id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-9c8w-rvgj-w489 | sapi/cgi/cgi_main.c in PHP before 5.3.13 and 5.4.x before 5.4.3, when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1823. | [] |
|
GHSA-jf89-rq94-wxx7 | Windows Digital Media Elevation of Privilege Vulnerability | [] |
|
GHSA-6cgf-ccqv-hqc5 | Use-after-free vulnerability in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code by using the actionCallMethod opcode with crafted arguments, a different vulnerability than CVE-2016-0987, CVE-2016-0988, CVE-2016-0990, CVE-2016-0991, CVE-2016-0995, CVE-2016-0996, CVE-2016-0997, CVE-2016-0998, CVE-2016-0999, and CVE-2016-1000. | [] |
|
GHSA-q6rx-427h-5675 | Coppermine Photo Gallery 1.2.2b and 1.2.0 RC4 allows remote attackers to obtain sensitive information via a direct HTTP request to (1) phpinfo.php, (2) addpic.php, (3) config.php, (4) db_input.php, (5) displayecard.php, (6) ecard.php, (7) crop.inc.php, which reveal the full path in a PHP error message. | [] |
|
CVE-2024-39506 | liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet | In the Linux kernel, the following vulnerability has been resolved:
liquidio: Adjust a NULL pointer handling path in lio_vf_rep_copy_packet
In lio_vf_rep_copy_packet() pg_info->page is compared to a NULL value,
but then it is unconditionally passed to skb_add_rx_frag() which looks
strange and could lead to null pointer dereference.
lio_vf_rep_copy_packet() call trace looks like:
octeon_droq_process_packets
octeon_droq_fast_process_packets
octeon_droq_dispatch_pkt
octeon_create_recv_info
...search in the dispatch_list...
->disp_fn(rdisp->rinfo, ...)
lio_vf_rep_pkt_recv(struct octeon_recv_info *recv_info, ...)
In this path there is no code which sets pg_info->page to NULL.
So this check looks unneeded and doesn't solve potential problem.
But I guess the author had reason to add a check and I have no such card
and can't do real test.
In addition, the code in the function liquidio_push_packet() in
liquidio/lio_core.c does exactly the same.
Based on this, I consider the most acceptable compromise solution to
adjust this issue by moving skb_add_rx_frag() into conditional scope.
Found by Linux Verification Center (linuxtesting.org) with SVACE. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc2:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:6.10:rc3:*:*:*:*:*:*"
] |
CVE-2018-3178 | Vulnerability in the Hyperion Common Events component of Oracle Hyperion (subcomponent: User Interface). The supported version that is affected is 11.1.2.4. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Hyperion Common Events. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Common Events, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Common Events accessible data as well as unauthorized read access to a subset of Hyperion Common Events accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). | [
"cpe:2.3:a:oracle:hyperion_common_events:11.1.2.4:*:*:*:*:*:*:*"
] |
|
GHSA-hr92-3qpp-wqch | Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name. | [] |
|
CVE-2025-32231 | WordPress Bookingor plugin <= 1.0.6 - Broken Access Control vulnerability | Missing Authorization vulnerability in Bookingor Bookingor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Bookingor: from n/a through 1.0.6. | [] |
CVE-2016-2939 | IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [
"cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*"
] |
|
GHSA-gx6x-fhpp-hw29 | This was addressed with additional checks by Gatekeeper on files mounted through a network share. This issue is fixed in macOS Catalina 10.15.3. Searching for and opening a file from an attacker controlled NFS mount may bypass Gatekeeper. | [] |
|
GHSA-c36j-xv9p-fqv4 | The mintToken function of a smart contract implementation for Bcxss, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
GHSA-hxw7-jqv7-6h7r | The Android application BINHDRM26 com.bdrm.superreboot 1.0.3, exposes several critical actions through its exported broadcast receivers. These exposed actions can allow any app on the device to send unauthorized broadcasts, leading to unintended consequences. The vulnerability is particularly concerning because these actions include powering off, system reboot & entering recovery mode. | [] |
|
GHSA-mfcw-83qg-4vw3 | Agent-to-controller security bypass vulnerability in Jenkins Compuware Xpediter Code Coverage Plugin | Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier implements an agent/controller message that does not limit where it can be executed.It allows attackers able to control agent processes to obtain the values of Java system properties from the Jenkins controller process.This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.303/#upgrading-to-jenkins-lts-2-303-3).Compuware Xpediter Code Coverage Plugin 1.0.8 restricts execution of the agent/controller message to agents. | [] |
GHSA-g9c5-q45g-cc74 | In the Linux kernel, the following vulnerability has been resolved:device-dax: correct pgoff align in dax_set_mapping()pgoff should be aligned using ALIGN_DOWN() instead of ALIGN(). Otherwise,
vmf->address not aligned to fault_size will be aligned to the next
alignment, that can result in memory failure getting the wrong address.It's a subtle situation that only can be observed in
page_mapped_in_vma() after the page is page fault handled by
dev_dax_huge_fault. Generally, there is little chance to perform
page_mapped_in_vma in dev-dax's page unless in specific error injection
to the dax device to trigger an MCE - memory-failure. In that case,
page_mapped_in_vma() will be triggered to determine which task is
accessing the failure address and kill that task in the end.We used self-developed dax device (which is 2M aligned mapping) , to
perform error injection to random address. It turned out that error
injected to non-2M-aligned address was causing endless MCE until panic.
