CIRCL/vulnerability-severity-classification-roberta-base
Text Classification • 0.1B • Updated
• 994 • 7
id stringlengths 12 47 | title stringlengths 0 256 ⌀ | description stringlengths 3 189k | cpes listlengths 0 5.42k | cvss_v4_0 float64 0 10 ⌀ | cvss_v3_1 float64 0 10 ⌀ | cvss_v3_0 float64 0 10 ⌀ | cvss_v2_0 float64 0 10 ⌀ | patch_commit_url stringlengths 38 232 ⌀ |
|---|---|---|---|---|---|---|---|---|
CVE-2021-30062 | On Schneider Electric ConneXium Tofino OPCLSM TCSEFM0000 before 03.23 and Belden Tofino Xenon Security Appliance, crafted OPC packets can bypass the OPC enforcer. | [
"cpe:2.3:o:belden:tofino_xenon_security_appliance_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:tofino_xenon_security_appliance:-:*:*:*:*:*:*:*",
"cpe:2.3:o:belden:tofino_argon_fa-tsa-220-tx\\/mm_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:belden:tofino_argon_fa-tsa-220-tx\\/mm:-:*:*:*:*:*:*:*",
"cpe:2.3:o:belden:... | null | 7.5 | null | 5 | null | |
GHSA-w6jf-24wj-w8xx | Relative Path Traversal vulnerability in James Park Analyse Uploads allows Relative Path Traversal.This issue affects Analyse Uploads: from n/a through 0.5. | [] | null | 8.6 | null | null | null | |
GHSA-wxc4-vchh-4j9x | Pure Storage FlashArray products running Purity//FA 6.2.0 - 6.2.3, 6.1.0 - 6.1.12, 6.0.0 - 6.0.8, 5.3.0 - 5.3.17, 5.2.x and prior Purity//FA releases, and Pure Storage FlashBlade products running Purity//FB 3.3.0, 3.2.0 - 3.2.4, 3.1.0 - 3.1.12, 3.0.x and prior Purity//FB releases are vulnerable to possibly exposed credentials for accessing the product’s management interface. The password may be known outside Pure Storage and could be used on an affected system, if reachable, to execute arbitrary instructions with root privileges. No other Pure Storage products or services are affected. Remediation is available from Pure Storage via a self-serve “opt-in” patch, manual patch application or a software upgrade to an unaffected version of Purity software. | [] | null | 9.8 | null | null | null | |
GHSA-94gv-43w2-9f3r | Nagios XI versions prior to 5.8.0 are vulnerable to stored cross-site scripting (XSS) via the My Tools page. Insufficient validation or escaping of user-supplied input may allow an attacker to inject and execute arbitrary script in the context of a victim's browser. | [] | 5.1 | 5.4 | null | null | null | |
CVE-2024-7414 | PDF Builder for WPForms <= 1.2.116 - Unauthenticated Full Path Disclosure | The PDF Builder for WPForms plugin for WordPress is vulnerable to Full Path Disclosure in all versions up to, and including, 1.2.116. This is due to the plugin allowing direct access to the composer-setup.php file which has display_errors on. This makes it possible for unauthenticated attackers to retrieve the full path of the web application, which can be used to aid other attacks. The information displayed is not useful on its own, and requires another vulnerability to be present for damage to an affected website. | [
"cpe:2.3:a:rednao:pdf_builder_for_wpforms:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
RHSA-2025:10179 | Red Hat Security Advisory: kernel security update | kernel: Bluetooth: Fix use after free in hci_send_acl kernel: scsi: libfc: Fix use after free in fc_exch_abts_resp() kernel: dm ioctl: prevent potential spectre v1 gadget kernel: mt76: fix use-after-free by removing a non-RCU wcid pointer kernel: um: Fix out-of-bounds read in LDT setup | [
"cpe:/o:redhat:rhel_aus:8.2::baseos"
] | null | 6 | null | null | null |
GHSA-xv72-qgpm-8gw4 | IBM Watson CP4D Data Stores 4.6.0 through 4.6.3 could allow a user with physical access and specific knowledge of the system to modify files or data on the system. IBM X-Force ID: 248415. | [] | null | 4.2 | null | null | null | |
GHSA-5x96-j797-5qqw | Sensitive Information leak via Log File in Kubernetes | In Kubernetes clusters using Ceph RBD as a storage provisioner, with logging level of at least 4, Ceph RBD admin secrets can be written to logs. This occurs in kube-controller-manager's logs during provisioning of Ceph RBD persistent claims. This affects < v1.19.3, < v1.18.10, < v1.17.13. | [] | null | 5.3 | null | null | null |
CVE-2008-3694 | Unspecified vulnerability in a certain ActiveX control in VMware Workstation 5.5.x before 5.5.8 build 108000, VMware Workstation 6.0.x before 6.0.5 build 109488, VMware Player 1.x before 1.0.8 build 108000, VMware Player 2.x before 2.0.5 build 109488, VMware ACE 1.x before 1.0.7 build 108880, VMware ACE 2.x before 2.0.5 build 109488, and VMware Server before 1.0.7 build 108231 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-3691, CVE-2008-3692, CVE-2008-3693, CVE-2008-3695, and CVE-2008-3696. | [
"cpe:2.3:a:vmware:ace:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:server:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*"
] | null | null | null | 10 | null | |
