id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2020-11466 | An issue was discovered in Deskpro before 2019.8.0. The /api/tickets endpoint failed to properly validate a user's privilege, allowing an attacker to retrieve arbitrary information about all helpdesk tickets stored in database with numerous filters. This leaked sensitive information to unauthorized parties. Additionally, it leaked ticket authentication code, making it possible to make changes to a ticket. | [
"cpe:2.3:a:deskpro:deskpro:*:*:*:*:*:*:*:*"
] | null | null | 7.6 | null |
|
CVE-2022-48364 | The undo_mark_statuses_as_sensitive method in app/services/approve_appeal_service.rb in Mastodon 3.5.x before 3.5.3 does not use the server's representative account, resulting in moderator identity disclosure when a moderator approves the appeal of a user whose status update was marked as sensitive. | [
"cpe:2.3:a:joinmastodon:mastodon:*:*:*:*:*:*:*:*"
] | null | 4.3 | null | null |
|
RHSA-2020:1266 | Red Hat Security Advisory: kernel security and bug fix update | kernel: heap overflow in mwifiex_update_vs_ie() function of Marvell WiFi driver | [
"cpe:/o:redhat:rhel_eus:7.5::computenode",
"cpe:/o:redhat:rhel_eus:7.5::server"
] | null | null | 8 | null |
CVE-2024-13874 | Feedify – Web Push Notifications < 2.4.6 - Reflected XSS | The Feedify WordPress plugin before 2.4.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin | [] | null | 7.1 | null | null |
GHSA-rw9w-8p85-7w9m | jmx-console/HtmlAdaptor in the jmx-console in the JBoss web application server, as shipped with Cisco Security Monitoring, Analysis and Response System (CS-MARS) before 4.2.1, allows remote attackers to gain privileges as the CS-MARS administrator and execute arbitrary Java code via an invokeOp action in the BSHDeployer jboss.scripts service name. | [] | null | null | null | null |
|
RHSA-2024:0786 | Red Hat Security Advisory: nss security update | nss: vulnerable to Minerva side-channel information leak | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 4.3 | null | null |
CVE-2011-0696 | Django 1.1.x before 1.1.4 and 1.2.x before 1.2.5 does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged AJAX requests that leverage a "combination of browser plugins and redirects," a related issue to CVE-2011-0447. | [
"cpe:2.3:a:djangoproject:django:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:djangoproject:django:1.2.4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2015-7805 | Heap-based buffer overflow in libsndfile 1.0.25 allows remote attackers to have unspecified impact via the headindex value in the header in an AIFF file. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mega-nerd:libsndfile:1.0.25:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
GHSA-2wc2-77r7-4pm8 | An issue was discovered in ksmbd in the Linux kernel before 5.19.2. fs/ksmbd/smb2pdu.c omits a kfree call in certain smb2_handle_negotiate error conditions, aka a memory leak. | [] | null | 7.5 | null | null |
|
CVE-2012-2718 | SQL injection vulnerability in the Counter module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors related to "recording visits." | [
"cpe:2.3:a:drupal-id:counter_module:-:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal-id:counter_module:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:-:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
PYSEC-2019-17 | null | In Django 1.11.x before 1.11.18, 2.0.x before 2.0.10, and 2.1.x before 2.1.5, an Improper Neutralization of Special Elements in Output Used by a Downstream Component issue exists in django.views.defaults.page_not_found(), leading to content spoofing (in a 404 error page) if a user fails to recognize that a crafted URL has malicious content. | [] | null | null | null | null |
CVE-2002-2156 | Buffer overflow in Trillian 0.73 allows remote IRC servers to execute arbitrary code via a long PING response. | [
"cpe:2.3:a:cerulean_studios:trillian:0.73:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-x49g-8r9p-vp7r | doping.php in ePing plugin 1.02 and earlier for e107 portal allows remote attackers to execute arbitrary code or overwrite files via (1) shell metacharacters in the eping_count parameter or (2) restricted shell metacharacters such as ">" and "&" in the eping_host parameter, which is not handled by the validation function. | [] | null | null | null | null |
|
CVE-2016-5678 | NUUO NVRmini 2 1.0.0 through 3.0.0 and NUUO NVRsolo 1.0.0 through 3.0.0 have hardcoded root credentials, which allows remote attackers to obtain administrative access via unspecified vectors. | [
"cpe:2.3:o:nuuo:nvrmini_2:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrmini_2:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.1.0.117:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:1.75:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.3.1.20:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.3.7.9:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.3.7.10:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:2.3.9.6:*:*:*:*:*:*:*",