Because page_mapped_in_vma() kept resulting wrong address and the task
accessing the failure address was never killed properly:[ 3783.719419] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3784.049006] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3784.049190] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3784.448042] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3784.448186] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3784.792026] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3784.792179] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3785.162502] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3785.162633] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3785.461116] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3785.461247] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3785.764730] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3785.764859] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3786.042128] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3786.042259] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3786.464293] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3786.464423] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3786.818090] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3786.818217] Memory failure: 0x200c9742: recovery action for dax page:
Recovered
[ 3787.085297] mce: Uncorrected hardware memory error in user-access at
200c9742380
[ 3787.085424] Memory failure: 0x200c9742: recovery action for dax page:
RecoveredIt took us several weeks to pinpoint this problem, but we eventually
used bpftrace to trace the page fault and mce address and successfully
identified the issue.Joao added:; Likely we never reproduce in production because we always pin
: device-dax regions in the region align they provide (Qemu does
: similarly with prealloc in hugetlb/file backed memory). I think this
: bug requires that we touch *unpinned* device-dax regions unaligned to
: the device-dax selected alignment (page size i.e. 4K/2M/1G) | [] |
|
GHSA-pq24-7v4g-2468 | An issue was discovered in libezxml.a in ezXML 0.8.6. The function ezxml_internal_dtd() performs incorrect memory handling while parsing crafted XML files, which leads to an out-of-bounds write of a one byte constant. | [] |
|
CVE-2024-28808 | An issue was discovered in Infinera hiT 7300 5.60.50. Hidden functionality in the web interface allows a remote authenticated attacker to access reserved information by accessing undocumented web applications. | [] |
|
GHSA-2hj6-m35h-cfcc | Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable information disclosure via local access. | [] |
|
GHSA-r6m8-h5v3-6mmw | The Daum Maps - Subway (aka net.daum.android.map) application 3.9.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
GHSA-wvm5-q52j-8r24 | Helpcom before v10.0 contains a file download and execution vulnerability caused by storing hardcoded cryptographic key. It finally leads to a file download and execution via access to crafted web page. | [] |
|
GHSA-qg33-x2c5-6p44 | Langflow remote code execution vulnerability | Langflow allows remote code execution if untrusted users are able to reach the "POST /api/v1/custom_component" endpoint and provide a Python script. | [] |
GHSA-qq4v-p8xp-8526 | Certain NETGEAR devices are affected by command injection by an authenticated user. This affects D7800 before 1.0.1.60, DM200 before 1.0.0.66, EX2700 before 1.0.1.56, EX6150v2 before 1.0.1.86, EX6200v2 before 1.0.1.86, EX6250 before 1.0.0.128, EX6400 before 1.0.2.144, EX6400v2 before 1.0.0.128, EX6410 before 1.0.0.128, EX6420 before 1.0.0.128, EX7300 before 1.0.2.144, EX7300v2 before 1.0.0.128, EX7320 before 1.0.0.128, R7500v2 before 1.0.3.46, R7800 before 1.0.2.74, R8900 before 1.0.5.26, R9000 before 1.0.5.2, RAX120 before 1.0.1.128, WN3000RPv2 before 1.0.0.78, WN3000RPv3 before 1.0.2.80, WNR2000v5 before 1.0.0.74, XR500 before 2.3.2.66, RBK20 before 2.7.3.22, RBR20 before 2.7.3.22, RBS20 before 2.7.3.22, RBK40 before 2.7.3.22, RBR40 before 2.7.3.22, and RBS40 before 2.7.3.22. | [] |
|
CVE-2003-0242 | IPSec in Mac OS X before 10.2.6 does not properly handle certain incoming security policies that match by port, which could allow traffic that is not explicitly allowed by the policies. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-5vfc-gf4x-6fj8 | Zimbra Collaboration Suite 8.7.x through 8.8.11 allows Blind SSRF in the Feed component. | [] |
