id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2022-40736 | An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in AP4_CttsAtom::Create in Core/Ap4CttsAtom.cpp. | [
"cpe:2.3:a:axiosys:bento4:1.6.0-639:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-2w6w-54vw-jw53 | Adobe Flash Player before 10.3.183.15 and 11.x before 11.1.102.62 on Windows, Mac OS X, Linux, and Solaris; before 11.1.111.6 on Android 2.x and 3.x; and before 11.1.115.6 on Android 4.x allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted MP4 data. | [] | null | null | null | null |
|
CVE-2018-15174 | XnView 2.45 allows remote attackers to cause a denial of service (Read Access Violation at the Instruction Pointer and application crash) or possibly have unspecified other impact via a crafted ICO file. | [
"cpe:2.3:a:xnview:xnview:2.45:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 |
|
CVE-2025-3541 | H3C Magic NX15/Magic NX30 Pro/Magic NX400/Magic R3010 HTTP POST Request getSpecs FCGI_WizardProtoProcess command injection | A vulnerability, which was classified as critical, has been found in H3C Magic NX15, Magic NX30 Pro, Magic NX400 and Magic R3010 up to V100R014. Affected by this issue is the function FCGI_WizardProtoProcess of the file /api/wizard/getSpecs of the component HTTP POST Request Handler. The manipulation leads to command injection. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. | [] | 8.6 | 8 | 8 | 7.7 |
GHSA-7m2h-6596-w2g6 | The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives. | [] | null | 9.8 | null | null |
|
CVE-2000-1072 | iCal 2.1 Patch 2 installs many files with world-writeable permissions, which allows local users to modify the iCal configuration and execute arbitrary commands by replacing the iplncal.sh program with a Trojan horse. | [
"cpe:2.3:a:netscape:iplanet_ical:2.1:patch2:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
GHSA-vfh4-5f9p-v75j | The issue was addressed with improved memory handling. This issue is fixed in macOS Sonoma 14.5, iOS 16.7.8 and iPadOS 16.7.8, iOS 17.5 and iPadOS 17.5, macOS Monterey 12.7.5, watchOS 10.5, tvOS 17.5, macOS Ventura 13.6.7, visionOS 1.2. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 8.4 | null | null |
|
CVE-2017-16342 | An attacker could send an authenticated HTTP request to trigger this vulnerability in Insteon Hub running firmware version 1012. At 0x9d01c254 the value for the s_vol_dim_delta key is copied using strcpy to the buffer at 0xa0000514. This buffer is 4 bytes large, sending anything longer will cause a buffer overflow. | [
"cpe:2.3:o:insteon:hub_firmware:1012:*:*:*:*:*:*:*",
"cpe:2.3:h:insteon:hub:-:*:*:*:*:*:*:*"
] | null | null | 8.5 | null |
|
CVE-2024-28937 | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
CVE-2022-43601 | Multiple code execution vulnerabilities exist in the IFFOutput::close() functionality of OpenImageIO Project OpenImageIO v2.4.4.2. A specially crafted ImageOutput Object can lead to a heap buffer overflow. An attacker can provide malicious input to trigger these vulnerabilities.This vulnerability arises when the `ymax` variable is set to 0xFFFF and `m_spec.format` is `TypeDesc::UINT16` | [
"cpe:2.3:a:openimageio:openimageio:2.4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
] | null | null | 8.1 | null |
|
GHSA-4h5h-76c6-8744 | Mozilla Firefox before 3.0.13, and 3.5.x before 3.5.2, allows remote attackers to spoof the address bar, and possibly conduct phishing attacks, via a crafted web page that calls window.open with an invalid character in the URL, makes document.write calls to the resulting object, and then calls the stop method during the loading of the error page. | [] | null | null | null | null |
|
CVE-2015-7322 | The Secure Meeting (Pulse Collaboration) in Pulse Connect Secure (formerly Juniper Junos Pulse) before 7.1R22.1, 7.4, 8.0 before 8.0R11, and 8.1 before 8.1R3 provides different messages for attempts to join a meeting depending on the status of the meeting, which allows remote attackers to enumerate valid meeting ids via a series of requests. | [
"cpe:2.3:a:juniper:pulse_connect_secure:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:pulse_connect_secure:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:pulse_connect_secure:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:juniper:pulse_connect_secure:8.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
GHSA-gv8w-244w-5xfq | ** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. Affected is the function cgi_move_photo of the file /cgi-bin/photocenter_mgr.cgi. The manipulation of the argument photo_name leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. | [] | 8.7 | 8.8 | null | null |
|
GHSA-fx7p-rq94-q4g9 | The Strong Testimonials WordPress plugin before 3.0.3 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [] | null | 5.4 | null | null |
|
CVE-2018-8993 | In Windows Master (aka Windows Optimization Master) 7.99.13.604, the driver file (WoptiHWDetect.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0xf1002001. | [
"cpe:2.3:a:windows_optimization_master_project:windows_optimization_master:7.99.13.604:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.1 |