"cpe:2.3:o:nuuo:nvrsolo:3.0.0:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 |
|
CVE-2007-0244 | pptpgre.c in PoPToP Point to Point Tunneling Server (pptpd) before 1.3.4 allows remote attackers to cause a denial of service (PPTP connection tear-down) via (1) GRE packets with out-of-order sequence numbers or (2) certain GRE packets that are processed using a wrong pointer and improperly dequeued. | [
"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:powerpc:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:s390:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:4.0:*:sparc:*:*:*:*:*",
"cpe:2.3:a:poptop:pptp_server:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-f62f-hw25-5gjf | ACEweb Online Portal 3.5.065 was discovered to contain an External Controlled File Path and Name vulnerability via the txtFilePath parameter in attachments.awp. | [] | null | 7.5 | null | null |
|
GHSA-wmgw-6chp-hvwh | The web interface for Lotus Notes mail automatically processes HTML in an attachment without prompting the user to save or open it, which makes it easier for remote attackers to conduct web-based attacks and steal cookies. | [] | null | null | null | null |
|
CVE-2017-2977 | Adobe Digital Editions versions 4.5.3 and earlier have an exploitable buffer over-read vulnerability. Successful exploitation could lead to information disclosure. | [
"cpe:2.3:a:adobe:digital_editions:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-92qm-hcqp-vh5r | In the doGetThumb and getThumbnail functions of MtpServer, there is a possible double free due to not NULLing out a freed pointer. This could lead to an local elevation of privilege enabling code execution as a privileged process with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: 7.0, 7.1.1, 7.1.2, 8.0, 8.1. Android ID: A-67864232. | [] | null | null | 7.8 | null |
|
GHSA-74vx-v5xg-4w53 | The default configuration of VMware Workstation 6.0.2, VMware Player 2.0.x before 2.0.3, and VMware ACE 2.0.x before 2.0.1 makes the console of the guest OS accessible through anonymous VIX API calls, which has unknown impact and attack vectors. | [] | null | null | null | null |
|
CVE-1999-1326 | wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files. | [
"cpe:2.3:a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2018-8156 | An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint, Microsoft Project Server. This CVE ID is unique from CVE-2018-8149, CVE-2018-8155, CVE-2018-8168. | [
"cpe:2.3:a:microsoft:project_server:2010:sp2:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:project_server:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-h72j-pmww-phww | A vulnerability was discovered in the Keybase Client for Windows before version 5.6.0 when a user executed the "keybase git lfs-config" command on the command-line. In versions prior to 5.6.0, a malicious actor with write access to a user’s Git repository could leverage this vulnerability to potentially execute arbitrary Windows commands on a user’s local system. | [] | null | 7.8 | null | null |
|
GHSA-pj75-2rhg-jmhv | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Samsung Galaxy S9 prior to January 2019 Security Update (SMR-JAN-2019 - SVE-2018-13467). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the ASN.1 parser. When parsing ASN.1 strings, the process does not properly validate the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7472. | [] | null | 8.8 | null | null |
|
CVE-2018-1625 | IBM Security Privileged Identity Manager Virtual Appliance 2.2.1 generates an error message that includes sensitive information about its environment, users, or associated data. IBM X-Force ID: 144410. | [
"cpe:2.3:a:ibm:security_privileged_identity_manager:2.1.1:*:*:*:*:*:*:*"
] | null | null | 4.3 | null |
|
GHSA-qw52-qmwq-9mjq | The Active Products Tables for WooCommerce. Professional products tables for WooCommerce store plugin for WordPress is vulnerable to unauthorized access of functionality due to a missing capability check on several functions in all versions up to, and including, 1.0.6.1. This makes it possible for subscribers and higher to execute functions intended for admin use. | [] | null | 4.3 | null | null |
|
RHSA-2022:6592 | Red Hat Security Advisory: kpatch-patch security update | kernel: heap overflow in nft_set_elem_init() | [
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null |
CVE-2019-9734 | Aquarius CMS through 4.3.5 writes POST and GET parameters (including passwords) to a log file due to an overwriting of configuration parameters under certain circumstances. | [