RHSA-2023:4492 | Red Hat Security Advisory: thunderbird security update | thunderbird: File Extension Spoofing using the Text Direction Override Character Mozilla: Offscreen Canvas could have bypassed cross-origin restrictions Mozilla: Incorrect value used during WASM compilation Mozilla: Potential permissions request bypass via clickjacking Mozilla: Crash in DOMParser due to out-of-memory conditions Mozilla: Fix potential race conditions when releasing platform objects Mozilla: Stack buffer overflow in StorageManager Mozilla: Cookie jar overflow caused unexpected cookie jar state Mozilla: Memory safety bugs fixed in Firefox 116, Firefox ESR 115.1, Firefox ESR 102.14, Thunderbird 115.1, and Thunderbird 102.14 Mozilla: Memory safety bugs fixed in Firefox ESR 115.1, and Thunderbird 115.1 | [
"cpe:/a:redhat:rhel_e4s:8.1::appstream"
] | null | 9.8 | null | null | null |
GHSA-qj56-qx26-7qr8 | Zoom through 5.5.4 sometimes allows attackers to read private information on a participant's screen, even though the participant never attempted to share the private part of their screen. When a user shares a specific application window via the Share Screen functionality, other meeting participants can briefly see contents of other application windows that were explicitly not shared. The contents of these other windows can (for instance) be seen for a short period of time when they overlay the shared window and get into focus. (An attacker can, of course, use a separate screen-recorder application, unsupported by Zoom, to save all such contents for later replays and analysis.) Depending on the unintentionally shared data, this short exposure of screen contents may be a more or less severe security issue. | [] | null | null | null | null | null | |
CVE-2022-26002 | A stack-based buffer overflow vulnerability exists in the console factory functionality of InHand Networks InRouter302 V3.5.4. A specially-crafted network request can lead to remote code execution. An attacker can send a sequence of malicious packets to trigger this vulnerability. | [
"cpe:2.3:o:inhandnetworks:ir302_firmware:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:h:inhandnetworks:ir302:-:*:*:*:*:*:*:*"
] | null | null | 9.1 | null | null | |
GHSA-935h-fp8w-9vph | Double free vulnerability in the j2k_read_ppm_v3 function in OpenJPEG before r2997, as used in PDFium in Google Chrome, allows remote attackers to cause a denial of service (process crash) via a crafted PDF. | [] | null | 6.5 | null | null | null | |
CVE-2013-1708 | Mozilla Firefox before 23.0 and SeaMonkey before 2.20 allow remote attackers to cause a denial of service (application crash) via a crafted WAV file that is not properly handled by the nsCString::CharAt function. | [
"cpe:2.3:a:mozilla:seamonkey:*:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*... | null | null | null | 4.3 | null | |
CVE-2020-13159 | Artica Proxy before 4.30.000000 Community Edition allows OS command injection via the Netbios name, Server domain name, dhclient_mac, Hostname, or Alias field. NOTE: this may overlap CVE-2020-10818. | [
"cpe:2.3:a:articatech:artica_proxy:*:*:*:*:community:*:*:*"
] | null | 9.8 | null | 10 | null | |
CVE-2025-7490 | PHPGurukul Vehicle Parking Management System reg-users.php sql injection | A vulnerability was found in PHPGurukul Vehicle Parking Management System 1.13. It has been classified as critical. Affected is an unknown function of the file /admin/reg-users.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 6.3 | 6.3 | 6.5 | null |
GHSA-f25c-889x-j9cc | The Tiket.com Hotel & Flight (aka com.tiket.gits) application 1.1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] | null | null | null | null | null | |
CVE-2006-6687 | Cross-site scripting (XSS) vulnerability in Web Automated Perl Portal (WebAPP) 0.9.9.4, and 0.9.9.3.4 Network Edition (NE) (aka WebAPP.NET), allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:web-app.net:webapp:0.9.9.3.4:-:network:*:*:*:*:*",
"cpe:2.3:a:web-app.net:webapp:0.9.9.4:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null | |
CVE-2006-6435 | The SNMP implementation in Xerox WorkCentre and WorkCentre Pro before 12.050.03.000, 13.x before 13.050.03.000, and 14.x before 14.050.03.000 does not generate authentication failure traps, which allows remote attackers to more easily gain system access and obtain sensitive information via a brute force attack. | [
"cpe:2.3:h:xerox:workcentre:12.060.17.000:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre:12.060.17.000:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre:13.060.17.000:*:*:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre:13.060.17.000:*:pro:*:*:*:*:*",
"cpe:2.3:h:xerox:workcentre:14.060.17.000:*:*:*:*:*:*:*",
"cpe:2.3:h:x... | null | null | null | 7.5 | null | |
GHSA-m2j7-ph2m-w822 | Wiki Server in Apple Mac OS X 10.5.8 does not restrict the file types of uploaded files, which allows remote attackers to obtain sensitive information or possibly have unspecified other impact via a crafted file, as demonstrated by a Java applet. | [] | null | null | null | null | null | |
