id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
139k
| cpes
sequencelengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2017-17725 | In Exiv2 0.26, there is an integer overflow leading to a heap-based buffer over-read in the Exiv2::getULong function in types.cpp. Remote attackers can exploit the vulnerability to cause a denial of service via a crafted image file. Note that this vulnerability is different from CVE-2017-14864, which is an invalid memory address dereference. | [
"cpe:2.3:a:exiv2:exiv2:0.26:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4.3 |
|
GHSA-rh54-rh9r-p3ph | In the Linux kernel, the following vulnerability has been resolved:net/mlx5e: Fix netif state handlingmlx5e_suspend cleans resources only if netif_device_present() returns
true. However, mlx5e_resume changes the state of netif, via
mlx5e_nic_enable, only if reg_state == NETREG_REGISTERED.
In the below case, the above leads to NULL-ptr Oops[1] and memory
leaks:mlx5e_probe
_mlx5e_resume
mlx5e_attach_netdev
mlx5e_nic_enable <-- netdev not reg, not calling netif_device_attach()
register_netdev <-- failed for some reason.
ERROR_FLOW:
_mlx5e_suspend <-- netif_device_present return false, resources aren't freed :(Hence, clean resources in this case as well.[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9345 Comm: test-ovs-ct-gen Not tainted 6.5.0_for_upstream_min_debug_2023_09_05_16_01 #1
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at0xffffffffffffffd6.
RSP: 0018:ffff888178aaf758 EFLAGS: 00010246
Call Trace:
<TASK>
? __die+0x20/0x60
? page_fault_oops+0x14c/0x3c0
? exc_page_fault+0x75/0x140
? asm_exc_page_fault+0x22/0x30
notifier_call_chain+0x35/0xb0
blocking_notifier_call_chain+0x3d/0x60
mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
mlx5_core_uplink_netdev_event_replay+0x3e/0x60 [mlx5_core]
mlx5_mdev_netdev_track+0x53/0x60 [mlx5_ib]
mlx5_ib_roce_init+0xc3/0x340 [mlx5_ib]
__mlx5_ib_add+0x34/0xd0 [mlx5_ib]
mlx5r_probe+0xe1/0x210 [mlx5_ib]
? auxiliary_match_id+0x6a/0x90
auxiliary_bus_probe+0x38/0x80
? driver_sysfs_add+0x51/0x80
really_probe+0xc9/0x3e0
? driver_probe_device+0x90/0x90
__driver_probe_device+0x80/0x160
driver_probe_device+0x1e/0x90
__device_attach_driver+0x7d/0x100
bus_for_each_drv+0x80/0xd0
__device_attach+0xbc/0x1f0
bus_probe_device+0x86/0xa0
device_add+0x637/0x840
__auxiliary_device_add+0x3b/0xa0
add_adev+0xc9/0x140 [mlx5_core]
mlx5_rescan_drivers_locked+0x22a/0x310 [mlx5_core]
mlx5_register_device+0x53/0xa0 [mlx5_core]
mlx5_init_one_devl_locked+0x5c4/0x9c0 [mlx5_core]
mlx5_init_one+0x3b/0x60 [mlx5_core]
probe_one+0x44c/0x730 [mlx5_core]
local_pci_probe+0x3e/0x90
pci_device_probe+0xbf/0x210
? kernfs_create_link+0x5d/0xa0
? sysfs_do_create_link_sd+0x60/0xc0
really_probe+0xc9/0x3e0
? driver_probe_device+0x90/0x90
__driver_probe_device+0x80/0x160
driver_probe_device+0x1e/0x90
__device_attach_driver+0x7d/0x100
bus_for_each_drv+0x80/0xd0
__device_attach+0xbc/0x1f0
pci_bus_add_device+0x54/0x80
pci_iov_add_virtfn+0x2e6/0x320
sriov_enable+0x208/0x420
mlx5_core_sriov_configure+0x9e/0x200 [mlx5_core]
sriov_numvfs_store+0xae/0x1a0
kernfs_fop_write_iter+0x10c/0x1a0
vfs_write+0x291/0x3c0
ksys_write+0x5f/0xe0
do_syscall_64+0x3d/0x90
entry_SYSCALL_64_after_hwframe+0x46/0xb0
CR2: 0000000000000000
---[ end trace 0000000000000000 ]--- | [] | null | 5.5 | null | null |
|
GHSA-jwmw-wgxx-rh88 | This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Foxit Reader 9.2.0.9297. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the removeInstance event. The issue results from the lack of validation of the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-6500. | [] | null | null | 8.8 | null |
|
GHSA-w8hp-x9c3-2p78 | Huawei OceanStor 5600 V3 with V300R003C00C10 and earlier versions allows attackers with administrator privilege to inject a command into a specific command's parameters, and run this injected command with root privilege. | [] | null | null | 7.2 | null |
|
GHSA-wwqc-fg9m-7c4c | The Asus ZenFone 3s Max Android device with a build fingerprint of asus/IN_X00G/ASUS_X00G_1:7.0/NRD90M/IN_X00G-14.02.1807.33-20180706:user/release-keys contains a pre-installed app with a package name of com.asus.loguploaderproxy app (versionCode=1570000020, versionName=7.0.0.4_170901) that allows other pre-installed apps to perform command execution via an accessible app component. This capability can be accessed by any pre-installed app on the device which can obtain signatureOrSystem permissions that are required by other other pre-installed apps that exported their capabilities to other pre-installed app. | [] | null | null | null | null |
|
CVE-2023-26961 | Alteryx Server 2022.1.1.42590 does not employ file type verification for uploaded files. This vulnerability allows attackers to upload arbitrary files (e.g., JavaScript content for stored XSS) via the type field in a JSON document within a PUT /gallery/api/media request. | [
"cpe:2.3:a:alteryx:alteryx_server:2022.1.1.42590:*:*:*:*:*:*:*"
] | null | 4.8 | null | null |
|
CVE-2010-1132 | The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message. | [
"cpe:2.3:a:georg_greve:spamassassin_milter_plugin:0.3.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
|
CVE-2023-31920 | Jerryscript 3.0 (commit 05dbbd1) was discovered to contain an Assertion Failure via the vm_loop at jerry-core/vm/vm.c. | [
"cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*"
] | null | 5.5 | null | null |
|
GHSA-3r7x-vv9v-4xqg | SQL injection vulnerability in index.php in Invision Power Board allows remote attackers to execute arbitrary SQL commands via the pid parameter in a reputation action. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] | null | null | null | null |
|
CVE-2016-6597 | Sophos EAS Proxy before 6.2.0 for Sophos Mobile Control, when Lotus Traveler is enabled, allows remote attackers to access arbitrary web-resources from the backend mail system via a request for the resource, aka an Open Reverse Proxy vulnerability. | [
"cpe:2.3:a:sophos:mobile_control_eas_proxy:*:*:*:*:*:*:*:*"
] | null | null | 8.6 | 5 |
|
CVE-2021-47299 | xdp, net: Fix use-after-free in bpf_xdp_link_release | In the Linux kernel, the following vulnerability has been resolved:
xdp, net: Fix use-after-free in bpf_xdp_link_release
The problem occurs between dev_get_by_index() and dev_xdp_attach_link().