"cpe:2.3:a:aquaverde:aquarius_cms:*:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-5m47-pw5x-gvrc | Incorrect validation of files loaded from a local untrusted directory may allow local privilege escalation if the underlying operating systems is Windows. This may result in the application executing arbitrary behaviour determined by the contents of untrusted files. This issue affects MongoDB Server v5.0 versions prior to 5.0.27, MongoDB Server v6.0 versions prior to 6.0.16, MongoDB Server v7.0 versions prior to 7.0.12, MongoDB Server v7.3 versions prior 7.3.3, MongoDB C Driver versions prior to 1.26.2 and MongoDB PHP Driver versions prior to 1.18.1.Required Configuration:Only environments with Windows as the underlying operating system is affected by this issue | [] | null | 7.3 | null | null |
|
CVE-2022-38977 | The HwAirlink module has a heap overflow vulnerability.Successful exploitation of this vulnerability may cause out-of-bounds writes, resulting in modification of sensitive data. | [
"cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:2.1:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-px83-vm7h-24c2 | Vulnerability in the Siebel Core - Server Framework component of Oracle Siebel CRM (subcomponent: Services). Supported versions that are affected are 16.0 and 17.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Siebel Core - Server Framework. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Siebel Core - Server Framework accessible data as well as unauthorized read access to a subset of Siebel Core - Server Framework accessible data. CVSS 3.0 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N). | [] | null | null | 5.4 | null |
|
GHSA-fr8r-75w7-g6x8 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.0.37527. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of U3D objects in PDF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12294. | [] | null | null | null | null |
|
CVE-2023-23638 | Apache Dubbo Deserialization Vulnerability Gadgets Bypass | A deserialization vulnerability existed when dubbo generic invoke, which could lead to malicious code execution.
This issue affects Apache Dubbo 2.7.x version 2.7.21 and prior versions; Apache Dubbo 3.0.x version 3.0.13 and prior versions; Apache Dubbo 3.1.x version 3.1.5 and prior versions. | [
"cpe:2.3:a:apache:dubbo:*:*:*:*:*:*:*:*"
] | null | 5 | null | null |
CVE-2023-0938 | SourceCodester Music Gallery Site GET Request music_list.php sql injection | A vulnerability classified as critical has been found in SourceCodester Music Gallery Site 1.0. This affects an unknown part of the file music_list.php of the component GET Request Handler. The manipulation of the argument cid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221553 was assigned to this vulnerability. | [
"cpe:2.3:a:music_gallery_site_project:music_gallery_site:1.0:*:*:*:*:*:*:*"
] | null | 6.3 | 6.3 | 6.5 |
CVE-2022-0150 | WP Accessibility Helper (WAH) < 0.6.0.7 - Reflected Cross-Site Scripting (XSS) | The WP Accessibility Helper (WAH) WordPress plugin before 0.6.0.7 does not sanitise and escape the wahi parameter before outputting back its base64 decode value in the page, leading to a Reflected Cross-Site Scripting issue | [
"cpe:2.3:a:wp_accessibility_helper_project:wp_accessibility_helper:*:*:*:*:*:wordpress:*:*"
] | null | 6.1 | null | 4.3 |
GHSA-832r-6r5g-wgp7 | The OPC server in Progea Movicon before 11.3 allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted HTTP request. | [] | null | null | null | null |
|
RHSA-2012:1386 | Red Hat Security Advisory: java-1.7.0-openjdk security update | OpenJDK: java.io.FilePermission information leak (Libraries, 6631398) OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606) OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535) OpenJDK: Executors state handling issues (Concurrency, 7189103) OpenJDK: EnvHelp information disclosure (JMX, 7158796) OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975) OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522) OpenJDK: LogManager security bypass (Libraries, 7169884) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7169887) OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888) OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7163198) OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656) OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919) OpenJDK: JSSE denial of service (JSSE, 7186286) OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194) OpenJDK: disable Gopher support by default (Gopher, 7189567) OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917) OpenJDK: PropertyElementHandler insufficient access checks (Beans, 7195549) OpenJDK: MethodHandle insufficient access control checks (Libraries, 7196190) OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296) | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | null | null |