GHSA-rrfm-6fhw-cr65 | Cross-site scripting (XSS) vulnerability in module/kb/search_word in the search module in lknSupport allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] | null | null | null | null | null | |
CVE-2024-43228 | WordPress SecuPress Free plugin <= 2.2.5.3 - Broken Access Control vulnerability | Missing Authorization vulnerability in SecuPress SecuPress Free secupress.This issue affects SecuPress Free: from n/a through <= 2.2.5.3. | [] | null | 5.3 | null | null | null |
CVE-2010-1467 | Multiple PHP remote file inclusion vulnerabilities in openUrgence Vaccin 1.03 allow remote attackers to execute arbitrary PHP code via a URL in the path_om parameter to (1) collectivite.class.php, (2) injection.class.php, (3) utilisateur.class.php, (4) droit.class.php, (5) laboratoire.class.php, (6) vaccin.class.php, (7) effetsecondaire.class.php, (8) medecin.class.php, (9) individu.class.php, and (10) profil.class.php in gen/obj/. | [
"cpe:2.3:a:francois_raynaud:openurgence_vaccin:1.03:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
GHSA-jjpr-6x73-f9v6 | The issue was addressed with improved authentication. This issue is fixed in iOS 17.7.1 and iPadOS 17.7.1, watchOS 11.1, iOS 18.1 and iPadOS 18.1. An attacker with physical access to a locked device may be able to view sensitive user information. | [] | null | 4.6 | null | null | null | |
CVE-2010-1269 | SQL injection vulnerability in auktion.php in phpscripte24 Niedrig Gebote Pro Auktions System II allows remote attackers to execute arbitrary SQL commands via the id_auk parameter. | [
"cpe:2.3:a:phpscripte24:niedrig_gebote_pro_auktions_system_ii:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
GHSA-3cm9-r84w-4v7c | Cross-site request forgery (CSRF) vulnerability in the WebGUI in FreeNAS before 0.7RC1 allows remote attackers to hijack the authentication of users for unspecified requests via unknown vectors. | [] | null | null | null | null | null | |
GHSA-58f7-f9v5-xpf2 | A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process. | [] | null | 7.8 | null | null | null | |
CVE-2019-20890 | An issue was discovered in Mattermost Server before 5.7. It allows a bypass of e-mail address discovery restrictions. | [
"cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4 | null | |
GHSA-mcph-m25j-8j63 | tj-actions/changed-files has Potential Actions command injection in output filenames (GHSL-2023-271) | SummaryThe `tj-actions/changed-files` workflow allows for command injection in changed filenames, allowing an attacker to execute arbitrary code and potentially leak secrets.DetailsThe [`changed-files`](https://github.com/tj-actions/changed-files) action returns a list of files changed in a commit or pull request which provides an `escape_json` input [enabled by default](https://github.com/tj-actions/changed-files/blob/94549999469dbfa032becf298d95c87a14c34394/action.yml#L136), only escapes `"` for JSON values.This could potentially allow filenames that contain special characters such as `;` and \` (backtick) which can be used by an attacker to take over the [GitHub Runner](https://docs.github.com/en/actions/using-github-hosted-runners/about-github-hosted-runners) if the output value is used in a raw fashion (thus being directly replaced before execution) inside a `run` block. By running custom commands an attacker may be able to steal **secrets** such as `GITHUB_TOKEN` if triggered on other events than `pull_request`. For example on `push`.Proof of ConceptSubmit a pull request to a repository with a new file injecting a command. For example `$(whoami).txt` which is a valid filename.Upon approval of the workflow (triggered by the pull request), the action will get executed and the malicious pull request filename will flow into the `List all changed files` step below.Example output:ImpactThis issue may lead to arbitrary command execution in the GitHub Runner.ResolutionA new `safe_output` input would be enabled by default and return filename paths escaping special characters like ;, ` (backtick), $, (), etc for bash environments.A safe recommendation of using environment variables to store unsafe outputs.Resources[Keeping your GitHub Actions and workflows secure Part 2: Untrusted input](https://securitylab.github.com/research/github-actions-untrusted-input/)[Keeping your GitHub Actions and workflows secure Part 1: Preventing pwn requests](https://securitylab.github.com/research/github-actions-preventing-pwn-requests/) | [] | null | 7.3 | null | null | null |
RHSA-2025:17559 | Red Hat Security Advisory: iputils security update | iputils: iputils integer overflow | [
"cpe:/a:redhat:rhel_e4s:9.2::appstream",
"cpe:/o:redhat:rhel_e4s:9.2::baseos"
] | null | 5.3 | null | null | null |
CVE-2025-12748 | Libvirt: denial of service in xml parsing | A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition. | [
"cpe:/o:redhat:enterprise_linux:10",