At this point, dev_xdp_uninstall() is called. Then xdp link will not be
detached automatically when dev is released. But link->dev already
points to dev, when xdp link is released, dev will still be accessed,
but dev has been released.
dev_get_by_index() |
link->dev = dev |
| rtnl_lock()
| unregister_netdevice_many()
| dev_xdp_uninstall()
| rtnl_unlock()
rtnl_lock(); |
dev_xdp_attach_link() |
rtnl_unlock(); |
| netdev_run_todo() // dev released
bpf_xdp_link_release() |
/* access dev. |
use-after-free */ |
[ 45.966867] BUG: KASAN: use-after-free in bpf_xdp_link_release+0x3b8/0x3d0
[ 45.967619] Read of size 8 at addr ffff00000f9980c8 by task a.out/732
[ 45.968297]
[ 45.968502] CPU: 1 PID: 732 Comm: a.out Not tainted 5.13.0+ #22
[ 45.969222] Hardware name: linux,dummy-virt (DT)
[ 45.969795] Call trace:
[ 45.970106] dump_backtrace+0x0/0x4c8
[ 45.970564] show_stack+0x30/0x40
[ 45.970981] dump_stack_lvl+0x120/0x18c
[ 45.971470] print_address_description.constprop.0+0x74/0x30c
[ 45.972182] kasan_report+0x1e8/0x200
[ 45.972659] __asan_report_load8_noabort+0x2c/0x50
[ 45.973273] bpf_xdp_link_release+0x3b8/0x3d0
[ 45.973834] bpf_link_free+0xd0/0x188
[ 45.974315] bpf_link_put+0x1d0/0x218
[ 45.974790] bpf_link_release+0x3c/0x58
[ 45.975291] __fput+0x20c/0x7e8
[ 45.975706] ____fput+0x24/0x30
[ 45.976117] task_work_run+0x104/0x258
[ 45.976609] do_notify_resume+0x894/0xaf8
[ 45.977121] work_pending+0xc/0x328
[ 45.977575]
[ 45.977775] The buggy address belongs to the page:
[ 45.978369] page:fffffc00003e6600 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4f998
[ 45.979522] flags: 0x7fffe0000000000(node=0|zone=0|lastcpupid=0x3ffff)
[ 45.980349] raw: 07fffe0000000000 fffffc00003e6708 ffff0000dac3c010 0000000000000000
[ 45.981309] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000
[ 45.982259] page dumped because: kasan: bad access detected
[ 45.982948]
[ 45.983153] Memory state around the buggy address:
[ 45.983753] ffff00000f997f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 45.984645] ffff00000f998000: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 45.985533] >ffff00000f998080: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 45.986419] ^
[ 45.987112] ffff00000f998100: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 45.988006] ffff00000f998180: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
[ 45.988895] ==================================================================
[ 45.989773] Disabling lock debugging due to kernel taint
[ 45.990552] Kernel panic - not syncing: panic_on_warn set ...
[ 45.991166] CPU: 1 PID: 732 Comm: a.out Tainted: G B 5.13.0+ #22
[ 45.991929] Hardware name: linux,dummy-virt (DT)
[ 45.992448] Call trace:
[ 45.992753] dump_backtrace+0x0/0x4c8
[ 45.993208] show_stack+0x30/0x40
[ 45.993627] dump_stack_lvl+0x120/0x18c
[ 45.994113] dump_stack+0x1c/0x34
[ 45.994530] panic+0x3a4/0x7d8
[ 45.994930] end_report+0x194/0x198
[ 45.995380] kasan_report+0x134/0x200
[ 45.995850] __asan_report_load8_noabort+0x2c/0x50
[ 45.996453] bpf_xdp_link_release+0x3b8/0x3d0
[ 45.997007] bpf_link_free+0xd0/0x188
[ 45.997474] bpf_link_put+0x1d0/0x218
[ 45.997942] bpf_link_release+0x3c/0x58
[ 45.998429] __fput+0x20c/0x7e8
[ 45.998833] ____fput+0x24/0x30
[ 45.999247] task_work_run+0x104/0x258
[ 45.999731] do_notify_resume+0x894/0xaf8
[ 46.000236] work_pending
---truncated--- | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.14:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null |
GHSA-4vh6-rxvj-rwh4 | An issue was discovered on D-Link DSL-2640B B2 EU_4.01B devices. Authentication can be bypassed when accessing cgi modules. This allows one to perform administrative tasks (e.g., modify the admin password) with no authentication. | [] | null | null | null | null |
|
CVE-2021-34588 | Bender Charge Controller: Unprotected data export | In Bender/ebee Charge Controllers in multiple versions are prone to unprotected data export. Backup export is protected via a random key. The key is set at user login. It is empty after reboot . | [
"cpe:2.3:o:bender:cc612_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bender:cc612:-:*:*:*:*:*:*:*",
"cpe:2.3:o:bender:icc15xx_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bender:cc613:-:*:*:*:*:*:*:*"
] | null | 8.6 | null | null |
CVE-2009-1232 | Mozilla Firefox 3.0.8 and earlier 3.0.x versions allows remote attackers to cause a denial of service (memory corruption) via an XML document composed of a long series of start-tags with no corresponding end-tags. NOTE: it was later reported that 3.0.10 and earlier are also affected. | [
"cpe:2.3:a:mozilla:firefox:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.0.8:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2005-3452 | Unspecified vulnerability in Web Cache in Oracle Application Server 1.0 up to 9.0.4.2 has unknown impact and attack vectors, as identified by Oracle Vuln# AS13. | [
"cpe:2.3:a:oracle:application_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:1.0.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:application_server:9.0.4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
GHSA-v86p-p58r-p852 | An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, tvOS 16.2, watchOS 9.2. An app may be able to execute arbitrary code with kernel privileges. | [] | null | 7.8 | null | null |
|
GHSA-2j7j-jvr9-h35r | Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information. | [] | null | null | null | null |
|
GHSA-q9hf-xxg3-957g | Multiple SQL injection vulnerabilities in the orion.extfeedbackform module before 2.1.3 for Bitrix allow remote authenticated users to execute arbitrary SQL commands via the (1) order or (2) "by" parameter to admin/orion.extfeedbackform_efbf_forms.php. | [] | null | null | 8.8 | null |
|
GHSA-wh42-8r2w-873x | Magento Open Source allows XML Injection | Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an XML Injection vulnerability. An attacker with low privileges can trigger a specially crafted script to a security feature bypass. Exploitation of this issue does not require user interaction. | [] | 4.9 | 6.5 | null | null |
CVE-2019-17049 | NETGEAR SRX5308 4.3.5-3 devices allow SQL Injection, as exploited in the wild in September 2019 to add a new user account. | [