CVE-2016-3312 | ActiveSyncProvider in Microsoft Windows 10 Gold and 1511 allows attackers to discover credentials by leveraging failure of Universal Outlook to obtain a secure connection, aka "Universal Outlook Information Disclosure Vulnerability." | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:x86:*"
] | null | null | 9.1 | 5 |
|
CVE-2024-31502 | An issue in Insurance Management System v.1.0.0 and before allows a remote attacker to escalate privileges via a crafted POST request to /admin/core/new_staff. | [
"cpe:2.3:a:munyweki:insurance_management_system:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | null |
|
CVE-2023-20884 | VMware Workspace ONE Access and VMware Identity Manager contain an insecure redirect vulnerability. An unauthenticated malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure. | [
"cpe:2.3:a:vmware:identity_manager:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager:3.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:workspace_one_access:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:identity_manager_connector:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | null |
|
GHSA-4chh-684c-357m | Cross-site scripting (XSS) vulnerability in Gallery before 1.5.2 allows remote attackers to inject arbitrary web script or HTML via unknown attack vectors, possibly involving the user name (fullname). | [] | null | null | null | null |
|
GHSA-hrhq-m2x6-7mf3 | Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: FTS). Supported versions that are affected are 5.7.19 and earlier. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] | null | null | 4.9 | null |
|
CVE-2013-3122 | Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3117 and CVE-2013-3124. | [
"cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2019-10291 | Jenkins Netsparker Cloud Scan Plugin 1.1.5 and older stored credentials unencrypted in its global configuration file on the Jenkins master where they could be viewed by users with access to the master file system. | [
"cpe:2.3:a:jenkins:netsparker_cloud_scan:*:*:*:*:*:jenkins:*:*"
] | null | 8.8 | null | 4 |
|
RHSA-2003:274 | Red Hat Security Advisory: pine security update | security flaw security flaw | [
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null |
GHSA-mcvj-9rv7-4xfh | A cross-site scripting (XSS) vulnerability in DynPG version 4.9.2 allows remote attackers to inject JavaScript via the "page" parameter. | [] | null | null | null | null |
|
GHSA-px2r-h28w-3wx9 | A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to perform a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. | [] | null | 4.8 | null | null |
|
CVE-2018-2452 | The logon application of SAP NetWeaver AS Java 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50 does not sufficiently encode user-controlled inputs, resulting in a cross-site scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:netweaver_application_server_java:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.30:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.31:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_application_server_java:7.50:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2011-3214 | IOGraphics in Apple Mac OS X through 10.6.8 does not properly handle a locked-screen state in display sleep mode for an Apple Cinema Display, which allows physically proximate attackers to bypass the password requirement via unspecified vectors. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.7:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-2004-0199 | Help and Support Center in Microsoft Windows XP and Windows Server 2003 SP1 does not properly validate HCP URLs, which allows remote attackers to execute arbitrary code, as demonstrated using certain hcp:// URLs that access the DVD Upgrade capability (dvdupgrd.htm). | [
"cpe:2.3:o:microsoft:windows_2003_server:enterprise:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:enterprise_64-bit:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:r2:*:datacenter_64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:standard:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:web:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:64-bit:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp1:home:*:*:*:*:*"
] | null | null | null | 5.1 |
|
CVE-2024-1635 | Undertow: out-of-memory error after several closed connections with wildfly-http-client protocol | A vulnerability was found in Undertow. This vulnerability impacts a server that supports the wildfly-http-client protocol. Whenever a malicious user opens and closes a connection with the HTTP port of the server and then closes the connection immediately, the server will end with both memory and open file limits exhausted at some point, depending on the amount of memory available.