|
GHSA-725j-ffcc-fc53 | A stored cross-site scripting (XSS) vulnerability exists in NetBox 4.1.0 within the "Configuration History" feature of the "Admin" panel via a /core/config-revisions/ Add action. An authenticated user can inject arbitrary JavaScript or HTML into the "Top banner" field. | [] |
|
CVE-2021-39251 | A crafted NTFS image can cause a NULL pointer dereference in ntfs_extent_inode_open in NTFS-3G < 2021.8.22. | [
"cpe:2.3:a:tuxera:ntfs-3g:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:-:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:advanced_virtualization:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"
] |
|
CVE-2022-22559 | Dell PowerScale OneFS, version 9.3.0, contains a use of a broken or risky cryptographic algorithm. An unprivileged network attacker could exploit this vulnerability, leading to the potential for information disclosure. | [
"cpe:2.3:o:dell:emc_powerscale_onefs:9.3.0:*:*:*:*:*:*:*"
] |
|
GHSA-p633-cvx7-wpq8 | Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header. | [] |
|
GHSA-xvxm-rm97-hmmp | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30141, CVE-2022-30143, CVE-2022-30146, CVE-2022-30149, CVE-2022-30153, CVE-2022-30161. | [] |
|
CVE-2015-9160 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile, Snapdragon Mobile, and Snapdragon Wear MDM9206, MDM9607, MDM9635M, MDM9650, MSM8909W, SD 210/SD 212/SD 205, SD 400, SD 410/12, SD 425, SD 430, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 800, SD 808, SD 810, SD 820, SD 820A, SD 835, SD 845, and SD 850, integer overflow may occur when values passed from HLOS (graphics driver busy time, and total time) in TZBSP_GFX_DCVS_UPDATE_ID are very large. | [
"cpe:2.3:o:qualcomm:mdm9206_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9206:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9607_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9607:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9635m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9635m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_210_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_210:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_212_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_212:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_412_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_412:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_616_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_616:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_415_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_415:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_617_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_617:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_650_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_650:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_652_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_652:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_800_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_808_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_808:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*"
] |
|
GHSA-7rhx-5frh-x32w | EMC Documentum Webtop before 6.7 SP2, Documentum WDK before 6.7 SP2, Documentum Taskspace before 6.7 SP2, and Documentum Records Manager before 6.7 SP2 allow remote attackers to obtain sensitive information via vectors involving cross-origin frame navigation, related to a "Cross Frame Scripting" issue. | [] |
|
GHSA-f85q-26xg-xvqx | Redirection version 2.7.1 contains a Serialisation vulnerability possibly allowing ACE vulnerability in Settings page AJAX that can result in could allow admin to execute arbitrary code in some circumstances. This attack appear to be exploitable via Attacker must have access to admin account. This vulnerability appears to have been fixed in 2.8. | [] |
|
GHSA-9q6x-q4vg-q8rg | Online Banking System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter. | [] |
|
CVE-2025-20158 | Cisco Video Phone 8875 and Desk Phone 9800 Series Information Disclosure Vulnerability | A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.
This vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system. | [] |
GHSA-9838-c2wv-jc32 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in avalex GmbH avalex – Automatically secure legal texts plugin <= 3.0.3 versions. | [] |
|
CVE-2024-25646 | Information Disclosure vulnerability in SAP BusinessObjects Web Intelligence | Due to improper validation, SAP BusinessObject Business Intelligence Launch Pad allows an authenticated attacker to access operating system information using crafted document. On successful exploitation there could be a considerable impact on confidentiality of the application. | [] |
CVE-2012-2902 | Unrestricted file upload vulnerability in editor/extensions/browser/file.php in the Joomla Content Editor (JCE) component before 2.1 for Joomla!, when chunking is set to greater than zero, allows remote authors to execute arbitrary PHP code by uploading a PHP file with a double extension as demonstrated by .jpg.pht. | [
"cpe:2.3:a:ryan_demmer:joomla_content_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ryan_demmer:joomla_content_editor:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-27336 | Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability | Softing edgeConnector Siemens OPC UA Server Null Pointer Dereference Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Softing edgeConnector Siemens. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the handling of OPC client certificates. The issue results from dereferencing a NULL pointer. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20508. | [
"cpe:2.3:a:softing:edgeconnector:-:*:*:*:*:*:*:*"
] |
GHSA-x28m-8977-r45c | An issue was discovered in xmppserver jar in the XMPP Server component of the JIve platform, as used in Pascom Cloud Phone System before 7.20.x (and in other products). An endpoint in the backend Tomcat server of the Pascom allows SSRF, a related issue to CVE-2019-18394. | [] |
|
GHSA-9v3v-9678-qvch | Michael-design iChat Realtime PHP Live Support System 1.6 has persistent Cross-site Scripting via chat,text-filed tags. | [] |
|
CVE-2024-56068 | WordPress WP SuperBackup plugin <= 2.3.3 - Subscriber+ PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in Azzaroco WP SuperBackup.This issue affects WP SuperBackup: from n/a through 2.3.3. | [] |
GHSA-wfqj-723q-9q82 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Studio Photo 3.6.6.931. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of ARW files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-12333. | [] |
|
CVE-2019-8811 | Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, watchOS 6.1, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:icloud:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:itunes:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] |
|
GHSA-cwj7-47rj-pwwv | Cross-site request forgery (CSRF) vulnerability in admin/agent_edit.asp in PollPro 3.0 allows remote attackers to create or modify accounts as administrators via the username, password, and name parameters. | [] |
|
GHSA-ch69-hjrw-4hf3 | Bludit 3.9.2 allows remote code execution via bl-kernel/ajax/upload-images.php because PHP code can be entered with a .jpg file name, and then this PHP code can write other PHP code to a ../ pathname. | [] |
|
GHSA-6p7p-7664-cqrj | Rockwell Automation Arena Simulation Software versions 16.00.00 and earlier contain an INFORMATION EXPOSURE CWE-200. A maliciously crafted Arena file opened by an unsuspecting user may result in the limited exposure of information related to the targeted workstation. | [] |
|
GHSA-fwv9-47fr-pv8g | Unspecified vulnerability in Oracle Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Power Management Utility. | [] |
|
CVE-2016-3558 | Unspecified vulnerability in the Oracle Email Center component in Oracle E-Business Suite 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, and 12.2.5 allows remote attackers to affect integrity via vectors related to Email Center Agent Console, a different vulnerability than CVE-2016-3559. | [
"cpe:2.3:a:oracle:email_center:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.5:*:*:*:*:*:*:*"
] |
|
CVE-2020-15305 | An issue was discovered in OpenEXR before 2.5.2. Invalid input could cause a use-after-free in DeepScanLineInputFile::DeepScanLineInputFile() in IlmImf/ImfDeepScanLineInputFile.cpp. | [
"cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*"
] |
|
GHSA-8qrm-2wm8-6v53 | In the 4.2.23 version of BigTree, a Stored XSS vulnerability has been discovered in /admin/ajax/file-browser/upload/ (aka the image upload area). | [] |
|
CVE-2023-25282 | A heap overflow vulnerability in D-Link DIR820LA1_FW106B02 allows attackers to cause a denial of service via the config.log_to_syslog and log_opt_dropPackets parameters to mydlink_api.ccp. | [
"cpe:2.3:o:dlink:dir-820l_firmware:1.06:b02:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-820l:a1:*:*:*:*:*:*:*"
] |
|