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 |
|
CVE-2013-2174 | Heap-based buffer overflow in the curl_easy_unescape function in lib/escape.c in cURL and libcurl 7.7 through 7.30.0 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted string ending in a "%" (percent) character. | [
"cpe:2.3:a:haxx:curl:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.29.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:7.30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.10.8:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.14.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.15.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.16.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.17.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.18.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.19.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.20.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.20.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.2:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.3:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.4:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.5:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.6:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.21.7:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.22.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.23.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.24.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.25.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.26.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.27.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.28.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.28.1:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.29.0:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:libcurl:7.30.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:10.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:-:lts:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:opensuse:11.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
GHSA-m7cp-cc3g-rq5q | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution. | [] | null | null | null | null |
|
CVE-2022-22151 | CAMS for HIS Log Server contained in the following Yokogawa Electric products fails to properly neutralize log outputs: CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, and Exaopc versions from R3.72.00 to R3.79.00. | [
"cpe:2.3:o:yokogawa:centum_cs_3000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_cs_3000_entry_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_cs_3000_entry:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_vp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_vp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:yokogawa:centum_vp_entry_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:yokogawa:centum_vp_entry:-:*:*:*:*:*:*:*",
"cpe:2.3:a:yokogawa:exaopc:*:*:*:*:*:*:*:*"
] | null | 8.1 | null | 4.9 |
|
CVE-2007-3496 | Cross-site scripting (XSS) vulnerability in SAP Web Dynpro Java (BC-WD-JAV) in SAP NetWeaver Nw04 SP15 through SP19 and Nw04s SP7 through SP11, aka SAP Java Technology Services 640 before SP20 and SAP Web Dynpro Runtime Core Components 700 before SP12, allows remote attackers to inject arbitrary web script or HTML via the User-Agent HTTP header. | [
"cpe:2.3:a:sap:netweaver_nw04:sp15:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp16:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp17:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp18:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04:sp19:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp7:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp8:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp9:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp10:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:netweaver_nw04s:sp11:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_basis_component_640:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sap:sap_basis_component_700:*:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
RHSA-2024:4041 | Red Hat Security Advisory: OpenShift Container Platform 4.15.19 bug fix and security update | golang: net/http, x/net/http2: unlimited number of CONTINUATION frames causes DoS jose-go: improper handling of highly compressed data | [
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 4.3 | null | null |
CVE-2018-0511 | Cross-site scripting vulnerability in WP Retina 2x prior to version 5.2.2 allows an attacker to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:meowapps:wp_retina_2x:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 |
|
GHSA-wwj3-573j-rvvm | Magento Open Source Improper Authorization vulnerability | Adobe Commerce versions 2.4.7, 2.4.6-p5, 2.4.5-p7, 2.4.4-p8 and earlier are affected by an Improper Authorization vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access, leading to both confidentiality and integrity impact. Exploitation of this issue does not require user interaction. | [] | 8.7 | 8.2 | null | null |
GHSA-ggrx-pp2h-rw56 | CA Clarity 15.8 and below and 15.9.0 contain an insecure XML parsing vulnerability that could allow a remote attacker to potentially view the contents of any file on the system. | [] | null | 7.5 | null | null |
|
GHSA-vwcr-cpgw-p977 | A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been classified as critical. This affects the function sprintf of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_mount leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced. | [] | 5.3 | 6.3 | null | null |
|
GHSA-r737-4vhq-r95j | An issue was discovered on Samsung mobile devices with M(6.x) and N(7.x) software. There is information disclosure of the kbase_context address of a GPU memory node. The Samsung ID is SVE-2017-8907 (December 2017). | [] | null | null | null | null |
|
GHSA-fcp2-76rf-pjrc | In the Linux kernel, the following vulnerability has been resolved:svcrdma: fix miss destroy percpu_counter in svc_rdma_proc_init()There's issue as follows:
RPC: Registered rdma transport module.
RPC: Registered rdma backchannel transport module.
RPC: Unregistered rdma transport module.
RPC: Unregistered rdma backchannel transport module.