At HTTP upgrade to remoting, the WriteTimeoutStreamSinkConduit leaks connections if RemotingConnection is closed by Remoting ServerConnectionOpenListener. Because the remoting connection originates in Undertow as part of the HTTP upgrade, there is an external layer to the remoting connection. This connection is unaware of the outermost layer when closing the connection during the connection opening procedure. Hence, the Undertow WriteTimeoutStreamSinkConduit is not notified of the closed connection in this scenario. Because WriteTimeoutStreamSinkConduit creates a timeout task, the whole dependency tree leaks via that task, which is added to XNIO WorkerThread. So, the workerThread points to the Undertow conduit, which contains the connections and causes the leak. | [
"cpe:/a:redhat:apache_camel_spring_boot:4.4.1",
"cpe:/a:redhat:jboss_fuse:7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4",
"cpe:/a:redhat:jboss_enterprise_application_platform_eus:7.1::el7",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9",
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el7",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6::el9",
"cpe:/a:redhat:rhosemc:1.0::el8",
"cpe:/a:redhat:red_hat_single_sign_on:7.6",
"cpe:/a:redhat:serverless:1",
"cpe:/a:redhat:camel_quarkus:3",
"cpe:/a:redhat:camel_spring_boot:3",
"cpe:/a:redhat:camel_spring_boot:4",
"cpe:/a:redhat:service_registry:2",
"cpe:/a:redhat:build_keycloak:",
"cpe:/a:redhat:optaplanner:::el6",
"cpe:/a:redhat:quarkus:3",
"cpe:/a:redhat:jboss_data_grid:8",
"cpe:/a:redhat:integration:1",
"cpe:/a:redhat:camel_quarkus:2",
"cpe:/a:redhat:jboss_data_grid:7",
"cpe:/a:redhat:jboss_enterprise_application_platform:8",
"cpe:/a:redhat:jboss_fuse_service_works:6",
"cpe:/a:redhat:jboss_enterprise_bpms_platform:7",
"cpe:/a:redhat:amq_streams:1"
] | null | 7.5 | null | null |
CVE-2007-5323 | The RepliStor Server Service in EMC Replistor 6.1.3 allows remote attackers to execute arbitrary code via a size value that causes RepliStor to create a smaller buffer than expected, which triggers a buffer overflow when that buffer is used in a recv function call. | [
"cpe:2.3:a:emc:replistor:6.1.3:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2012-5097 | Unspecified vulnerability in the Oracle Access Manager component in Oracle Fusion Middleware 10.1.4.3.0, 11.1.1.5.0, and 11.1.2.0.0 allows remote attackers to affect integrity, related to OAM Webgate. | [
"cpe:2.3:a:oracle:fusion_middleware:10.1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:11.1.2.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2022-0084 | A flaw was found in XNIO, specifically in the notifyReadClosed method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up. | [
"cpe:2.3:a:redhat:integration_camel_k:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:integration_camel_quarkus:-:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:single_sign-on:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:xnio:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2023-22816 | Limited Post-Authentication Remote Command Injection in My Cloud Products | A post-authentication remote command injection vulnerability in a CGI file in Western Digital My Cloud OS 5 devices that could allow an attacker to build files with redirects and execute larger payloads.
This issue affects My Cloud OS 5 devices: before 5.26.300. | [
"cpe:2.3:a:westerndigital:my_cloud_os_5:*:*:*:*:*:android:*:*",
"cpe:2.3:a:westerndigital:my_cloud_os_5:*:*:*:*:*:iphone_os:*:*",
"cpe:2.3:o:westerndigital:my_cloud_os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_dl4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2_ultra:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_ex4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_mirror_g2:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr2100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:my_cloud_pr4100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:westerndigital:wd_cloud:-:*:*:*:*:*:*:*"
] | null | 6 | null | null |
CVE-2025-20919 | Out-of-bounds read in applying binary of video content in Samsung Notes prior to version 4.4.26.71 allows attackers to read out-of-bounds memory. | [] | null | 5.5 | null | null |
|
CVE-2013-6169 | The TLS driver in ejabberd before 2.1.12 supports (1) SSLv2 and (2) weak SSL ciphers, which makes it easier for remote attackers to obtain sensitive information via a brute-force attack. | [
"cpe:2.3:a:process-one:ejabberd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:0.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.1_2:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:process-one:ejabberd:2.1.11:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-8q4v-68hv-v55c | In the Linux kernel, the following vulnerability has been resolved:netfilter: nfnetlink: Initialise extack before use in ACKsAdd missing extack initialisation when ACKing BATCH_BEGIN and BATCH_END. | [] | null | 7.8 | null | null |
|
GHSA-r9f4-546f-w4p5 | IBM MQ for HPE NonStop 8.1.0 is vulnerable to a denial of service attack due to an error within the CCDT and channel synchronization logic. IBM X-Force ID: 235727. | [] | null | 7.5 | null | null |
|
cisco-sa-ftd-icmp-dos-hxxcycM | Cisco Firepower 4110 ICMP Flood Denial of Service Vulnerability | A vulnerability in the ICMP ingress packet processing of Cisco Firepower Threat Defense (FTD) Software for Cisco Firepower 4110 appliances could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to incomplete input validation upon receiving ICMP packets. An attacker could exploit this vulnerability by sending a high number of crafted ICMP or ICMPv6 packets to an affected device. A successful exploit could allow the attacker to cause a memory exhaustion condition that may result in an unexpected reload. No manual intervention is needed to recover the device after the reload.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is part of the October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 17 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: October 2020 Cisco ASA, FMC, and FTD Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74302"]. | [] | null | null | 8.6 | null |
CVE-2024-45473 | A vulnerability has been identified in Teamcenter Visualization V14.2 (All versions < V14.2.0.14), Teamcenter Visualization V14.3 (All versions < V14.3.0.12), Teamcenter Visualization V2312 (All versions < V2312.0008), Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:tecnomatix_plant_simulation:*:*:*:*:*:*:*:*"
] | 7.3 | 7.8 | null | null |
|
CVE-2024-24684 | Multiple stack-based buffer overflow vulnerabilities exist in the readOFF functionality of libigl v2.5.0. A specially crafted .off file can lead to stack-based buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.This vulnerability concerns the header parsing occuring while processing an `.off` file via the `readOFF` function.