CVE-2023-33003 | A cross-site request forgery (CSRF) vulnerability in Jenkins Tag Profiler Plugin 0.2 and earlier allows attackers to reset profiler statistics. | [
"cpe:2.3:a:jenkins:tag_profiler:*:*:*:*:*:jenkins:*:*"
] |
|
GHSA-6x3x-v7pj-7967 | The Traffic Grapher Server for NetMechanica NetDecision before 4.6.1 allows remote attackers to obtain the source code of NtDecision script files with a .nd extension via an invalid version number in an HTTP request, as demonstrated using default.nd. NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2025-24383 | Dell Unity, version(s) 5.4 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability to delete arbitrary files. This vulnerability is considered critical as it can be leveraged to delete critical system files as root. Dell recommends customers to upgrade at the earliest opportunity. | [] |
|
GHSA-fqc7-5xxc-ph7r | Keycloak XSS via use of malicious payload as group name when creating new group from admin console | A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack. | [] |
CVE-2021-24367 | WP Config File Editor <= 1.7.1 - Authenticated Stored Cross-Site Scripting (XSS) | The WP Config File Editor WordPress plugin through 1.7.1 was affected by an Authenticated Stored Cross-Site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:wp_config_file_editor_project:wp_config_file_editor:*:*:*:*:*:*:*:*"
] |
CVE-2011-2142 | The Web Client Service in IBM Datacap Taskmaster Capture 8.0.1 before FP1 requires a cleartext password, which has unspecified impact and attack vectors. | [
"cpe:2.3:a:ibm:datacap_taskmaster_capture:8.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2023-45287 | Before Go 1.20, the RSA based key exchange methods in crypto/tls may exhibit a timing side channel | Before Go 1.20, the RSA based TLS key exchanges used the math/big library, which is not constant time. RSA blinding was applied to prevent timing attacks, but analysis shows this may not have been fully effective. In particular it appears as if the removal of PKCS#1 padding may leak timing information, which in turn could be used to recover session key bits. In Go 1.20, the crypto/tls library switched to a fully constant time RSA implementation, which we do not believe exhibits any timing side channels. | [
"cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*"
] |
CVE-2022-35753 | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:-:*:*:*:*:*:*:*"
] |
GHSA-c53m-27jv-cmg2 | Insufficient protection of the inter-process communication functions in ABB System 800xA Information Management (all published versions) enables an attacker authenticated on the local system to inject data, affecting the runtime values to be stored in the archive, or making Information Management history services unavailable. | [] |
|
GHSA-fcxj-8vc9-g8wc | Smanos W100 1.0.0 devices have Insecure Permissions, exploitable by an attacker on the same Wi-Fi network. | [] |
|
GHSA-84rr-q55c-9hm6 | Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor "leak." | [] |
|
CVE-2025-6963 | Campcodes Employee Management System myprofile.php sql injection | A vulnerability has been found in Campcodes Employee Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /myprofile.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. | [] |
GHSA-hm6m-hjr8-q9fh | Login functionality contains a blind SQL injection that can be exploited by unauthenticated attackers. Using a time-based blind SQLi technique the attacker can disclose all database contents. Account takeover is a potential outcome depending on the presence or lack thereof entries in certain database tables. | [] |
|
CVE-2021-38565 | An issue was discovered in Foxit PDF Reader before 11.0.1 and PDF Editor before 11.0.1. It allows writing to arbitrary files via submitForm. | [
"cpe:2.3:a:foxitsoftware:pdf_editor:*:*:*:*:*:*:*:*",
"cpe:2.3:a:foxitsoftware:pdf_reader:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-46910 | ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled | In the Linux kernel, the following vulnerability has been resolved:
ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled
The debugging code for kmap_local() doubles the number of per-CPU fixmap
slots allocated for kmap_local(), in order to use half of them as guard
regions. This causes the fixmap region to grow downwards beyond the start
of its reserved window if the supported number of CPUs is large, and collide
with the newly added virtual DT mapping right below it, which is obviously
not good.
One manifestation of this is EFI boot on a kernel built with NR_CPUS=32
and CONFIG_DEBUG_KMAP_LOCAL=y, which may pass the FDT in highmem, resulting
in block entries below the fixmap region that the fixmap code misidentifies
as fixmap table entries, and subsequently tries to dereference using a
phys-to-virt translation that is only valid for lowmem. This results in a
cryptic splat such as the one below.