|
CVE-2002-1912 | SkyStream EMR5000 1.16 through 1.18 does not drop packets or disable the Ethernet interface when the buffers are full, which allows remote attackers to cause a denial of service (null pointer exception and kernel panic) via a large number of packets. | [
"cpe:2.3:h:skystream:emr5000:1.16:*:*:*:*:*:*:*",
"cpe:2.3:h:skystream:emr5000:1.17:*:*:*:*:*:*:*",
"cpe:2.3:h:skystream:emr5000:1.18:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
GHSA-r2gp-pppj-c93j | School Equipment Monitoring System 1.0 allows SQL injection via the login screen, related to include/user.vb. | [] | null | null | 9.8 | null |
|
GHSA-5whp-jf8x-g2hr | An issue was discovered in Veritas NetBackup 8.1.x through 8.1.2, 8.2, 8.3.x through 8.3.0.2, 9.x through 9.0.0.1, and 9.1.x through 9.1.0.1 (and related NetBackup products). An attacker with unauthenticated access could remotely execute arbitrary commands on a NetBackup Primary server. | [] | null | 9.8 | null | null |
|
CVE-2019-10565 | Double free issue can happen when sensor power settings is freed by some thread while another thread try to access. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8053, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909, MSM8909W, QCN7605, QCS405, QCS605, SDM845, SDX24, SXR1130 | [
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9207c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9207c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcn7605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcn7605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2022-27577 | The vulnerability in the MSC800 in all versions before 4.15 allows for an attacker to predict the TCP initial sequence number. When the TCP sequence is predictable, an attacker can send packets that are forged to appear to come from a trusted computer. These forged packets could compromise services on the MSC800. SICK has released a new firmware version of the SICK MSC800 and recommends updating to the newest version. | [
"cpe:2.3:o:sick:msc800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:sick:msc800:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | 6.4 |
|
CVE-2021-1276 | Cisco Data Center Network Manager Certificate Validation Vulnerabilities | Multiple vulnerabilities in Cisco Data Center Network Manager (DCNM) could allow an attacker to spoof a trusted host or construct a man-in-the-middle attack to extract sensitive information or alter certain API requests. These vulnerabilities are due to insufficient certificate validation when establishing HTTPS requests with the affected device. For more information about these vulnerabilities, see the Details section of this advisory. | [
"cpe:2.3:a:cisco:data_center_network_manager:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
GHSA-rrgc-pcqf-q2jw | Pivotal Usage Service in Pivotal Application Service, versions 2.0 prior to 2.0.21 and 2.1 prior to 2.1.13 and 2.2 prior to 2.2.5, contains a bug which may allow escalation of privileges. A space developer with access to the system org may be able to access an artifact which contains the CF admin credential, allowing them to escalate to an admin role. | [] | null | null | 8.8 | null |
|
GHSA-mwgq-j58h-pv6j | A memory corruption issue was found in Artifex Ghostscript 9.50 and 9.52. Use of a non-standard PostScript operator can allow overriding of file access controls. The 'rsearch' calculation for the 'post' size resulted in a size that was too large, and could underflow to max uint32_t. This was fixed in commit 5d499272b95a6b890a1397e11d20937de000d31b. | [] | null | 9.8 | null | null |
|
PYSEC-2021-532 | null | TensorFlow is an end-to-end open source platform for machine learning. The TFLite implementation of hashtable lookup is vulnerable to a division by zero error(https://github.com/tensorflow/tensorflow/blob/1a8e885b864c818198a5b2c0cbbeca5a1e833bc8/tensorflow/lite/kernels/hashtable_lookup.cc#L114-L115) An attacker can craft a model such that `values`'s first dimension would be 0. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range. | [] | null | null | null | null |
CVE-2012-2568 | d41d8cd98f00b204e9800998ecf8427e.php in the management web server on the Seagate BlackArmor device allows remote attackers to change the administrator password via unspecified vectors. | [
"cpe:2.3:h:seagate:blackarmor_nas:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-2019-2015 | In rw_t3t_act_handle_check_rsp of rw_t3t.cc, there is a possible out-of-bound write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9Android ID: A-120503926 | [
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9.3 |
|
CVE-2007-6600 | PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, 7.4 before 7.4.19, and 7.3 before 7.3.21 uses superuser privileges instead of table owner privileges for (1) VACUUM and (2) ANALYZE operations within index functions, and supports (3) SET ROLE and (4) SET SESSION AUTHORIZATION within index functions, which allows remote authenticated users to gain privileges. | [
"cpe:2.3:a:postgresql:postgresql:7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.3.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*"