We can see above that at [0] a stack-based buffer called `comment` is defined with an hardcoded size of `1000 bytes`. The call to `fscanf` at [1] is unsafe and if the first line of the header of the `.off` files is longer than 1000 bytes it will overflow the `header` buffer. | [
"cpe:2.3:a:libigl:libigl:2.5.0:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
|
CVE-2025-21415 | Azure AI Face Service Elevation of Privilege Vulnerability | Authentication bypass by spoofing in Azure AI Face Service allows an authorized attacker to elevate privileges over a network. | [] | null | 9.9 | null | null |
CVE-2021-29248 | BTCPay Server through 1.0.7.0 could allow a remote attacker to obtain sensitive information, caused by failure to set the Secure flag for a cookie. | [
"cpe:2.3:a:btcpayserver:btcpay_server:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
CVE-2019-0380 | Under certain conditions, SAP Landscape Management enterprise edition, before version 3.0, allows custom secure parameters’ default values to be part of the application logs leading to Information Disclosure. | [
"cpe:2.3:a:sap:landscape_management:3.0:*:*:*:enterprise:*:*:*"
] | null | 4.9 | null | 4 |
|
CVE-2021-26260 | An integer overflow leading to a heap-buffer overflow was found in the DwaCompressor of OpenEXR in versions before 3.0.1. An attacker could use this flaw to crash an application compiled with OpenEXR. This is a different flaw from CVE-2021-23215. | [
"cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 |
|
GHSA-xfqj-x8w6-93mr | Apple iTunes 7.0.2 allows user-assisted remote attackers to cause a denial of service (application crash) via a crafted XML list of radio stations, which results in memory corruption. NOTE: iTunes retrieves the XML document from a static URL, which requires an attacker to perform DNS spoofing or man-in-the-middle attacks for exploitation. | [] | null | null | null | null |
|
CVE-2019-14892 | A flaw was discovered in jackson-databind in versions before 2.9.10, 2.8.11.5 and 2.6.7.3, where it would permit polymorphic deserialization of a malicious object using commons-configuration 1 and 2 JNDI classes. An attacker could use this flaw to execute arbitrary code. | [
"cpe:2.3:a:fasterxml:jackson-databind:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:decision_manager:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_data_grid:-:*:*:*:text-only:*:*:*",
"cpe:2.3:a:redhat:jboss_data_grid:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_enterprise_application_platform:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:jboss_fuse:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:openshift_container_platform:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:process_automation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:geode:1.12.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | null |
|
GHSA-v5w4-prch-w5xv | In wlan, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07573480; Issue ID: ALPS07573480. | [] | null | 6.7 | null | null |
|
GHSA-2r72-fwfv-2p48 | Azure Sphere Elevation of Privilege Vulnerability This CVE ID is unique from CVE-2020-16981, CVE-2020-16989, CVE-2020-16992, CVE-2020-16993. | [] | null | 6.9 | null | null |
|
CVE-2001-0764 | Buffer overflow in ntping in scotty 2.1.0 allows local users to execute arbitrary code via a long hostname as a command line argument. | [
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:juergen_schoenwaelder:scotty:2.1.10:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-3qj9-54q8-j8jq | A vulnerability has been identified in Tecnomatix Plant Simulation V2302 (All versions < V2302.0016), Tecnomatix Plant Simulation V2404 (All versions < V2404.0005). The affected application is vulnerable to memory corruption while parsing specially crafted WRL files. An attacker could leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. | [] | 7.3 | 7.8 | null | null |
|
CVE-2020-0170 | In IMY_Event of eas_imelody.c, there is possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-127310810 | [
"cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2024-25904 | WordPress TinyMCE Professional Formats and Styles Plugin <= 1.1.2 is vulnerable to Cross Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) vulnerability in David Stockl TinyMCE and TinyMCE Advanced Professsional Formats and Styles.This issue affects TinyMCE and TinyMCE Advanced Professsional Formats and Styles: from n/a through 1.1.2.
