null | 9.8
| null | null | null |
|
GHSA-fw7p-c3xh-x7w5
|
JetBrains YouTrack 2019.2 before 2019.2.59309 was vulnerable to XSS via an issue description.
|
[] | null | null | null | null | null |
|
GHSA-j497-52cv-pcp6
|
Buffer overflow in IBM WebSphere MQ 7.0 before 7.0.1.4 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted header field in a message.
|
[] | null | null | null | null | null |
|
GHSA-pwww-664m-pfp9
|
Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote attackers to perform spoofing and session hijacking.
|
[] | null | null | null | null | null |
|
CVE-2020-13465
|
The security protection in Gigadevice GD32F103 devices allows physical attackers to redirect the control flow and execute arbitrary code via the debug interface.
|
[
"cpe:2.3:o:gigadevice:gd32f103_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:gigadevice:gd32f103:-:*:*:*:*:*:*:*"
] | null | 6.8
| null | 4.6
| null |
|
CVE-2023-21507
|
Out-of-bounds Read vulnerability while processing BC_TUI_CMD_SEND_RESOURCE_DATA_ARRAY command in bc_tui trustlet from Samsung Blockchain Keystore prior to version 1.3.12.1 allows local attacker to read arbitrary memory.
|
[
"cpe:2.3:a:samsung:samsung_blockchain_keystore:*:*:*:*:*:*:*:*"
] | null | 4.4
| null | null | null |
|
CVE-2022-26078
|
Gallagher Controller 6000 is vulnerable to a Denial of Service attack via conflicting ARP packets with a duplicate IP address. This issue affects: Gallagher Gallagher Controller 6000 vCR8.60 versions prior to 220303a; vCR8.50 versions prior to 220303a; vCR8.40 versions prior to 220303a; vCR8.30 versions prior to 220303a.
|
[
"cpe:2.3:o:gallagher:controller_6000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:gallagher:controller_6000:-:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
|
CVE-2024-23679
|
Enonic XP Session Fixation Vulnerability
|
Enonic XP versions less than 7.7.4 are vulnerable to a session fixation issue. An remote and unauthenticated attacker can use prior sessions due to the lack of invalidating session attributes.
|
[
"cpe:2.3:a:enonic:xp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:enonic:xp:7.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:enonic:xp:7.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:enonic:xp:7.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:enonic:xp:7.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:enonic:xp:7.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:enonic:xp:7.8.0:rc3:*:*:*:*:*:*"
] | null | 9.8
| null | null | null |
GHSA-8j23-c7w9-jxvg
|
The User Registration & User Profile – Profile Builder WordPress plugin before 3.4.8 does not sanitise or escape its 'Modify default Redirect Delay timer' setting, allowing high privilege users to use JavaScript code in it, even when the unfiltered_html capability is disallowed, leading to an authenticated Stored Cross-Site Scripting issue
|
[] | null | 4.8
| null | null | null |
|
GHSA-664f-hg94-2f9v
|
Multiple cross-site scripting (XSS) vulnerabilities in PHP GEN before 1.3 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors.
|
[] | null | null | null | null | null |
|
CVE-2016-3963
|
Siemens SCALANCE S613 allows remote attackers to cause a denial of service (web-server outage) via traffic to TCP port 443.
|
[
"cpe:2.3:h:siemens:scalance_s613:*:*:*:*:*:*:*:*"
] | null | null | 5.3
| 5
| null |
|
CVE-2025-22269
|
WordPress Real Testimonials plugin <= 3.1.6 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ShapedPlugin LLC Real Testimonials allows Stored XSS. This issue affects Real Testimonials: from n/a through 3.1.6.
|
[] | null | 6.5
| null | null | null |
CVE-2001-1290
|
admin.cgi in Active Classifieds Free Edition 1.0, and possibly commercial versions, allows remote attackers to modify the configuration, gain privileges, and execute arbitrary Perl code via the table_width parameter.
|
[
"cpe:2.3:a:active_web_suite_technologies:active_classifieds:1.0:*:free:*:*:*:*:*"
] | null | null | null | 5
| null |
|
GHSA-hmp2-4r33-964p
|
manager/admin_ajax.php in joyplus-cms 1.6.0 has SQL Injection, as demonstrated by crafted POST data beginning with an "m_id=1 AND SLEEP(5)" substring.