] | null | null | null | 6.5 |
|
CVE-2020-3639 | u'When a non standard SIP sigcomp message is received from the network, then there may be chances of using more UDVM cycle or memory overflow' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in APQ8009, APQ8017, APQ8037, APQ8053, MDM9250, MDM9607, MDM9628, MDM9640, MDM9650, MSM8108, MSM8208, MSM8209, MSM8608, MSM8905, MSM8909, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8996AU, QCM4290, QCM6125, QCS410, QCS4290, QCS603, QCS605, QCS610, QCS6125, QM215, QSM8350, SA415M, SA6145P, SA6150P, SA6155P, SA8150P, SA8155, SA8155P, SA8195P, SC7180, SC8180X, SC8180X+SDX55, SC8180XP, SDA429W, SDA640, SDA660, SDA670, SDA845, SDA855, SDM1000, SDM429, SDM429W, SDM439, SDM450, SDM455, SDM630, SDM632, SDM636, SDM640, SDM660, SDM670, SDM710, SDM712, SDM845, SDM850, SDX24, SDX50M, SDX55, SDX55M, SM4125, SM4250, SM4250P, SM6115, SM6115P, SM6125, SM6150, SM6150P, SM6250, SM6250P, SM7125, SM7150, SM7150P, SM7250, SM7250P, SM8150, SM8150P, SM8350, SM8350P, SXR1120, SXR1130 | [
"cpe:2.3:o:qualcomm:apq8009_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8009:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8017_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8017:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8037_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8037:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9628_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9628:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8108_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8108:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8208_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8208:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8209_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8209:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8608_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8608:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8905_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8905:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180xp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180xp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm455_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm455:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6115_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6115:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6115p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6115p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8350_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8350:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8350p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8350p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1120_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1120:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
GHSA-58xq-rpm3-xwc2 | A certain ActiveX control in Morovia Barcode ActiveX Professional 3.3.1304 allows remote attackers to overwrite arbitrary files by calling the Save method with an arbitrary filename. | [] | null | null | null | null |
|
CVE-2023-4690 | The Elementor Addon Elements plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.12.7. This is due to missing or incorrect nonce validation on the eae_save_config function. This makes it possible for unauthenticated attackers to change configuration settings for the plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*"
] | null | 5.4 | null | null |
|
CVE-2014-1716 | Cross-site scripting (XSS) vulnerability in the Runtime_SetPrototype function in runtime.cc in Google V8, as used in Google Chrome before 34.0.1847.116, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Universal XSS (UXSS)." | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2017-8622 | Windows Subsystem for Linux in Windows 10 1703 allows an elevation of privilege vulnerability when it fails to properly handle handles NT pipes, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability". | [
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] | null | null | 7.8 | 7.2 |
|
CVE-2011-0266 | Buffer overflow in nnmRptConfig.exe in HP OpenView Network Node Manager (OV NNM) 7.51 and 7.53 allows remote attackers to execute arbitrary code via a long nameParams parameter, a different vulnerability than CVE-2011-0267.2. | [
"cpe:2.3:a:hp:openview_network_node_manager:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:openview_network_node_manager:7.53:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-gc7r-v5w8-p7mh | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MultiVendorX WC Marketplace allows Stored XSS. This issue affects WC Marketplace: from n/a through 4.2.13. | [] | null | 6.5 | null | null |
|
RHSA-2014:0559 | Red Hat Security Advisory: rhevm-dwh 3.3.3 security and bug fix update | ovirt-engine-dwh: setup script logs database password in cleartext | [
"cpe:/a:redhat:rhev_manager:3"
] | null | null | null | null |
CVE-2020-2223 | Jenkins 2.244 and earlier, LTS 2.235.1 and earlier does not escape correctly the 'href' attribute of links to downstream jobs displayed in the build console page, resulting in a stored cross-site scripting vulnerability. | [