"cpe:/o:redhat:enterprise_linux:6",
"cpe:/o:redhat:enterprise_linux:7",
"cpe:/o:redhat:enterprise_linux:8",
"cpe:/o:redhat:enterprise_linux:9"
] | null | 5.5 | null | null | null |
GHSA-4vjw-6g94-68x5 | services/system_io/actionprocessor/Contact.rails in ConnectWise Manage 2017.5 allows arbitrary client-side JavaScript code execution (involving a ContactCommon field) on victims who click on a crafted link, aka XSS. | [] | null | null | 6.1 | null | null | |
CVE-2020-6068 | An exploitable out-of-bounds write vulnerability exists in the igcore19d.dll PNG pngread parser of the Accusoft ImageGear 19.5.0 library. A specially crafted PNG file can cause an out-of-bounds write, resulting in a remote code execution. An attacker needs to provide a malformed file to the victim to trigger the vulnerability. | [
"cpe:2.3:a:accusoft:imagegear:19.5.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null | |
CVE-2025-20046 | Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access. | [] | 7.2 | 8 | null | null | null | |
CVE-2012-3742 | Safari in Apple iOS before 6 does not properly restrict use of an unspecified Unicode character that looks similar to the https lock indicator, which allows remote attackers to spoof https connections by placing this character in the TITLE element of a web page. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:app... | null | null | null | 5 | null | |
CVE-2020-8939 | Out of Bounds read in Asylo | An out of bounds read on the enc_untrusted_inet_ntop function allows an attack to extend the result size that is used by memcpy() to read memory from within the enclave heap. We recommend upgrading past commit 6ff3b77ffe110a33a2f93848a6333f33616f02c4 | [
"cpe:2.3:a:google:asylo:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
CVE-2005-1959 | jammail.pl in jamchen JamMail 1.8 allows remote attackers to execute arbitrary commands via shell metacharacters in the mail parameter. | [
"cpe:2.3:a:jammail:jammail:1.8:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null | |
CVE-2023-50931 | An issue was discovered in savignano S/Notify before 2.0.1 for Bitbucket. While an administrative user is logged on, the configuration settings of S/Notify can be modified via a CSRF attack. The injection could be initiated by the administrator clicking a malicious link in an email or by visiting a malicious website. If executed while an administrator is logged on to Bitbucket, an attacker could exploit this to modify the configuration of the S/Notify app on that host. This can, in particular, lead to email notifications being no longer encrypted when they should be. | [
"cpe:2.3:a:savignano:s\\/notify:*:*:*:*:*:bitbucket:*:*"
] | null | 8.3 | null | null | null | |
GHSA-fgpm-pph8-mf9r | An issue was discovered in OpenEXR before 2.4.1. Because of integer overflows in CompositeDeepScanLine::Data::handleDeepFrameBuffer and readSampleCountForLineBlock, an attacker can write to an out-of-bounds pointer. | [] | null | 5.5 | null | null | null | |
GHSA-h9r7-cjmf-jrcg | Pioneer DMH-WT7600NEX Root Filesystem Insufficient Verification of Data Authenticity Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of Pioneer DMH-WT7600NEX devices. Authentication is not required to exploit this vulnerability.The specific flaw exists within the configuration of the operating system. The issue results from the lack of properly configured protection for the root file system. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26077. | [] | null | null | 4.6 | null | null | |
GHSA-8fv2-qjph-2wfj | SQL injection vulnerability in Kidus Minimati v.1.0.0 allows a remote attacker to obtain sensitive information via the edit.php component. | [] | null | 7.5 | null | null | null | |
GHSA-5hmv-vx65-78rh | SQL injection vulnerability in people/editprofile.php in Gforge 4.6 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the skill_edit[] parameter. | [] | null | null | null | null | null | |
GHSA-6fcc-v5x4-p8hr | The vpnclient program in the Easy VPN component on Cisco Adaptive Security Appliances (ASA) 5505 devices allows local users to gain privileges via unspecified vectors, aka Bug ID CSCuf85295. | [] | null | null | null | null | null | |
GHSA-5g8m-7pjc-g6vr | In Total.js 4 before 0e5ace7, /api/common/ping can achieve remote command execution via shell metacharacters in the host parameter. | [] | null | 8.8 | null | null | null | |
CVE-2023-44410 | D-Link D-View showUsers Improper Authorization Privilege Escalation Vulnerability | D-Link D-View showUsers Improper Authorization Privilege Escalation Vulnerability. This vulnerability allows remote attackers to escalate privileges on affected installations of D-Link D-View. Authentication is required to exploit this vulnerability.
The specific flaw exists within the showUsers method. The issue results from the lack of proper authorization before accessing a privileged endpoint. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user.