|
[] | null | null | 9.8
| null | null |
|
GHSA-ww4p-6452-jmh8
|
Buffer overflow in the FTP Service in Microsoft Internet Information Services (IIS) 5.0 through 6.0 allows remote authenticated users to execute arbitrary code via a crafted NLST (NAME LIST) command that uses wildcards, leading to memory corruption, aka "IIS FTP Service RCE and DoS Vulnerability."
|
[] | null | null | null | null | null |
|
GHSA-fv44-gp5g-m9h3
|
Cerberus FTP Server before 4.0.3.0 allows remote authenticated users to list hidden files, even when the "Display hidden files" option is enabled, via the (1) MLSD or (2) MLST commands.
|
[] | null | null | null | null | null |
|
CVE-2024-3426
|
SourceCodester Online Courseware editt.php cross site scripting
|
A vulnerability, which was classified as problematic, has been found in SourceCodester Online Courseware 1.0. Affected by this issue is some unknown functionality of the file editt.php. The manipulation of the argument id leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-259598 is the identifier assigned to this vulnerability.
|
[] | null | 3.5
| 3.5
| 4
| null |
RHSA-2022:9070
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Arbitrary file read from a compromised content process Mozilla: Drag and Dropped Filenames could have been truncated to malicious extensions Mozilla: Memory safety bugs fixed in Firefox ESR 102.6 and Thunderbird 102.6 Mozilla: Use-after-free in WebGL Mozilla: Memory corruption in WebGL Mozilla: Use-after-free in WebGL
|
[
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
] | null | 8.1
| null | null | null |
CVE-2007-0713
|
Heap-based buffer overflow in Apple QuickTime before 7.1.5 allows remote user-assisted attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted QuickTime movie file.
|
[
"cpe:2.3:a:apple:quicktime:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:quicktime:7.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5.8
| null |
|
GHSA-9wrx-vcj7-gm99
|
A vulnerability was found in Open5GS up to 2.7.5. Affected by this vulnerability is the function ogs_pfcp_handle_create_pdr in the library lib/pfcp/handler.c of the component PFCP. The manipulation results in improper initialization. It is possible to launch the attack remotely. This attack is characterized by high complexity. The exploitation appears to be difficult. The exploit has been made public and could be used. The patch is identified as 773117aa5472af26fc9f80e608d3386504c3bdb7. It is best practice to apply a patch to resolve this issue.
|
[] | 2.9
| 3.7
| null | null | null |
|
CVE-2023-32436
|
The issue was addressed with improved bounds checks. This issue is fixed in macOS Ventura 13.3. An app may be able to cause unexpected system termination or write kernel memory.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 7.1
| null | null | null |
|
GHSA-6xpg-gw5j-9x8w
|
gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
|
[] | null | null | 5.9
| null | null |
|
CVE-2025-12946
|
Improper input validation in NETGEAR Nighthawk routers
|
A vulnerability in the speedtest feature of affected NETGEAR Nighthawk routers, caused by improper input validation, can allow attackers on the router's WAN side, using attacker-in-the-middle techniques (MiTM) to manipulate DNS responses and execute commands when speedtests are run.
This issue affects RS700: through 1.0.7.82; RAX54Sv2 : before V1.1.6.36; RAX41v2: before V1.1.6.36; RAX50: before V1.2.14.114; RAXE500: before V1.2.14.114; RAX41: before V1.0.17.142; RAX43: before V1.0.17.142; RAX35v2: before V1.0.17.142; RAXE450: before V1.2.14.114; RAX43v2: before V1.1.6.36; RAX42: before V1.0.17.142; RAX45: before V1.0.17.142; RAX50v2: before V1.1.6.36; MR90: before V1.0.2.46; MS90: before V1.0.2.46; RAX42v2: before V1.1.6.36; RAX49S: before V1.1.6.36.
|
[] | 4.4
| null | null | null | null |
CVE-2021-37469
|
In NCH WebDictate v2.13 and earlier, authenticated users can abuse logprop?file=/.. path traversal to read files on the filesystem.
|
[
"cpe:2.3:a:nch:webdictate:*:*:*:*:*:*:*:*"
] | null | 6.5
| null | 4
| null |
|
GHSA-mqcp-c96v-gj7w
|
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.4 and iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, iCloud for Windows 7.18. A file URL may be incorrectly processed.