ftrace: allocating 45548 entries in 89 pages
8<--- cut here ---
Unable to handle kernel paging request at virtual address fc6006f0
pgd = (ptrval)
[fc6006f0] *pgd=80000040207003, *pmd=00000000
Internal error: Oops: a06 [#1] SMP ARM
Modules linked in:
CPU: 0 PID: 0 Comm: swapper Not tainted 5.11.0+ #382
Hardware name: Generic DT based system
PC is at cpu_ca15_set_pte_ext+0x24/0x30
LR is at __set_fixmap+0xe4/0x118
pc : [<c041ac9c>] lr : [<c04189d8>] psr: 400000d3
sp : c1601ed8 ip : 00400000 fp : 00800000
r10: 0000071f r9 : 00421000 r8 : 00c00000
r7 : 00c00000 r6 : 0000071f r5 : ffade000 r4 : 4040171f
r3 : 00c00000 r2 : 4040171f r1 : c041ac78 r0 : fc6006f0
Flags: nZcv IRQs off FIQs off Mode SVC_32 ISA ARM Segment none
Control: 30c5387d Table: 40203000 DAC: 00000001
Process swapper (pid: 0, stack limit = 0x(ptrval))
So let's limit CONFIG_NR_CPUS to 16 when CONFIG_DEBUG_KMAP_LOCAL=y. Also,
fix the BUILD_BUG_ON() check that was supposed to catch this, by checking
whether the region grows below the start address rather than above the end
address. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-g93h-34rm-55x7 | MileSight DeviceHub -CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') may allow Unauthenticated RCE | [] |
|
CVE-2013-3899 | win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 does not properly validate addresses, which allows local users to gain privileges via a crafted application, aka "Win32k Memory Corruption Vulnerability." | [
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:-:sp2:x64:*:*:*:*:*"
] |
|
CVE-2008-1715 | SQL injection vulnerability in content/user.php in AuraCMS 2.2.1 and earlier, when magic_quotes_gpc is disabled, allows remote attackers to execute arbitrary SQL commands via the country parameter. | [
"cpe:2.3:a:auracms:auracms:*:*:*:*:*:*:*:*"
] |
|
GHSA-p8h5-3rhg-9c2x | CRLF injection vulnerability in lib/session.php in Hastymail 1.5 and earlier before 20061008 allows remote authenticated users to send arbitrary IMAP commands via a CRLF sequence in a mailbox name. NOTE: the attack crosses privilege boundaries if the IMAP server configuration prevents a user from establishing a direct IMAP session. | [] |
|
GHSA-hcfg-mxgg-w8v8 | An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. | [] |
|
CVE-2024-20850 | Use of Implicit Intent for Sensitive Communication in Samsung Pay prior to version 5.4.99 allows local attackers to access information of Samsung Pay. | [] |
|
GHSA-56hm-5jmx-97pv | Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. | [] |
|
GHSA-89gm-h4q5-gp3r | Multiple out-of-bounds write vulnerabilities exist in the VCD parse_valuechange portdump functionality of GTKWave 3.3.115. A specially crafted .vcd file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger these vulnerabilities.This vulnerability concerns the out-of-bounds write when triggered via the GUI's legacy VCD parsing code. | [] |
|
GHSA-fp26-r9x4-5gw4 | In Sourcecodester School Task Manager v1.0, a vulnerability was identified within the subject_name= parameter, enabling Stored Cross-Site Scripting (XSS) attacks. This vulnerability allows attackers to manipulate the subject's name, potentially leading to the execution of malicious JavaScript payloads. | [] |
|
CVE-2022-24661 | A vulnerability has been identified in Simcenter STAR-CCM+ Viewer (All versions < V2022.1). The starview+.exe contains a memory corruption vulnerability while parsing specially crafted .SCE files. This could allow an attacker to execute code in the context of the current process. | [
"cpe:2.3:a:siemens:simcenter_star-ccm\\+_viewer:*:*:*:*:*:*:*:*"
] |
|
GHSA-f5c7-4jcc-2vq6 | An integer overflow vulnerability exists in the fstReaderIterBlocks2 time_table tsec_nitems functionality of GTKWave 3.3.115. A specially crafted .fst file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability. | [] |
|
CVE-2019-10105 | CMS Made Simple 2.2.10 has a Self-XSS vulnerability via the Layout Design Manager "Name" field, which is reachable via a "Create a new Template" action to the Design Manager. | [
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.10:*:*:*:*:*:*:*"
] |
|
CVE-2024-1050 | The Import and export users and customers plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_force_reset_password_delete_metas() function in all versions up to, and including, 1.26.5. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete all forced password resets. | [] |
|
CVE-2024-9550 | D-Link DIR-605L formLogDnsquery buffer overflow | A vulnerability was found in D-Link DIR-605L 2.13B01 BETA. It has been classified as critical. Affected is the function formLogDnsquery of the file /goform/formLogDnsquery. The manipulation of the argument curTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:o:dlink:dir-605l_firmware:2.13b01:*:*:*:*:*:*:*",
"cpe:2.3:h:dlink:dir-605l:-:*:*:*:*:*:*:*"
] |
GHSA-8pwj-6p53-32x6 | Cross Site Scripting (XSS) vulnerablity in CMS Made Simple 2.2.14 via the Logic field in the Content Manager feature. | [] |
|