. Was ZDI-CAN-19535. | [
"cpe:2.3:a:d-link:d-view:*:*:*:*:*:*:*:*"
] | null | null | 8.8 | null | null |
GHSA-pp4c-2692-7f37 | Plone Cross-site Scripting (XSS) vulnerability | Cross-site scripting (XSS) vulnerability in an unspecified page template in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allows remote attackers to inject arbitrary web script or HTML via unknown vectors. | [] | 5.3 | null | 6.1 | null | null |
GHSA-cw68-r9hq-w87x | An Improper Restriction of Excessive Authentication Attempts issue was discovered in Rockwell Automation Allen-Bradley MicroLogix 1100 programmable-logic controllers 1763-L16AWA, Series A and B, Version 16.00 and prior versions; 1763-L16BBB, Series A and B, Version 16.00 and prior versions; 1763-L16BWA, Series A and B, Version 16.00 and prior versions; and 1763-L16DWD, Series A and B, Version 16.00 and prior versions and Allen-Bradley MicroLogix 1400 programmable logic controllers 1766-L32AWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWA, Series A and B, Version 16.00 and prior versions; 1766-L32BWAA, Series A and B, Version 16.00 and prior versions; 1766-L32BXB, Series A and B, Version 16.00 and prior versions; 1766-L32BXBA, Series A and B, Version 16.00 and prior versions; and 1766-L32AWAA, Series A and B, Version 16.00 and prior versions. There are no penalties for repeatedly entering incorrect passwords. | [] | null | null | 9.8 | null | null | |
CVE-2015-3691 | The Monitor Control Command Set kernel extension in the Display Drivers subsystem in Apple OS X before 10.10.4 allows attackers to execute arbitrary code in a privileged context via a crafted app that leverages control of a function pointer. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] | null | null | null | 9.3 | null | |
GHSA-9j7v-wc4q-vwx3 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Robin W bbp topic count allows DOM-Based XSS. This issue affects bbp topic count: from n/a through 3.1. | [] | null | 6.5 | null | null | null | |
GHSA-9634-hx95-7px5 | WebVPN on the Cisco Adaptive Security Appliances (ASA) device with software 8.0(4), 8.1.2, and 8.2.1 allows remote attackers to bypass certain protection mechanisms involving URL rewriting and HTML rewriting, and conduct cross-site scripting (XSS) attacks, by modifying the first hex-encoded character in a /+CSCO+ URI, aka Bug ID CSCsy80705. | [] | null | null | null | null | null | |
CVE-2007-4669 | The Services API in Firebird before 2.0.2 allows remote authenticated users without SYSDBA privileges to read the server log (firebird.log), aka CORE-1148. | [
"cpe:2.3:a:firebirdsql:firebird:*:*:*:*:*:*:*:*"
] | null | null | null | 4 | null | |
GHSA-jgwr-3qm3-26f3 | Potential remote code execution in Apache Tomcat | The fix for CVE-2020-9484 was incomplete. When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. | [] | null | 7 | null | null | null |
CVE-2012-0845 | SimpleXMLRPCServer.py in SimpleXMLRPCServer in Python before 2.6.8, 2.7.x before 2.7.3, 3.x before 3.1.5, and 3.2.x before 3.2.3 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an XML-RPC POST request that contains a smaller amount of data than specified by the Content-Length header. | [
"cpe:2.3:a:python:python:*:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:python:python:1.6:*... | null | null | null | 5 | null | |
CVE-2014-4112 | Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0304. | [
"cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"
] | null | null | 7.5 | 7.6 | null | |
GHSA-5v72-xg48-5rpm | Denial of Service in ws | Affected versions of `ws` can crash when a specially crafted `Sec-WebSocket-Extensions` header containing `Object.prototype` property names as extension or parameter names is sent.Proof of conceptRecommendationUpdate to version 3.3.1 or later. | [] | null | 7.5 | null | null | null |
GHSA-jx82-vp7q-c32c | Cross Site Scripting (XSS) vulnerability in Textpattern CMS 4.8.1 via Custom fields in the Menu Preferences feature. | [] | null | null | null | null | null | |
CVE-2025-55422 | In FoxCMS 1.2.6, there is a reflected Cross Site Scripting (XSS) vulnerability in /index.php/plus. | [] | null | 8.8 | null | null | null | |
GHSA-56c4-xfp5-vm9q | members.asp in Snitz Forums 2000 version 3.3.03 and earlier allows remote attackers to execute arbitrary code via a SQL injection attack on the parameters (1) M_NAME, (2) UserName, (3) FirstName, (4) LastName, or (5) INITIAL. | [] | null | null | null | null | null | |
GHSA-c3vw-3m8x-p7qv | Cross-Site Request Forgery (CSRF) vulnerability in Fla-shop.Com HTML5 Maps plugin <= 1.7.1.4 versions. | [] | null | 4.3 | null | null | null | |
GHSA-m5xv-3g9j-8xv7 | Cisco Unified Contact Center Express (Unified CCX) does not properly restrict the content of the CCMConfig page, which allows remote authenticated users to obtain sensitive information by examining this content, aka Bug ID CSCum95575. | [] | null | null | null | null | null | |
GHSA-q6cf-cf47-9mrq | The Nimbuzz (com.nimbuzz) application 2.0.8 and 2.0.10 for Android does not properly protect data, which allows remote attackers to read or modify a contact list via a crafted application. | [] | null | null | null | null | null | |