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:lts:*:*:*",
"cpe:2.3:a:jenkins:jenkins:*:*:*:*:-:*:*:*"
] | null | 5.4 | null | 3.5 |
|
CVE-2018-12626 | An issue was discovered in Eventum 3.5.0. /htdocs/popup.php has XSS via the cat parameter. | [
"cpe:2.3:a:eventum_project:eventum:*:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-f2c2-hw9j-p96c | In all Qualcomm products with Android releases from CAF using the Linux kernel, user controlled variables "nr_cmds" and "nr_bos" number are passed across functions without any check. An integer overflow to buffer overflow (with a smaller buffer allocated) may occur when they are too large or negative. | [] | null | null | 7.8 | null |
|
CVE-2019-4217 | IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 159226. | [
"cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
CVE-2008-2190 | SQL injection vulnerability in index.php in Online Rent (aka Online Rental Property Script) 4.5 and earlier allows remote attackers to execute arbitrary SQL commands via the pid parameter. NOTE: it was later reported that 5.0 and earlier are also affected. | [
"cpe:2.3:a:romedchim_international_srl:online_rent_property_script:*:*:*:*:*:*:*:*",
"cpe:2.3:a:romedchim_international_srl:online_rent_property_script:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:romedchim_international_srl:online_rent_property_script:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:romedchim_international_srl:online_rent_property_script:4.4:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-2024-2939 | Campcodes Online Examination System updateExaminee.php cross site scripting | A vulnerability classified as problematic has been found in Campcodes Online Examination System 1.0. Affected is an unknown function of the file /adminpanel/admin/facebox_modal/updateExaminee.php. The manipulation of the argument id leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-258030 is the identifier assigned to this vulnerability. | [
"cpe:2.3:a:online_examination_system_project:online_examination_system:1.0:*:*:*:*:*:*:*"
] | null | 3.5 | 3.5 | 4 |
GHSA-8m5m-rfm8-x8v8 | Employee Performance Evaluation System v1.0 was discovered to contain a persistent cross-site scripting (XSS) vulnerability via adding new entries under the Departments and Designations module. | [] | null | 4.8 | null | null |
|
CVE-2022-4802 | Authorization Bypass Through User-Controlled Key in usememos/memos | Authorization Bypass Through User-Controlled Key in GitHub repository usememos/memos prior to 0.9.1. | [
"cpe:2.3:a:usememos:memos:*:*:*:*:*:*:*:*"
] | null | null | 9.1 | null |
CVE-2019-16146 | Gophish through 0.8.0 allows XSS via a username. | [
"cpe:2.3:a:getgophish:gophish:*:*:*:*:*:*:*:*"
] | null | 4.8 | null | 3.5 |
|
CVE-2010-1557 | Multiple cross-site scripting (XSS) vulnerabilities in HP Insight Control Server Migration before 6.0 allow remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:hp:insight_control_server_migration_for_windows:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-gpjf-8g9x-jrj9 | Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) in Microsoft Exchange Server 2013 PS1, 2013 Cumulative Update 10, and 2016 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Exchange Spoofing Vulnerability." | [] | null | 6.1 | null | null |
|
CVE-2023-2459 | Inappropriate implementation in Prompts in Google Chrome prior to 113.0.5672.63 allowed a remote attacker to bypass permission restrictions via a crafted HTML page. (Chromium security severity: Medium) | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
|
GHSA-5479-gqqr-f9gj | Typo3 Vulnerable to Cache Poisoning | **Problem Description:** A request URL with arbitrary arguments, but still pointing to the home page of a TYPO3 installation can be cached if the configuration option `config.prefixLocalAnchors` is used with the values "all" or "cached". The impact of this vulnerability is that unfamiliar looking links to the home page can end up in the cache, which leads to a reload of the page in the browser when section links are followed by web page visitors, instead of just directly jumping to the requested section of the page. TYPO3 versions 4.6.x and higher are only affected if the homepage is not a shortcut to a different page.**Solution:** Removing the configuration options `config.prefixLocalAnchors` (and optionally also config.baseUrl) in favor of `config.absRefPrefix`**Credits:** Thanks to Gernot Leitgab who discovered and reported the vulnerability. | [] | null | null | null | null |
CVE-2017-9818 | The National Payments Corporation of India BHIM application 1.3 for Android relies on a four-digit passcode, which makes it easier for attackers to obtain access. | [
"cpe:2.3:a:npci:bharat_interface_for_money_\\(bhim\\):1.3:*:*:*:*:android:*:*"
] | null | null | 7.5 | 5 |
|
GHSA-6hmq-vw9f-p5pf | A NULL Pointer Dereference vulnerability in the messaging_ipc.dll component as used in Bitdefender Total Security, Internet Security, Antivirus Plus, Endpoint Security Tools, VPN Standalone allows an attacker to arbitrarily crash product processes and generate crashdump files.