| [] | null | 4.3 | null | null |
GHSA-xmqc-9cfr-hg4r | A vulnerability was found in DedeCMS 5.7. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /src/dede/makehtml_spec.php. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258919. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 4.3 | null | null |
|
GHSA-r53f-vv7w-9v58 | SAP Web Dispatcher versions - 7.49, 7.53, 7.77, 7.81, KRNL64NUC - 7.22, 7.22EXT, 7.49, KRNL64UC -7.22, 7.22EXT, 7.49, 7.53, KERNEL - 7.22, 7.49, 7.53, 7.77, 7.81, 7.83 processes allow an unauthenticated attacker to submit a malicious crafted request over a network to a front-end server which may, over several attempts, result in a back-end server confusing the boundaries of malicious and legitimate messages. This can result in the back-end server executing a malicious payload which can be used to read or modify any information on the server or consume server resources making it temporarily unavailable. | [] | null | 9.4 | null | null |
|
GHSA-6rc2-m2cx-8vx2 | Microsoft Windows Media Player (WMP) 11.0.5721.5230 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted WAV file. | [] | null | null | null | null |
|
CVE-2019-11036 | Heap over-read in PHP EXIF extension | When processing certain files, PHP EXIF extension in versions 7.1.x below 7.1.29, 7.2.x below 7.2.18 and 7.3.x below 7.3.5 can be caused to read past allocated buffer in exif_process_IFD_TAG function. This may lead to information disclosure or crash. | [
"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:28:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] | null | null | 4.8 | null |
CVE-1999-0690 | HP CDE program includes the current directory in root's PATH variable. | [
"cpe:2.3:a:cde:cde:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-c8wq-8x3g-w4wh | An unspecified ActiveX control in McAfee Virtual Technician (MVT) before 6.4, and ePO-MVT, allows remote attackers to execute arbitrary code or cause a denial of service (Internet Explorer crash) via a crafted web site. | [] | null | null | null | null |
|
GHSA-6m27-xv89-hqvx | The get_value function in epan/dissectors/packet-btatt.c in the Bluetooth Attribute (aka BT ATT) dissector in Wireshark 2.0.x before 2.0.1 uses an incorrect integer data type, which allows remote attackers to cause a denial of service (invalid write operation and application crash) via a crafted packet. | [] | null | null | 5.5 | null |
|
GHSA-r2f8-jcm8-g23c | An issue was discovered on WyreStorm Apollo VX20 devices before 1.3.58. Remote attackers can discover cleartext passwords via a SoftAP /device/config GET request. | [] | null | 9.1 | null | null |
|
GHSA-pp3r-96j3-85hh | Vulnerability in the Oracle iSupplier Portal product of Oracle E-Business Suite (component: Accounts). Supported versions that are affected are 12.1.3 and 12.2.5-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iSupplier Portal. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle iSupplier Portal accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). | [] | null | null | null | null |
|
CVE-2019-12980 | In Ming (aka libming) 0.4.8, there is an integer overflow (caused by an out-of-range left shift) in the SWFInput_readSBits function in blocks/input.c. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted swf file. | [
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 |
|
CVE-2019-11784 | Improper access control in mail module (notifications) in Odoo Community 14.0 and earlier and Odoo Enterprise 14.0 and earlier, allows remote authenticated users to obtain access to arbitrary messages in conversations they were not a party to. | [
"cpe:2.3:a:odoo:odoo:*:*:*:*:community:*:*:*",
"cpe:2.3:a:odoo:odoo:*:*:*:*:enterprise:*:*:*"
] | null | null | 6.5 | null |
|
CVE-2022-28078 | Home Owners Collection Management v1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability in the Admin panel via the $_GET['page'] parameter. | [
"cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2019-14295 | An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory. | [
"cpe:2.3:a:upx_project:upx:3.95:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2023-0405 | GPT3 AI Content Writer < 1.4.38 - Subscriber+ Arbitrary Post Content Update | The GPT AI Power: Content Writer & ChatGPT & Image Generator & WooCommerce Product Writer & AI Training WordPress plugin before 1.4.38 does not perform any kind of nonce or privilege checks before letting logged-in users modify arbitrary posts. | [
"cpe:2.3:a:gptaipower:gpt_ai_power:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-fmw8-4xqq-qh9j | Out-of-bounds write in the PCX image codec in QNX SDP versions 8.0, 7.1 and 7.0 could allow an unauthenticated attacker to cause a denial-of-service condition or execute code in the context of the process using the image codec. | [] | null | 9.8 | null | null |
|
RHSA-2020:0861 | Red Hat Security Advisory: Red Hat JBoss Web Server 3.1 Service Pack 8 security update | tomcat: XSS in SSI printenv tomcat: local privilege escalation tomcat: Session fixation when using FORM authentication tomcat: Apache Tomcat AJP File Read/Inclusion Vulnerability | [
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
"cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7"
] | null | 7.6 | 5 | null |
CVE-2023-41750 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 32047. | [
"cpe:2.3:a:acronis:agent:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | null | 3.3 | null |
|
CVE-2015-0636 | The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (disrupted domain access) via spoofed AN messages that reset a finite state machine, aka Bug ID CSCup62293. | [