GHSA-rj9w-gh2x-8hf5 | Ivanti Workspace Control before 10.4.30.0, when SCCM integration is enabled, allows local users to obtain sensitive information (keying material). | [] | null | null | null | null | null | |
CVE-2019-17119 | Multiple SQL injection vulnerabilities in Logs.jsp in WiKID 2FA Enterprise Server through 4.2.0-b2053 allow authenticated users to execute arbitrary SQL commands via the source or subString parameter. | [
"cpe:2.3:a:wikidsystems:two_factor_authentication_enterprise_server:*:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.5 | null | |
CVE-2025-6794 | Marvell QConvergeConsole saveAsText Directory Traversal Remote Code Execution Vulnerability | Marvell QConvergeConsole saveAsText Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the implementation of the saveAsText method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-24913. | [] | null | null | 9.8 | null | null |
GHSA-25h7-qcgx-8445 | An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Event Logging Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1365. | [] | null | null | null | null | null | |
CVE-2022-4048 | CODESYS V3 prone to Inadequate Encryption Stregth | Inadequate Encryption Strength in CODESYS Development System V3 versions prior to V3.5.18.40 allows an unauthenticated local attacker to access and manipulate code of the encrypted boot application. | [
"cpe:2.3:a:codesys:development_system_v3:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
CVE-2023-1996 | Reflected Cross-site Scripting (XSS) vulnerability affecting Release 3DEXPERIENCE R2018x through Release 3DEXPERIENCE R2023x | A reflected Cross-site Scripting (XSS) vulnerability in Release 3DEXPERIENCE R2018x through Release 3DEXPERIENCE R2023x allows an attacker to execute arbitrary script code. | [
"cpe:2.3:a:3ds:3dexperience:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
CVE-2006-2451 | The suid_dumpable support in Linux kernel 2.6.13 up to versions before 2.6.17.4, and 2.6.16 before 2.6.16.24, allows a local user to cause a denial of service (disk consumption) and possibly gain privileges via the PR_SET_DUMPABLE argument of the prctl function and a program that causes a core dump file to be created in a directory for which the user does not have permissions. | [
"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6... | null | null | null | 4.6 | null | |
GHSA-j76x-8m9c-cm62 | Adobe Illustrator versions 26.3.1 (and earlier) and 25.4.6 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] | null | 7.8 | null | null | null | |
CVE-2024-27244 | Zoom Workplace VDI App for Windows - Insufficient Verification of Data Authenticity | Insufficient verification of data authenticity in the installer for Zoom Workplace VDI App for Windows may allow an authenticated user to conduct an escalation of privilege via local access. | [
"cpe:2.3:a:zoom:vdi_windows_meeting_client:*:*:*:*:*:*:*:*"
] | null | 6.7 | null | null | null |
GHSA-h7f2-69qh-3xqc | The Droip plugin for WordPress is vulnerable to unauthorized modification and access of data due to a missing capability check on the droip_post_apis() function in all versions up to, and including, 2.2.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform many actions as the AJAX hooks to several functions. Some potential impacts include arbitrary post deletion, arbitrary post creation, post duplication, settings update, user manipulation, and much more. | [] | null | 8.8 | null | null | null | |
CVE-2019-16400 | Samsung Galaxy S8 plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 (Android version: 4.3, Build Number: JSS15J.I9300XUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: N7100DDUFND1) devices allow attackers to send AT commands over Bluetooth, resulting in several Denial of Service (DoS) attacks. | [
"cpe:2.3:o:samsung:galaxy_s8_plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s8_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:galaxy_s3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:galaxy_note_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_note... | null | 6.5 | null | 3.3 | null | |
CVE-2020-25186 | An XXE vulnerability exists within LeviStudioU Release Build 2019-09-21 and prior when processing parameter entities, which may allow file disclosure. | [
"cpe:2.3:a:we-con:levistudiou:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null | |
CVE-2019-9873 | In several versions of JetBrains IntelliJ IDEA Ultimate, creating Task Servers configurations leads to saving a cleartext unencrypted record of the server credentials in the IDE configuration files. The issue has been fixed in the following versions: 2019.1, 2018.3.5, 2018.2.8, and 2018.1.8. | [
"cpe:2.3:a:jetbrains:intellij_idea:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | 5 | null | |
GHSA-qrr2-wwrr-wp96 | A vulnerability has been identified in SINEMA Remote Connect Server (All versions < V3.1). The affected application consists of a web service that lacks proper access control for some of the endpoints. This could lead to unauthorized access to limited information. | [] | null | 5.3 | null | null | null | |
GHSA-2pwh-xfmm-cpgr | Unauthenticated password hash disclosure in the User.getUserPWD method in eQ-3 AG Homematic CCU3 3.43.15 and earlier allows remote attackers to retrieve the GUI password hashes of GUI users. This vulnerability can be exploited by unauthenticated attackers with access to the web interface. | [] | null | null | 7.5 | null | null | |