This issue affects:
Bitdefender Total Security
versions prior to 26.0.3.29.
Bitdefender Internet Security
versions prior to 26.0.3.29.
Bitdefender Antivirus Plus
versions prior to 26.0.3.29.
Bitdefender Endpoint Security Tools
versions prior to 7.2.2.92.
Bitdefender VPN Standalone
versions prior to 25.5.0.48. | [] | null | 6.1 | null | null |
|
CVE-2023-47209 | A post authentication command injection vulnerability exists in the ipsec policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability. | [
"cpe:2.3:o:tp-link:er7206_firmware:1.3.0:build_20230322_rel_70591:*:*:*:*:*:*",
"cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*"
] | null | 7.2 | null | null |
|
GHSA-3x5m-g386-pxwq | fts.c in coreutils 8.4 allows local users to delete arbitrary files. | [] | null | null | 4.7 | null |
|
CVE-2023-1554 | Quick Paypal Payments < 5.7.26.4 - Admin+ Stored XSS | The Quick Paypal Payments WordPress plugin before 5.7.26.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:fullworksplugins:quick_paypal_payments:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
GHSA-r29w-p983-h7xc | Buffer overflow in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT allows local users to gain privileges via a crafted application that leverages improper handling of objects in memory, aka "Win32k Buffer Overwrite Vulnerability." | [] | null | null | null | null |
|
CVE-2016-5176 | Google Chrome before 53.0.2785.113 allows remote attackers to bypass the SafeBrowsing protection mechanism via unspecified vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
CVE-2017-10623 | Junos Space: Insufficient verification of cluster messages | Lack of authentication and authorization of cluster messages in Juniper Networks Junos Space may allow a man-in-the-middle type of attacker to intercept, inject or disrupt Junos Space cluster operations between two nodes. Affected releases are Juniper Networks Junos Space all versions prior to 17.1R1. | [
"cpe:2.3:a:juniper:junos_space:*:*:*:*:*:*:*:*"
] | null | null | 7.1 | null |
GHSA-694v-63fq-fmr4 | Path Traversal in scout-browser | Scout is a Variant Call Format (VCF) visualization interface. The Pypi package `scout-browser` is vulnerable to path traversal due to `send_file` call in versions prior to 4.52. | [] | null | null | 6.8 | null |
CVE-2019-19021 | An issue was discovered in TitanHQ WebTitan before 5.18. It has a hidden support account (with a hard-coded password) in the web administration interface, with administrator privileges. Anybody can log in with this account. | [
"cpe:2.3:a:titanhq:webtitan:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-31759 | Weak Security in the 433MHz keyfob of Kerui W18 Alarm System v1.0 allows attackers to gain full access via a code replay attack. | [
"cpe:2.3:o:keruistore:kerui_w18_firmware:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:keruistore:kerui_w18:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-w9f7-3m82-hj3j | Monero through 0.18.3.4 before ec74ff4 does not have response limits on HTTP server connections. | [] | null | 8.6 | null | null |
|
GHSA-f8vw-827h-ffmp | A stored cross-site scripting (XSS) vulnerability has been reported to affect multiple versions of QTS. If exploited, this vulnerability may allow an attacker to inject and execute scripts on the administrator console. To fix this vulnerability, QNAP recommend updating QTS to the latest version. | [] | null | null | null | null |
|
CVE-2022-24311 | A CWE-22: Improper Limitation of a Pathname to a Restricted Directory vulnerability exists that could cause modification of an existing file by inserting at beginning of file or create a new file in the context of the Data Server potentially leading to remote code execution when an attacker sends a specially crafted message. Affected Product: Interactive Graphical SCADA System Data Server (V15.0.0.22020 and prior) | [
"cpe:2.3:a:schneider-electric:interactive_graphical_scada_system_data_server:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