"cpe:2.3:o:cisco:ios_xe:3.10s.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.12s.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:3.13s.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ird1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)ire3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2\\(44\\)sq1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4\\(25e\\)jap1m:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.4\\(25e\\)jaz1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.0\\(2\\)ed1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(1\\)ex:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.2\\(2\\)jb1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)ja1n:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jab1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jn:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(1\\)s3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:15.4\\(3\\)s:*:*:*:*:*:*:*"
] | null | null | null | 7.8 |
|
CVE-2023-26295 | Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges. | [
"cpe:2.3:a:hp:hp_device_manager:5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:hp_device_manager:5.0.9:*:*:*:*:*:*:*"
] | null | 9.8 | null | null |
|
GHSA-3x73-p8v6-p37w | A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. | [] | null | null | 9.8 | null |
|
GHSA-67xw-6rf9-mrg6 | zgv 5.5.3 allows remote attackers to cause a denial of service (application crash via segmentation fault) via crafted multiple-image (animated) GIF images. | [] | null | null | null | null |
|
CVE-2022-4578 | Video Conferencing with Zoom < 4.0.10 - Contributor+ Stored XSS | The Video Conferencing with Zoom WordPress plugin before 4.0.10 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [
"cpe:2.3:a:video_conferencing_with_zoom_project:video_conferencing_with_zoom:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
GHSA-3m29-3g62-m96p | Rejected reason: Not used | [] | null | null | null | null |
|
GHSA-cmv9-rhxg-f4xc | An issue was discovered in function nl80211_send_chandef in rtl8812au v5.6.4.2 allows attackers to cause a denial of service. | [] | null | 7.5 | null | null |
|
CVE-2010-1237 | Google Chrome 4.1 BETA before 4.1.249.1036 allows remote attackers to cause a denial of service (memory error) or possibly have unspecified other impact via an empty SVG element. | [
"cpe:2.3:a:google:chrome:4.1.249.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1001:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1004:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1006:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1007:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1008:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1009:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1010:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1011:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1012:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1013:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1014:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1015:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1016:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1017:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1018:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1019:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1020:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1021:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1022:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1023:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1024:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1025:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1026:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1027:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1028:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1029:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1030:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1031:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1032:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1033:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1034:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:4.1.249.1035:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2013-5803 | Unspecified vulnerability in Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 and earlier, JRockit R27.7.6 and earlier, and Java SE Embedded 7u40 and earlier allows remote attackers to affect availability via vectors related to JGSS. | [
"cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r27.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update60:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.6.0:update51:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.6.0:update_9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:*:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.5.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:r28.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:*:update51:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update36:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update40:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.5.0:update45:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update11_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update28:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update7_b03:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*"
] | null | null | null | 2.6 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.