CVE-2017-16195 | pytservce is a static file server. pytservce is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. | [
"cpe:2.3:a:pytservce_project:pytservce:1.0.0:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null | |
GHSA-88qq-68fm-2rxx | Sudo 1.7.0 through 1.7.4p3, when a Runas group is configured, does not properly handle use of the -u option in conjunction with the -g option, which allows local users to gain privileges via a command line containing a "-u root" sequence. | [] | null | null | null | null | null | |
GHSA-x8j6-qmw4-72xc | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Pascal Casier bbPress Toolkit plugin <= 1.0.12 versions. | [] | null | 7.1 | null | null | null | |
CVE-2023-33166 | Remote Procedure Call Runtime Denial of Service Vulnerability | Remote Procedure Call Runtime Denial of Service Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_11... | null | 6.5 | null | null | null |
GHSA-h9qh-wvqp-pffp | Multiple SQL injection vulnerabilities in index.php in Nullam Blog 0.1.2 allow remote attackers to execute arbitrary SQL commands via the (1) i parameter or (2) v parameters in a register action. | [] | null | null | null | null | null | |
GHSA-222q-2853-6fvc | DeluxeBB 1.07 and earlier does not properly handle a username composed of a single space character, which allows remote authenticated users to login as the "space" user, post as the guest user, and block the ability of an administrator to ban the "space" user. | [] | null | null | null | null | null | |
GHSA-rfjc-7phx-mmjf | Race condition in some Intel(R) Graphics Drivers before version 15.40.45.5126 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] | null | null | null | null | null | |
CVE-2017-16090 | fsk-server is a simple http server. fsk-server is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the url. | [
"cpe:2.3:a:fsk-server_project:fsk-server:*:*:*:*:*:node.js:*:*"
] | null | null | 7.5 | 5 | null | |
CVE-2025-43566 | ColdFusion | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (CWE-22) | ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could lead to arbitrary file system read. A high-privileged attacker could leverage this vulnerability to bypass security protections and gain unauthorized read access. Exploitation of this issue does not require user interaction and scope is changed. | [] | null | 6.8 | null | null | null |
CVE-2021-36913 | Redirection for Contact Form 7 <= 2.4.0 - Unauthenticated Options Change and Content Injection vulnerability | Unauthenticated Options Change and Content Injection vulnerability in Qube One Redirection for Contact Form 7 plugin <= 2.4.0 at WordPress allows attackers to change options and inject scripts into the footer HTML. Requires an additional extension (plugin) AccessiBe. | [
"cpe:2.3:a:redirection-for-contact-form7:redirection_for_contact_form_7:*:*:*:*:*:wordpress:*:*"
] | null | 7.5 | null | null | null |
GHSA-f3wr-m2wm-39gh | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device with the privileges of the web server. | [] | null | 4.7 | null | null | null | |
CVE-2023-24153 | A command injection vulnerability in the version parameter in the function recvSlaveCloudCheckStatus of TOTOLINK T8 V4.1.5cu allows attackers to execute arbitrary commands via a crafted MQTT packet. | [
"cpe:2.3:o:totolink:t8_firmware:v4.1.5cu:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null | |
CVE-2022-31172 | OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signers | OpenZeppelin Contracts is a library for smart contract development. Versions 4.1.0 until 4.7.1 are vulnerable to the SignatureChecker reverting. `SignatureChecker.isValidSignatureNow` is not expected to revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-1271 as expected. The contracts that may be affected are those that use `SignatureChecker` to check the validity of a signature and handle invalid signatures in a way other than reverting. The issue was patched in version 4.7.1. | [
"cpe:2.3:a:openzeppelin:contracts:*:*:*:*:*:node.js:*:*"
] | null | 7.5 | null | null | null |
CVE-2024-46055 | OpenVidReview 1.0 is vulnerable to Cross Site Scripting (XSS) in review names. | [
"cpe:2.3:a:openvidreview_project:openvidreview:1.0:*:*:*:*:*:*:*"
] | null | 4.8 | null | null | null | |
GHSA-cm5x-837x-jf3c | Division by 0 in inplace operations | ImpactAn attacker can cause a floating point exception by calling inplace operations with crafted arguments that would result in a division by 0:The [implementation](https://github.com/tensorflow/tensorflow/blob/84d053187cb80d975ef2b9684d4b61981bca0c41/tensorflow/core/kernels/inplace_ops.cc#L283) has a logic error: it should skip processing if `x` and `v` are empty but the code uses `||` instead of `&&`.PatchesWe have patched the issue in GitHub commit [e86605c0a336c088b638da02135ea6f9f6753618](https://github.com/tensorflow/tensorflow/commit/e86605c0a336c088b638da02135ea6f9f6753618).The fix will be included in TensorFlow 2.6.0. We will also cherrypick this commit on TensorFlow 2.5.1, TensorFlow 2.4.3, and TensorFlow 2.3.4, as these are also affected and still in supported range.For more informationPlease consult [our security guide](https://github.com/tensorflow/tensorflow/blob/master/SECURITY.md) for more information regarding the security model and how to contact us with issues and questions.AttributionThis vulnerability has been reported by members of the Aivul Team from Qihoo 360. | [] | 6.8 | 5.5 | null | null | null |