GHSA-pjxg-p9c7-7c3v | This is a concurrency issue that can result in the wrong caller principal being returned from the session context of an EJB that is configured with a RunAs principal. In particular, the org.jboss.as.ejb3.component.EJBComponent class has an incomingRunAsIdentity field. This field is used by the org.jboss.as.ejb3.security.RunAsPrincipalInterceptor to keep track of the current identity prior to switching to a new identity created using the RunAs principal. The exploit consist that the EJBComponent#incomingRunAsIdentity field is currently just a SecurityIdentity. This means in a concurrent environment, where multiple users are repeatedly invoking an EJB that is configured with a RunAs principal, it's possible for the wrong the caller principal to be returned from EJBComponent#getCallerPrincipal. Similarly, it's also possible for EJBComponent#isCallerInRole to return the wrong value. Both of these methods rely on incomingRunAsIdentity. Affects all versions of JBoss EAP from 7.1.0 and all versions of WildFly 11+ when Elytron is enabled. | [] | null | 5.3 | null | null |
|
CVE-2023-27613 | WordPress Forms Ada Plugin <= 1.0 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in MonitorClick Forms Ada – Form Builder plugin <= 1.0 versions. | [
"cpe:2.3:a:monitorclick:forms_ada:*:*:*:*:*:wordpress:*:*"
] | null | 7.1 | null | null |
GHSA-q45q-5233-229p | Authentication library in TYPO3 vulnerable to session fixation | Session fixation vulnerability in the authentication library in TYPO3 4.0.0 through 4.0.9, 4.1.0 through 4.1.7, and 4.2.0 through 4.2.3 allows remote attackers to hijack web sessions via unspecified vectors related to (1) frontend and (2) backend authentication. | [] | null | null | null | null |
CVE-2016-9265 | The printMP3Headers function in listmp3.c in Libming 0.4.7 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp3 file. | [
"cpe:2.3:a:libming:libming:0.4.7:*:*:*:*:*:*:*"
] | null | null | 5.5 | 4.3 |
|
CVE-2025-22748 | WordPress SetMore Theme – Custom Post Types plugin <= 1.1 - Stored Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SetMore Appointments SetMore Theme – Custom Post Types allows Stored XSS.This issue affects SetMore Theme – Custom Post Types: from n/a through 1.1. | [] | null | 6.5 | null | null |
GHSA-4c3c-6q2f-43vf | mapserv in MapServer 4.x before 4.10.4 and 5.x before 5.2.2 allows remote attackers to read arbitrary invalid .map files via a full pathname in the map parameter, which triggers the display of partial file contents within an error message, as demonstrated by a /tmp/sekrut.map symlink. | [] | null | null | null | null |
|
GHSA-7xcg-j5r4-3rmw | Vulnerability in the Oracle Storage Cloud Software Appliance product of Oracle Storage Gateway (component: Management Console). The supported version that is affected is Prior to 16.3.1.4.2. Easily exploitable vulnerability allows high privileged attacker with network access via HTTP to compromise Oracle Storage Cloud Software Appliance. While the vulnerability is in Oracle Storage Cloud Software Appliance, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Storage Cloud Software Appliance accessible data. Note: Updating the Oracle Storage Cloud Software Appliance to version 16.3.1.4.2 or later will address these vulnerabilities. Download the latest version of Oracle Storage Cloud Software Appliance from <a href=" https://www.oracle.com/downloads/cloud/oscsa-downloads.html">here. Refer to Document <a href="https://support.oracle.com/rstype=doc&id=2768897.1">2768897.1 for more details. CVSS 3.1 Base Score 4.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N). | [] | null | null | null | null |
|
RHSA-2017:0330 | Red Hat Security Advisory: qemu-kvm-rhev security update | Qemu: display: cirrus: oob access while doing bitblt copy backward mode Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo | [
"cpe:/a:redhat:openstack:8::el7"
] | null | null | 5.5 | null |
GHSA-v6rw-775r-c547 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Nik Sudan WordPress Additional Logins allows Reflected XSS. This issue affects WordPress Additional Logins: from n/a through 1.0.0. | [] | null | 7.1 | null | null |
|
CVE-2023-41132 | WordPress Category Slider for WooCommerce plugin <= 1.4.15 - Broken Access Control vulnerability | Missing Authorization vulnerability in ShapedPlugin LLC Category Slider for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Category Slider for WooCommerce: from n/a through 1.4.15. | [] | null | 4.3 | null | null |
GHSA-7f7j-96j7-54vv | TOTOLINK A800R V4.1.2cu.5137_B20200730 was discovered to contain a hardcoded password for root at /etc/shadow.sample. | [] | null | 7.8 | null | null |
|
GHSA-j6fp-rq6r-f49m | A vulnerability was found in ESAFENET CDG 5. It has been rated as critical. This issue affects the function actionPassDecryptApplication1 of the file /com/esafenet/servlet/client/DecryptApplicationService.java. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2024-10069. The vendor was contacted early about this disclosure but did not respond in any way. | [] | 5.3 | 6.3 | null | null |