|
[] | null | 4.3
| null | null | null |
|
GHSA-fw43-f4rv-3fjg
|
In the Linux kernel, the following vulnerability has been resolved:hfs: validate record offset in hfsplus_bmap_allochfsplus_bmap_alloc can trigger a crash if a
record offset or length is larger than node_size[ 15.264282] BUG: KASAN: slab-out-of-bounds in hfsplus_bmap_alloc+0x887/0x8b0
[ 15.265192] Read of size 8 at addr ffff8881085ca188 by task test/183
[ 15.265949]
[ 15.266163] CPU: 0 UID: 0 PID: 183 Comm: test Not tainted 6.17.0-rc2-gc17b750b3ad9 #14 PREEMPT(voluntary)
[ 15.266165] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[ 15.266167] Call Trace:
[ 15.266168] <TASK>
[ 15.266169] dump_stack_lvl+0x53/0x70
[ 15.266173] print_report+0xd0/0x660
[ 15.266181] kasan_report+0xce/0x100
[ 15.266185] hfsplus_bmap_alloc+0x887/0x8b0
[ 15.266208] hfs_btree_inc_height.isra.0+0xd5/0x7c0
[ 15.266217] hfsplus_brec_insert+0x870/0xb00
[ 15.266222] __hfsplus_ext_write_extent+0x428/0x570
[ 15.266225] __hfsplus_ext_cache_extent+0x5e/0x910
[ 15.266227] hfsplus_ext_read_extent+0x1b2/0x200
[ 15.266233] hfsplus_file_extend+0x5a7/0x1000
[ 15.266237] hfsplus_get_block+0x12b/0x8c0
[ 15.266238] __block_write_begin_int+0x36b/0x12c0
[ 15.266251] block_write_begin+0x77/0x110
[ 15.266252] cont_write_begin+0x428/0x720
[ 15.266259] hfsplus_write_begin+0x51/0x100
[ 15.266262] cont_write_begin+0x272/0x720
[ 15.266270] hfsplus_write_begin+0x51/0x100
[ 15.266274] generic_perform_write+0x321/0x750
[ 15.266285] generic_file_write_iter+0xc3/0x310
[ 15.266289] __kernel_write_iter+0x2fd/0x800
[ 15.266296] dump_user_range+0x2ea/0x910
[ 15.266301] elf_core_dump+0x2a94/0x2ed0
[ 15.266320] vfs_coredump+0x1d85/0x45e0
[ 15.266349] get_signal+0x12e3/0x1990
[ 15.266357] arch_do_signal_or_restart+0x89/0x580
[ 15.266362] irqentry_exit_to_user_mode+0xab/0x110
[ 15.266364] asm_exc_page_fault+0x26/0x30
[ 15.266366] RIP: 0033:0x41bd35
[ 15.266367] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 9f 0b 00 00 66 0f ef c0 <f3> 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8f
[ 15.266369] RSP: 002b:00007ffc9e62d078 EFLAGS: 00010283
[ 15.266371] RAX: 00007ffc9e62d100 RBX: 0000000000000000 RCX: 0000000000000000
[ 15.266372] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007ffc9e62d100
[ 15.266373] RBP: 0000400000000040 R08: 00000000000000e0 R09: 0000000000000000
[ 15.266374] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 15.266375] R13: 0000000000000000 R14: 0000000000000000 R15: 0000400000000000
[ 15.266376] </TASK>When calling hfsplus_bmap_alloc to allocate a free node, this function
first retrieves the bitmap from header node and map node using node->page
together with the offset and length from hfs_brec_lenoffHowever, if the retrieved offset or length is invalid(i.e. exceeds
node_size), the code may end up accessing pages outside the allocated
range for this node.This patch adds proper validation of both offset and length before use,
preventing out-of-bounds page access. Move is_bnode_offset_valid and
check_and_correct_requested_length to hfsplus_fs.h, as they may be
required by other functions.
|
[] | null | null | null | null | null |
|
CVE-2023-25804
|
Roxy-WI vulnerable to Limited Path Traversal in name parameter
|
Roxy-WI is a Web interface for managing Haproxy, Nginx, Apache, and Keepalived servers. Versions prior to 6.3.5.0 have a limited path traversal vulnerability. An SSH key can be saved into an unintended location, for example the `/tmp` folder using a payload `../../../../../tmp/test111_dev`. This issue has been fixed in version 6.3.5.0.
|
[
"cpe:2.3:a:roxy-wi:roxy-wi:*:*:*:*:*:*:*:*"
] | null | 7.5
| null | null | null |
This dataset, CIRCL/vulnerability-scores, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))