BUG: unable to handle page fault for address: fffffbfff80c609a
PGD 123fee067 P4D 123fee067 PUD 123fea067 PMD 10c624067 PTE 0
Oops: Oops: 0000 [#1] PREEMPT SMP KASAN NOPTI
RIP: 0010:percpu_counter_destroy_many+0xf7/0x2a0
Call Trace:
<TASK>
__die+0x1f/0x70
page_fault_oops+0x2cd/0x860
spurious_kernel_fault+0x36/0x450
do_kern_addr_fault+0xca/0x100
exc_page_fault+0x128/0x150
asm_exc_page_fault+0x26/0x30
percpu_counter_destroy_many+0xf7/0x2a0
mmdrop+0x209/0x350
finish_task_switch.isra.0+0x481/0x840
schedule_tail+0xe/0xd0
ret_from_fork+0x23/0x80
ret_from_fork_asm+0x1a/0x30
</TASK>If register_sysctl() return NULL, then svc_rdma_proc_cleanup() will not
destroy the percpu counters which init in svc_rdma_proc_init().
If CONFIG_HOTPLUG_CPU is enabled, residual nodes may be in the
'percpu_counters' list. The above issue may occur once the module is
removed. If the CONFIG_HOTPLUG_CPU configuration is not enabled, memory
leakage occurs.
To solve above issue just destroy all percpu counters when
register_sysctl() return NULL. | [] | null | 5.5 | null | null |
|
CVE-2006-2879 | SQL injection vulnerability in newscomments.php in Alex News-Engine 1.5.0 and earlier allows remote attackers to execute arbitrary SQL commands via the newsid parameter. | [
"cpe:2.3:a:alex:news-engine:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-xw4p-crpj-vjx2 | A Server-Side Forgery Request can be activated unmarshalling with XStream to access data streams from an arbitrary URL referencing a resource in an intranet or the local host | ImpactThe vulnerability may allow a remote attacker to request data from internal resources that are not publicly available only by manipulating the processed input stream with a Java runtime version 14 to 8. No user is affected, who followed the recommendation to setup XStream's security framework with a whitelist limited to the minimal required types.PatchesIf you rely on XStream's default blacklist of the [Security Framework](https://x-stream.github.io/security.html#framework), you will have to use at least version 1.4.18.WorkaroundsSee [workarounds](https://x-stream.github.io/security.html#workaround) for the different versions covering all CVEs.ReferencesSee full information about the nature of the vulnerability and the steps to reproduce it in XStream's documentation for [CVE-2021-39152](https://x-stream.github.io/CVE-2021-39152.html).Creditsm0d9 of the Security Team of Alibaba Cloud found and reported the issue to XStream and provided the required information to reproduce it.For more informationIf you have any questions or comments about this advisory:Open an issue in [XStream](https://github.com/x-stream/xstream/issues)Contact us at [XStream Google Group](https://groups.google.com/group/xstream-user) | [] | null | 8.5 | null | null |
GHSA-8g74-32fg-5ghc | Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in Apache APISIX when using `forward-auth` plugin.This issue affects Apache APISIX: from 3.8.0, 3.9.0.Users are recommended to upgrade to version 3.8.1, 3.9.1 or higher, which fixes the issue. | [] | null | 6.3 | null | null |
|
GHSA-4hm7-3pqc-622q | Windows iSCSI Discovery Service Remote Code Execution Vulnerability. | [] | null | 7.1 | null | null |
|
GHSA-wh2w-39f4-rpv2 | Hyperledger Indy's update process of a DID does not check who signs the request | NameUpdating a DID with a nym transaction will be written to the ledger if neither ROLE or VERKEY are being changed, regardless of sender.DescriptionA malicious DID with no particular role can ask an update for another DID (but cannot modify its verkey or role). This is bad because:Any DID can write a nym transaction to the ledger (i.e., any DID can spam the ledger with nym transactions).Any DID can change any other DID's alias.The update transaction modifies the ledger metadata associated with a DID.Expected vs ObservedWe expect that if a DID (with no role) wants to update another DID (not its own or one it is the endorser), then the nodes should refuse the request. We can see that requirements in the [Indy default auth_rules](https://github.com/hyperledger/indy-node/blob/master/docs/source/auth_rules.md) in Section "Who is the owner" in the last point of "Endorser using".We observe that with a normal DID, we can update the field `from` for a random DID, for example, the one of a TRUSTEE. It creates then a new transaction on the ledger.Explanation of the attackWe first begin to connect to the pool and open a wallet. Then, we will use a TRUSTEE (but can also be a STEWARD or an ENDORSER) DID `V4SGRU86Z58d6TV7PBUe6f`. We ask the information about `V4SGRU86Z58d6TV7PBUe6f` with a get-nym. We create a new DID `V4SGRU86Z58d6TV7PBUe1a` signed by `V4SGRU86Z58d6TV7PBUe6f` with no role. For the rest of the attack, we will use `V4SGRU86Z58d6TV7PBUe1a` to sign new transactions. We send a `ledger nym did=V4SGRU86Z58d6TV7PBUe6f extra=hello` to see if `V4SGRU86Z58d6TV7PBUe1a` can send an update of a TRUSTEE identity. When we ask information to the ledger about `V4SGRU86Z58d6TV7PBUe6f`, it answers that the `from` field is `V4SGRU86Z58d6TV7PBUe1a` (to compare with the first get-nym we did with `from` field = `V4SGRU86Z58d6TV7PBUe6f`). To see the log of the attack, I modified my indy-cli to print the json request and the json response directly on the terminal. You can find the log file `indy.log` in this archive.Implementation notes[NymHandler](https://github.com/hyperledger/indy-node/blob/e5676b703d625e42c9547333bd03bb8307ed534c/indy_node/server/request_handlers/domain_req_handlers/nym_handler.py) method `update_state`, line 62. I think that we need to check if the DID which signs the transaction, owns the DID or is its endorser.Steps to ReproduceEnvironmentUbuntu 18.04
Docker version 19.03.8
[indy-cli](https://github.com/hyperledger/indy-sdk/tree/master/cli)
[indy-ci](https://github.com/hyperledger/indy-sdk/tree/master/ci) Dockerfile is copied in this archive
To install indy-cli, run `./install_indy_cli.sh`CommandHere is the script to create the container, run the attack and remove the container and the image. Find below the command to execute each step separately.Installation of the environmentInstall indy-cli and create an image with tag `test` from DockerfileExploitUninstallation of the environmentSuppress the container `test` and remove the image `test`AnalysisWe are grateful to @alexandredeleze for discovering and responsibly disclosing the issue.We were previously aware that any DID on the ledger can "update" the state (seqNo + txnTime) if it doesn't change the state data itself. We considered this a minor bug because only the seqNo and txnTime changed. But seeing that this can also affect the "parent" DID means that it has a higher severity. | [] | 8.7 | 7.5 | null | null |
GHSA-3rvp-xpmc-fgrf | Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability | [] | null | 8.8 | null | null |
|
GHSA-c9v3-wqvp-m35p | ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i. | [] | null | null | null | null |
|
GHSA-587h-jw63-jwf2 | Anuko Time Tracker v1.19.23.5311 lacks rate limit on the password reset module which allows attacker to perform Denial of Service attack on any legitimate user's mailbox | [] | null | null | null | null |
|
CVE-2019-2258 | Improper validation of array index causes OOB write and then leads to memory corruption in MMCP in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MDM9150, MDM9607, MDM9615, MDM9625, MDM9635M, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, Qualcomm 215, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SD 8CX, SDA660, SDM439, SDM630, SDM660, SDX20, Snapdragon_High_Med_2016, SXR1130 | [
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9655_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9655:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm_215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm_215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx20_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-2023-51504 | WordPress Dan's Embedder for Google Calendar Plugin <= 1.2 is vulnerable to Cross Site Scripting (XSS) | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dan Dulaney Dan's Embedder for Google Calendar allows Stored XSS.This issue affects Dan's Embedder for Google Calendar: from n/a through 1.2.