|
CVE-2010-2925 | SQL injection vulnerability in index.php in Freeway CMS 1.4.3.210 allows remote attackers to execute arbitrary SQL commands via the ecPath parameter. | [
"cpe:2.3:a:openfreeway:freeway:1.4.3.210:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2023-32610 | Mailform Pro CGI 4.3.1.2 and earlier allows a remote unauthenticated attacker to cause a denial-of-service (DoS) condition. | [
"cpe:2.3:a:synck:mailform_pro_cgi:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
RHSA-2023:3950 | Red Hat Security Advisory: open-vm-tools security update | open-vm-tools: authentication bypass vulnerability in the vgauth module | [
"cpe:/a:redhat:rhel_eus:8.6::appstream"
] | null | 3.9 | null | null |
GHSA-2mfw-qmh9-qc8p | SQL injection vulnerability in d4d/statusFilter.php in Plixer Scrutinizer (aka Dell SonicWALL Scrutinizer) before 9.5.2 allows remote authenticated users to execute arbitrary SQL commands via the q parameter. | [] | null | null | null | null |
|
GHSA-2wch-qhpr-mqp5 | An un-authenticated SQL Injection exists in PuneethReddyHC online-shopping-system-advanced through the /homeaction.php cat_id parameter. Using a post request does not sanitize the user input. | [] | null | null | null | null |
|
CVE-2023-30084 | An issue found in libming swftophp v.0.4.8 allows a local attacker to cause a denial of service via the stackVal function in util/decompile.c. | [
"cpe:2.3:a:libming:libming:0.4.8:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
CVE-2008-1348 | Cross-site scripting (XSS) vulnerability in index.php in the eWebsite eWeather (Weather) module for PHP-Nuke allows remote attackers to inject arbitrary web script or HTML via the chart parameter to modules.php. | [
"cpe:2.3:a:ewebsite:eweather:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
GHSA-vgp9-fmp4-x6mh | zzcms V8.3 has a SQL injection in /user/zs_elite.php via the id parameter. | [] | null | null | 8.8 | null |
|
CVE-2005-2245 | Unknown vulnerability in F5 BIG-IP 9.0.2 through 9.1 allows attackers to "subvert the authentication of SSL transactions," via unknown attack vectors, possibly involving NATIVE ciphers. | [
"cpe:2.3:o:f5:tmos:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:f5:tmos:9.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:f5:tmos:9.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:f5:tmos:9.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:f5:tmos:9.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-2rrh-8pm2-3q2c | iTerm2 before 3.4.20 allow (potentially remote) code execution because of mishandling of certain escape sequences related to tmux integration. | [] | null | 9.8 | null | null |
|
GHSA-6p8q-94vc-wgp9 | An issue was discovered in Inspur ClusterEngine v4.0 that allows attackers to gain escalated Local privileges and execute arbitrary commands via /opt/tsce4/torque6/bin/getJobsByShell. | [] | null | 8.4 | null | null |
|
CVE-2025-20911 | Improper access control in sem_wifi service prior to SMR Mar-2025 Release 1 allows privileged local attackers to update MAC address of Galaxy Watch. | [] | null | 4.4 | null | null |
|
GHSA-q9ff-79hw-fjpp | Insufficient control flow management for the Intel(R) IPP Cryptography software before version 2021.6 may allow an authenticated user to potentially enable information disclosure via local access. | [] | null | 4.7 | null | null |
|
CVE-2023-52361 | The VerifiedBoot module has a vulnerability that may cause authentication errors.Successful exploitation of this vulnerability may affect integrity. | [
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
CVE-2021-30868 | A race condition was addressed with improved locking. This issue is fixed in macOS Monterey 12.0.1, macOS Big Sur 11.6.1. A malicious application may be able to execute arbitrary code with kernel privileges. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:12.0:*:*:*:*:*:*:*"
] | null | 7 | null | 7.6 |
|
RHSA-2019:2466 | Red Hat Security Advisory: CloudForms 4.7.8 security, bug fix and enhancement update | cfme: Improper authorization in migration log controller allows any user to access VM migration logs | [
"cpe:/a:redhat:cloudforms_managementengine:5.10::el7"
] | null | null | 4.3 | null |