CVE-2011-1026 | Multiple cross-site request forgery (CSRF) vulnerabilities in Apache Archiva 1.0 through 1.2.2, and 1.3.x before 1.3.5, allow remote attackers to hijack the authentication of administrators. | [
"cpe:2.3:a:apache:archiva:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:archiva:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:archiva:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:archiva:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:archiva:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:archiva:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:ar... | null | null | null | 6.8 | null | |
GHSA-jg3h-cxcf-h3vq | In the Linux kernel, the following vulnerability has been resolved:octeon_ep: cancel queued works in probe error pathIf it fails to get the devices's MAC address, octep_probe exits while
leaving the delayed work intr_poll_task queued. When the work later
runs, it's a use after free.Move the cancelation of intr_poll_task from octep_remove into
octep_device_cleanup. This does not change anything in the octep_remove
flow, but octep_device_cleanup is called also in the octep_probe error
path, where the cancelation is needed.Note that the cancelation of ctrl_mbox_task has to follow
intr_poll_task's, because the ctrl_mbox_task may be queued by
intr_poll_task. | [] | null | 7.8 | null | null | null | |
GHSA-g9mp-5jc3-5976 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-el7-0.9.8.891. Authentication is not required to exploit this vulnerability. The specific flaw exists within loader_ajax.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9259. | [] | null | 9.8 | null | null | null | |
CVE-2021-45077 | Netgear Nighthawk R6700 version 1.0.4.120 stores sensitive information in plaintext. All usernames and passwords for the device's associated services are stored in plaintext on the device. For example, the admin password is stored in plaintext in the primary configuration file on the device. | [
"cpe:2.3:o:netgear:r6700_firmware:1.0.4.120:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r6700:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null | |
GHSA-5jgf-vj7m-2fjg | Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0. | [] | null | 5.4 | null | null | null | |
CVE-2023-40412 | The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, macOS Monterey 12.7, watchOS 10, iOS 17 and iPadOS 17. An app may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null | |
CVE-2002-2185 | The Internet Group Management Protocol (IGMP) allows local users to cause a denial of service via an IGMP membership report to a target's Ethernet address instead of the Multicast group address, which causes the target to stop sending reports to the router and effectively disconnect the group from the network. | [
"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o... | null | null | null | 4.9 | null | |
CVE-2022-2741 | can: denial-of-service can be triggered by a crafted CAN frame | The denial-of-service can be triggered by transmitting a carefully crafted CAN frame on the same CAN network as the vulnerable node. The frame must have a CAN ID matching an installed filter in the vulnerable node (this can easily be guessed based on CAN traffic analyses). The frame must contain the opposite RTR bit as what the filter installed in the vulnerable node contains (if the filter matches RTR frames, the frame must be a data frame or vice versa). | [
"cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
GHSA-7r36-jf3c-jhp4 | Duplicate Advisory: tgstation-server vulnerable to cached user logins in legacy server | Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-42r6-p4px-qvv6. This link is maintained to preserve external references.Original DescriptionIn Tgstation tgstation-server 3.2.4.0 through 3.2.1.0 (fixed in 3.2.5.0), active logins would be cached, allowing subsequent logins to succeed with any username or password. | [] | null | null | 9.8 | null | null |
This dataset, CIRCL/vulnerability-scores, comprises over 600,000 real-world vulnerabilities used to train and evaluate VLAI, a transformer-based model designed to predict software vulnerability severity levels directly from text descriptions, enabling faster and more consistent triage.
The dataset is presented in the paper VLAI: A RoBERTa-Based Model for Automated Vulnerability Severity Classification.
Project page: https://vulnerability.circl.lu Associated code: https://github.com/vulnerability-lookup/ML-Gateway
Extracted from the database of Vulnerability-Lookup.
Dumps of the data are available here.
import json
from datasets import load_dataset
dataset = load_dataset("CIRCL/vulnerability-scores")
vulnerabilities = ["CVE-2012-2339", "RHSA-2023:5964", "GHSA-7chm-34j8-4f22", "PYSEC-2024-225"]
filtered_entries = dataset.filter(lambda elem: elem["id"] in vulnerabilities)
for entry in filtered_entries["train"]:
print(json.dumps(entry, indent=4))