| [
"cpe:2.3:a:dandulaney:dan\\'s_embedder_for_google_calendar:*:*:*:*:*:wordpress:*:*"
] | null | 6.5 | null | null |
CVE-2011-2598 | The WebGL implementation in Mozilla Firefox 4.x allows remote attackers to obtain screenshots of the windows of arbitrary desktop applications via vectors involving an SVG filter, an IFRAME element, and uninitialized data in graphics memory. | [
"cpe:2.3:a:mozilla:firefox:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0:beta9:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:4.0.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 |
|
CVE-2019-12419 | Apache CXF before 3.3.4 and 3.2.11 provides all of the components that are required to build a fully fledged OpenId Connect service. There is a vulnerability in the access token services, where it does not validate that the authenticated principal is equal to that of the supplied clientId parameter in the request. If a malicious client was able to somehow steal an authorization code issued to another client, then they could exploit this vulnerability to obtain an access token for the other client. | [
"cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:commerce_guided_search:11.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
RHSA-2009:1307 | Red Hat Security Advisory: ecryptfs-utils security, bug fix, and enhancement update | ecryptfs-utils: potential provided password disclosure in the process table | [
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null |
CVE-2021-41867 | An information disclosure vulnerability in OnionShare 2.3 before 2.4 allows remote unauthenticated attackers to retrieve the full list of participants of a non-public OnionShare node via the --chat feature. | [
"cpe:2.3:a:onionshare:onionshare:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 |
|
RHSA-2024:3473 | Red Hat Security Advisory: OpenShift Virtualization 4.14.6 Images security update | axios: exposure of confidential data stored in cookies | [
"cpe:/a:redhat:container_native_virtualization:4.14::el9"
] | null | 6.5 | null | null |
CVE-2025-30160 | Redlib allows a Denial of Service via DEFLATE Decompression Bomb in restore_preferences Form | Redlib is an alternative private front-end to Reddit. A vulnerability has been identified in Redlib where an attacker can cause a denial-of-service (DOS) condition by submitting a specially crafted base2048-encoded DEFLATE decompression bomb to the restore_preferences form. This leads to excessive memory consumption and potential system instability, which can be exploited to disrupt Redlib instances. This vulnerability is fixed in 0.36.0. | [] | 8.7 | null | null | null |
GHSA-8c68-g8rx-85g8 | Samba 4.10.x before 4.10.5 has a NULL pointer dereference, leading to an AD DC LDAP server Denial of Service. This is related to an attacker using the paged search control. The attacker must have directory read access in order to attempt an exploit. | [] | null | null | null | null |
|
GHSA-w985-973m-gqr2 | An issue in the sqlg_group_node component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements. | [] | null | 7.5 | null | null |
|
RHSA-2023:4160 | Red Hat Security Advisory: java-1.8.0-ibm security update | JDK: unsafe deserialization flaw in the Object Request Broker (ORB) OpenJDK: improper connection handling during TLS handshake (8294474) OpenJDK: missing string checks for NULL characters (8296622) OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) OpenJDK: Swing HTML parsing issue (8296832) OpenJDK: certificate validation issue in TLS session negotiation (8298310) OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) | [
"cpe:/a:redhat:rhel_extras:7"
] | null | 3.7 | null | null |
PYSEC-2022-164 | null | A flaw was found in Ansible Engine's ansible-connection module, where sensitive information such as the Ansible user credentials is disclosed by default in the traceback error message. The highest threat from this vulnerability is to confidentiality. | [] | null | null | null | null |
GHSA-8gcq-hc82-pqq2 | OS Command injection vulnerability in D-Link DIR-867 DIR_867_FW1.30B07 allows attackers to execute arbitrary commands via a crafted LocalIPAddress parameter for the SetVirtualServerSettings to HNAP1. | [] | null | 9.8 | null | null |
|
GHSA-2qf4-9rx4-94ww | The cross-site scripting vulnerability has been reported to affect earlier versions of Photo Station. If exploited, the vulnerability could allow remote attackers to inject malicious code. This issue affects: QNAP Systems Inc. Photo Station versions prior to 5.7.11; versions prior to 6.0.10. | [] | null | 6.1 | null | null |
|
RHSA-2013:0586 | Red Hat Security Advisory: jbosssx security update | JBoss: allows empty password to authenticate against LDAP | [
"cpe:/a:redhat:jboss_enterprise_brms_platform:5.3.1",
"cpe:/a:redhat:jboss_enterprise_portal_platform:4.3.0:update7",
"cpe:/a:redhat:jboss_enterprise_portal_platform:5.2.2",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.2.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:4.3.0:update5",
"cpe:/a:redhat:jboss_enterprise_soa_platform:5.3.1"
] | null | null | null | null |
GHSA-jj2m-7f8j-222w | The Quick Code WordPress plugin through 1.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack. | [] | null | 6.1 | null | null |
|
GHSA-6qq7-3hqc-p5w4 | Wallabag vulnerable to Allocation of Resources Without Limits or Throttling | A vulnerability was found in wallabag 2.5.4. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /config of the component Profile Config. The manipulation of the argument Name leads to allocation of resources. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-233359. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [] | null | 6.5 | null | null |
GHSA-p594-jv9h-cv8f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Tidekey allows Reflected XSS. This issue affects Tidekey: from n/a through 1.1. | [] | null | 7.1 | null | null |
|
GHSA-6rmq-x2hv-vxpp | Drupal core third-party PEAR Archive_Tar library is vulnerable to Deserialization of Untrusted Data | In Drupal Core versions 7.x prior to 7.62, 8.6.x prior to 8.6.6 and 8.5.x prior to 8.5.9; Drupal core uses the third-party PEAR Archive_Tar library. This library has released a security update which impacts some Drupal configurations. Refer to CVE-2018-1000888 for details | [] | null | null | 8 | null |