CVE-2020-6246 | SAP NetWeaver AS ABAP Business Server Pages Test Application SBSPEXT_TABLE, versions 700, 701, 702, 730, 731, 740, 750, 751, 752, 753, 754, does not sufficiently encode user-controlled inputs, resulting in reflected Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:700:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:701:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:702:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:730:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:731:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:740:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:750:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:751:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:752:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:753:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_as_abap_business_server_pages:754:*:*:*:*:*:*:*"
] | null | null | 6.1 | null |
|
GHSA-qmv3-76vc-754w | The File Manager Pro WordPress plugin before 1.8.1 allows admin users to upload arbitrary files, even in environments where such a user should not be able to gain full control of the server, such as a multisite installation. This leads to remote code execution. | [] | null | 7.2 | null | null |
|
GHSA-3cj6-45x3-vrjj | Zohocorp ManageEngine OpManager and Remote Monitoring and Management versions 128329 and below are vulnerable to the authenticated remote code execution in the deploy agent option. | [] | null | 8.8 | null | null |
|
CVE-2015-0282 | GnuTLS before 3.1.0 does not verify that the RSA PKCS #1 signature algorithm matches the signature algorithm in the certificate, which allows remote attackers to conduct downgrade attacks via unspecified vectors. | [
"cpe:2.3:a:gnu:gnutls:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
RHSA-2023:5474 | Red Hat Security Advisory: bind security update | bind: stack exhaustion in control channel code may lead to DoS | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
] | null | 7.5 | null | null |
GHSA-rxvq-2cg8-7h7r | Multiple exploitable buffer overflow vulnerabilities exist in the PubNub message handler for the "cc" channel of Insteon Hub running firmware version 1012. Specially crafted commands sent through the PubNub service can cause a stack-based buffer overflow overwriting arbitrary data. An attacker should send an authenticated HTTP request to trigger this vulnerability. In cmd l_bt, at 0x9d016104, the value for the `grp` key is copied using `strcpy` to the buffer at `$sp+0x1b4`.This buffer is 8 bytes large, sending anything longer will cause a buffer overflow. | [] | null | 8.8 | null | null |
|
CVE-2019-20523 | ilchCMS 2.1.23 allows XSS via the index.php/partner/index Name parameter. | [
"cpe:2.3:a:ilch:ilch_cms:2.1.23:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 |
|
CVE-2023-38124 | Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability | Inductive Automation Ignition OPC UA Quick Client Task Scheduling Exposed Dangerous Function Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Inductive Automation Ignition. Authentication is required to exploit this vulnerability.
The specific flaw exists within the Ignition Gateway server. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Was ZDI-CAN-20541. | [
"cpe:2.3:a:inductiveautomation:ignition:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | null |
CVE-2023-49793 | Path traversal in `CodeChecker server` in the endpoint of `CodeChecker store` | CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Zip files uploaded to the server endpoint of `CodeChecker store` are not properly sanitized. An attacker, using a path traversal attack, can load and display files on the machine of `CodeChecker server`. The vulnerable endpoint is `/Default/v6.53/CodeCheckerService@massStoreRun`. The path traversal vulnerability allows reading data on the machine of the `CodeChecker server`, with the same permission level as the `CodeChecker server`.
The attack requires a user account on the `CodeChecker server`, with permission to store to a server, and view the stored report. This vulnerability has been patched in version 6.23. | [
"cpe:2.3:a:ericsson:codechecker:6.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ericsson:codechecker:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null |
GHSA-xv7p-mvh6-j6cp | A cross-site request forgery (CSRF) vulnerability in the Management Console of BlackBerry UEM versions earlier than 12.9.1 could allow an attacker to make modifications to the UEM settings in the context of a Management Console administrator. | [] | null | null | 6.5 | null |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.