CVE-2024-7752 | SourceCodester Clinics Patient Management System update_medicine.php cross site scripting | A vulnerability was found in SourceCodester Clinics Patient Management System 1.0. It has been classified as problematic. This affects an unknown part of the file /update_medicine.php. The manipulation of the argument medicine_name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:sourcecodester:clinics_patient_management_system:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oretnom23:clinic\\'s_patient_management_system:1.0:*:*:*:*:*:*:*"
] | 5.3 | 3.5 | 3.5 | 4 |
CVE-2025-5706 | PHPGurukul Human Metapneumovirus Testing Management System new-user-testing.php sql injection | A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /new-user-testing.php. The manipulation of the argument state leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. | [] | 6.9 | 7.3 | 7.3 | 7.5 |
CVE-2024-27375 | An issue was discovered in Samsung Mobile Processor Exynos 980, Exynos 850, Exynos 1280, Exynos 1380, and Exynos 1330. In the function slsi_nan_followup_get_nl_params(), there is no input validation check on hal_req->sdea_service_specific_info_len coming from userspace, which can lead to a heap overwrite. | [
"cpe:2.3:h:samsung:exynos_980:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_850:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1280:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1380:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:exynos_1330:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1280_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:exynos_1330_firmware:-:*:*:*:*:*:*:*"
] | null | 6.7 | null | null |
|
GHSA-x65r-wv8w-xvpx | Cross-site scripting (XSS) vulnerability in FileNet P8 Platform Documentation Installable Info Center 4.5.1 through 5.2.0 in IBM FileNet Business Process Manager 4.5.1 through 5.1.0, FileNet Content Manager 4.5.1 through 5.2.0, and Case Foundation 5.2.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
RHSA-2020:2684 | Red Hat Security Advisory: containernetworking-plugins security update | containernetworking/plugins: IPv6 router advertisements allow for MitM attacks on IPv4 clusters | [
"cpe:/a:redhat:rhel_extras_other:7"
] | null | 6 | null | null |
GHSA-v5gf-j9pm-jvj5 | The Serial Peripheral Interface driver in Android before 2016-08-05 on Nexus 5X and 6P devices allows attackers to gain privileges via a crafted application, aka internal bug 28817378. | [] | null | null | 7 | null |
|
CVE-2023-2388 | Netgear SRX5308 Web Management Interface cross site scripting | A vulnerability, which was classified as problematic, has been found in Netgear SRX5308 up to 4.3.5-3. Affected by this issue is some unknown functionality of the file scgi-bin/platform.cgi?page=firewall_logs_email.htm of the component Web Management Interface. The manipulation of the argument smtpServer.fromAddr leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-227666 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:netgear:srx5308_firmware:4.3.5-3:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:srx5308:-:*:*:*:*:*:*:*"
] | null | 2.4 | 2.4 | 3.3 |
CVE-2008-4793 | The node module API in Drupal 5.x before 5.11 allows remote attackers to bypass node validation and have unspecified other impact via unknown vectors related to contributed modules. | [
"cpe:2.3:a:drupal:drupal:*:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:drupal:drupal:5.9:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2010-2291 | Unspecified vulnerability in the web interface in snom VoIP Phone firmware 8 before 8.2.35 allows remote attackers to bypass intended restrictions and modify user credentials via unknown vectors. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:snom:voip_phone_firmware:8.0.11:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.0.12:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.0.13:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.1.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.2:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.3:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.4:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.5:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.6:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.7:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.8:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.9:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.10:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.11:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.16:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.17:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.18:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.19:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.20:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.21:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.22:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.23:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.24:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.25:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.26:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.27:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.28:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.29:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.30:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.31:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.32:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.33:beta:*:*:*:*:*:*",
"cpe:2.3:a:snom:voip_phone_firmware:8.2.34:beta:*:*:*:*:*:*"
] | null | null | null | 3.3 |
|
GHSA-cxw8-j5f9-53mh | In the Linux kernel, the following vulnerability has been resolved:gpio: prevent potential speculation leaks in gpio_device_get_desc()Userspace may trigger a speculative read of an address outside the gpio
descriptor array.
Users can do that by calling gpio_ioctl() with an offset out of range.
Offset is copied from user and then used as an array index to get
the gpio descriptor without sanitization in gpio_device_get_desc().This change ensures that the offset is sanitized by using
array_index_nospec() to mitigate any possibility of speculative
information leaks.This bug was discovered and resolved using Coverity Static Analysis
Security Testing (SAST) by Synopsys, Inc. | [] | null | 5.5 | null | null |
|
CVE-2006-3315 | PHP remote file inclusion vulnerability in page.php in an unspecified RahnemaCo.com product, possibly eShop, allows remote attackers to execute arbitrary PHP code via a URL in the osCsid parameter. | [
"cpe:2.3:a:rahnemaco:rahnemaco:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2024-4381 | CB (legacy) <= 0.9.4.18 - Admin+ Stored XSS | The CB (legacy) WordPress plugin through 0.9.4.18 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | [
"cpe:2.3:a:wielebenwir:commonsbooking:*:*:*:*:*:wordpress:*:*"
] | null | 4.8 | null | null |
CVE-2021-38133 | Possible Improper authentication Vulnerability in OpenText eDirectory | Possible
External Service Interaction attack
in eDirectory has been discovered in
OpenText™ eDirectory. This impact all version before 9.2.6.0000. | [
"cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*"
] | null | 7.4 | null | null |
CVE-2022-26387 | When installing an add-on, Firefox verified the signature before prompting the user; but while the user was confirming the prompt, the underlying add-on file could have been modified and Firefox would not have noticed. This vulnerability affects Firefox < 98, Firefox ESR < 91.7, and Thunderbird < 91.7. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | null |
|
GHSA-483m-67m4-vjw4 | A vulnerability was found in zhangyanbo2007 youkefu up to 4.2.0 and classified as problematic. Affected by this issue is the function impsave of the file m\web\handler\admin\system\TemplateController.java. The manipulation of the argument dataFile leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | [] | 5.3 | 4.3 | null | null |
|
CVE-2016-2995 | Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2997, CVE-2016-3005, and CVE-2016-3010. | [
"cpe:2.3:a:ibm:connections:4.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:connections:4.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:connections:5.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:connections:5.5.0.0:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 |
|
GHSA-g2x7-rq6p-w7gg | Cross-site scripting (XSS) vulnerability in the Inline Entity Form module 7.x-1.x before 7.x-1.6 for Drupal allows remote authenticated users with permission to create or edit fields to inject arbitrary web script or HTML via unspecified vectors. | [] | null | null | null | null |
|
CVE-2020-36751 | The Coupon Creator plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 3.1. This is due to missing or incorrect nonce validation on the save_meta() function. This makes it possible for unauthenticated attackers to save meta fields via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [
"cpe:2.3:a:jesseeproductions:coupon_creator:*:*:*:*:*:wordpress:*:*"
] | null | 4.3 | null | null |
|
RHSA-2024:0756 | Red Hat Security Advisory: runc security update | runc: file descriptor leak | [
"cpe:/a:redhat:rhel_eus:9.0::appstream"
] | null | 8.6 | null | null |
GHSA-fvx8-gwc7-qjhw | An invalid free vulnerability exists in gpac 1.1.0 via the gf_svg_delete_attribute_value function, which causes a segmentation fault and application crash. | [] | null | 5.5 | null | null |
|
GHSA-rgc3-xv9w-g763 | Buffer Overflow vulnerability in GifLib Project GifLib v.5.2.1 allows a local attacker to obtain sensitive information via the DumpSCreen2RGB function in gif2rgb.c | [] | null | 7.1 | null | null |
|
GHSA-gc66-4m5h-mc5r | The Delete Custom Fields plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.3.1. This is due to missing or incorrect nonce validation on the ajax_delete_field() function. This makes it possible for unauthenticated attackers to delete arbitrary post meta data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | [] | null | 6.1 | null | null |
|
GHSA-4mjh-9fxc-hm78 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Think201 Data Dash allows Reflected XSS. This issue affects Data Dash: from n/a through 1.2.3. | [] | null | 7.1 | null | null |
|
CVE-2024-10954 | Prompt Injection Leading to RCE in binary-husky/gpt_academic Plugin `manim` | In the `manim` plugin of binary-husky/gpt_academic, versions prior to the fix, a vulnerability exists due to improper handling of user-provided prompts. The root cause is the execution of untrusted code generated by the LLM without a proper sandbox. This allows an attacker to perform remote code execution (RCE) on the app backend server by injecting malicious code through the prompt. | [] | null | null | 8.8 | null |
RHSA-2022:4655 | Red Hat Security Advisory: kpatch-patch security update | kernel: cgroups v1 release_agent feature may allow privilege escalation | [
"cpe:/o:redhat:enterprise_linux:7::server"
] | null | 7 | null | null |
GHSA-fpc4-2vcc-ch77 | The GenerateFunction function in bindings/scripts/code_generator_v8.pm in Blink, as used in Google Chrome before 33.0.1750.149, does not implement a certain cross-origin restriction for the EventTarget::dispatchEvent function, which allows remote attackers to conduct Universal XSS (UXSS) attacks via vectors involving events. | [] | null | null | null | null |
|
GHSA-fwmm-vfgg-4f84 | A vulnerability in the packet processing functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to inefficient memory management. An attacker could exploit this vulnerability by sending a high rate of IPv4 or IPv6 traffic through an affected device. This traffic would need to match a configured block action in an access control policy. An exploit could allow the attacker to cause a memory exhaustion condition on the affected device, which would result in a DoS for traffic transiting the device, as well as sluggish performance of the management interface. Once the flood is stopped, performance should return to previous states. | [] | null | null | null | null |
|
cisco-sa-ise-7Q4TNYUx | Cisco Identity Services Engine Vulnerabilities | Multiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject arbitrary operating system commands, bypass security protections, and conduct cross-site scripting attacks.
For more information about these vulnerabilities, see the Details ["#details"] section of this advisory.
Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.
| [] | null | 4.8 | null | null |
CVE-2019-1003087 | A missing permission check in Jenkins Chef Sinatra Plugin in the ChefBuilderConfiguration.DescriptorImpl#doTestConnection form validation method allows attackers with Overall/Read permission to initiate a connection to an attacker-specified server. | [
"cpe:2.3:a:jenkins:chef_sinatra:*:*:*:*:*:jenkins:*:*"
] | null | 6.5 | null | 4 |
|
CVE-2018-18406 | An issue was discovered in Tufin SecureTrack 18.1 with TufinOS 2.16 build 1179(Final). The Audit Report module is affected by a blind XXE vulnerability when a new Best Practices Report is saved using a special payload inside the xml input field. The XXE vulnerability is blind since the response doesn't directly display a requested file, but rather returns it inside the name data field when the report is saved. An attacker is able to view restricted operating system files. This issue affects all types of users: administrators or normal users. | [
"cpe:2.3:a:tufin:securetrack:18.1:*:*:*:*:*:*:*",
"cpe:2.3:o:tufin:tufinos:2.16:build_1179:*:*:*:*:*:*"
] | null | null | 9.9 | 6.5 |
|
GHSA-3w39-v724-v74w | In the Linux kernel, the following vulnerability has been resolved:wifi: iwlwifi: mvm: fix a crash when we run out of stationsA DoS tool that injects loads of authentication frames made our AP
crash. The iwl_mvm_is_dup() function couldn't find the per-queue
dup_data which was not allocated.The root cause for that is that we ran out of stations in the firmware
and we didn't really add the station to the firmware, yet we didn't
return an error to mac80211.
Mac80211 was thinking that we have the station and because of that,
sta_info::uploaded was set to 1. This allowed
ieee80211_find_sta_by_ifaddr() to return a valid station object, but
that ieee80211_sta didn't have any iwl_mvm_sta object initialized and
that caused the crash mentioned earlier when we got Rx on that station. | [] | null | 5.5 | null | null |
|
CVE-2016-10033 | The mailSend function in the isMail transport in PHPMailer before 5.2.18 might allow remote attackers to pass extra parameters to the mail command and consequently execute arbitrary code via a \" (backslash double quote) in a crafted Sender property. | [
"cpe:2.3:a:phpmailer_project:phpmailer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 |
|
CVE-2023-45358 | Archer Platform 6.x before 6.13 P2 HF2 (6.13.0.2.2) contains a stored cross-site scripting (XSS) vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability to store malicious HTML or JavaScript code in a trusted application data store. When victim users access the data store through their browsers, the malicious code gets executed by the web browser in the context of the vulnerable application. 6.14 (6.14.0) is also a fixed release. | [
"cpe:2.3:a:archerirm:archer:*:*:*:*:*:*:*:*"
] | null | 8.5 | null | null |
|
GHSA-hph6-79wj-qqmw | PHP-Memcached v2.2.0 and below contains an improper NULL termination which allows attackers to execute CLRF injection. | [] | null | 9.8 | null | null |
|
GHSA-gxvh-f4g9-p9wp | In the Linux kernel, the following vulnerability has been resolved:scsi: ufs: core: Remove SCSI host only if addedIf host tries to remove ufshcd driver from a UFS device it would cause a
kernel panic if ufshcd_async_scan fails during ufshcd_probe_hba before
adding a SCSI host with scsi_add_host and MCQ is enabled since SCSI host
has been defered after MCQ configuration introduced by commit 0cab4023ec7b
("scsi: ufs: core: Defer adding host to SCSI if MCQ is supported").To guarantee that SCSI host is removed only if it has been added, set the
scsi_host_added flag to true after adding a SCSI host and check whether it
is set or not before removing it. | [] | null | 5.5 | null | null |
|
GHSA-3cwx-q62p-7m5h | Missing custom error page vulnerability in Synology Web Station before 2.1.3-0139 allows remote attackers to conduct phishing attacks via a crafted URL. | [] | null | null | 6.1 | null |
|
CVE-2013-4878 | The default configuration of Parallels Plesk Panel 9.0.x and 9.2.x on UNIX, and Small Business Panel 10.x on UNIX, has an improper ScriptAlias directive for phppath, which makes it easier for remote attackers to execute arbitrary code via a crafted request, a different vulnerability than CVE-2012-1823. | [
"cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:parallels:parallels_small_business_panel:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-2008-0510 | SQL injection vulnerability in index.php in the Newsletter (com_newsletter) component for Mambo 4.5 and Joomla! allows remote attackers to execute arbitrary SQL commands via the listid parameter. | [
"cpe:2.3:a:joomla:com_newsletter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:com_newsletter:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mambo:mambo:4.5:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
GHSA-874w-4q4h-wg36 | Fortinet FortiWLC 6.1-2-29 and earlier, 7.0-9-1, 7.0-10-0, 8.0-5-0, 8.1-2-0, and 8.2-4-0 allow administrators to obtain sensitive user credentials by reading the pam.log file. | [] | null | null | 7.2 | null |
|
CVE-2024-21194 | Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 8.0.39 and prior, 8.4.2 and prior and 9.0.1 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [
"cpe:2.3:a:oracle:mysql_server:8.0.39_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:8.4.2_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql_server:9.0.1_and_prior:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:9.0.1:*:*:*:*:*:*:*"
] | null | 4.9 | null | null |
|
GHSA-hh92-wg7v-8vfr | Gleez CMS Vulnerability Allows Forced Browsing to Profile Page of Other Users | An issue was discovered in Gleez CMS v1.2.0. Because of an Insecure Direct Object Reference vulnerability, it is possible for attackers (logged in users) to view profile page of other users, as demonstrated by navigating to `user/3` on `demo.gleezcms.org`. | [] | null | null | 4.3 | null |
CVE-2007-3762 | Stack-based buffer overflow in the IAX2 channel driver (chan_iax2) in Asterisk before 1.2.22 and 1.4.x before 1.4.8, Business Edition before B.2.2.1, AsteriskNOW before beta7, Appliance Developer Kit before 0.5.0, and s800i before 1.0.2 allows remote attackers to execute arbitrary code by sending a long (1) voice or (2) video RTP frame. | [
"cpe:2.3:a:asterisk:asterisk:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.0_beta1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.0_beta2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.15:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.16:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.2.17:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4.4_2007-04-27:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:1.4_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:a:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:b.1.3.2:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:b.1.3.3:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk:b.2.2.0:*:business:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisk_appliance_developer_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_5:*:*:*:*:*:*:*",
"cpe:2.3:a:asterisk:asterisknow:beta_6:*:*:*:*:*:*:*",
"cpe:2.3:h:asterisk:s800i_appliance:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:asterisk:s800i_appliance:1.0.1:*:*:*:*:*:*:*"
] | null | null | null | 9.3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.