GHSA-qc5j-7652-9f34 | An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption. | [] |
|
CVE-2012-4608 | Cross-site request forgery (CSRF) vulnerability in the web interface in EMC RSA NetWitness Informer before 2.0.5.6 allows remote attackers to hijack the authentication of arbitrary users. | [
"cpe:2.3:a:emc:rsa_netwitness_informer:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-37288 | SmartBPM.NET - Path Traversal | SmartBPM.NET component has a vulnerability of path traversal within its file download function. An unauthenticated remote attacker can exploit this vulnerability to access arbitrary system files. | [
"cpe:2.3:a:smartsoft:smartbpm.net:6.70:*:*:*:*:*:*:*"
] |
CVE-2024-31777 | File Upload vulnerability in openeclass v.3.15 and before allows an attacker to execute arbitrary code via a crafted file to the certbadge.php endpoint. | [
"cpe:2.3:a:gunet:open_eclass_platform:*:*:*:*:*:*:*:*"
] |
|
GHSA-94ff-m62p-rpc5 | Directory traversal vulnerability in Rit Research Labs The Bat! 1.48f and earlier allows a remote attacker to create arbitrary files via a "dot dot" attack in the filename for an attachment. | [] |
|
GHSA-w4vx-2pcg-383r | Windows SmartScreen Security Feature Bypass Vulnerability | [] |
|
CVE-2007-5511 | SQL injection vulnerability in Workspace Manager for Oracle Database before OWM 10.2.0.4.1, OWM 10.1.0.8.0, and OWM 9.2.0.8.0 allows attackers to execute arbitrary SQL commands via the FINDRICSET procedure in the LT package. NOTE: this is probably covered by CVE-2007-5510, but there are insufficient details to be certain. | [
"cpe:2.3:a:oracle:database_server:*:*:*:*:*:*:*:*"
] |
|
CVE-2013-2461 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 21 and earlier and 6 Update 45 and earlier; the Oracle JRockit component in Oracle Fusion Middleware R27.7.5 and earlier and R28.2.7 and earlier; and OpenJDK 7 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Libraries. NOTE: the previous information is from the June and July 2013 CPU. Oracle has not commented on claims from another vendor that this issue allows remote attackers to bypass verification of XML signatures via vectors related to a "Missing check for [a] valid DOMCanonicalizationMethod canonicalization algorithm." | [
"cpe:2.3:a:oracle:jdk:1.6.0:update22:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update23:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update24:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update26:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update27:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update29:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update30:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update31:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update32:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update33:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update34:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update35:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update37:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update38:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update39:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update41:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jdk:1.6.0:update43:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*",
"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update1:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update10:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update11:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update13:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update15:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update17:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update2:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update3:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update4:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update5:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update6:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update7:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.7.0:update9:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jrockit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:openjdk:1.7.0:*:*:*:*:*:*:*"
] |
|
GHSA-jg48-xvhq-mrmw | This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Monterey 12.7.2, macOS Ventura 13.6.3, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. An app may be able to access user-sensitive data. | [] |
|
CVE-2016-4656 | The kernel in Apple iOS before 9.3.5 allows attackers to execute arbitrary code in a privileged context or cause a denial of service (memory corruption) via a crafted app. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-5092 | Heap-based buffer overflows in Novell eDirectory HTTP protocol stack (HTTPSTK) before 8.8 SP3 have unknown impact and attack vectors related to the (1) HTTP language header and (2) HTTP content-length header. | [
"cpe:2.3:a:novell:edirectory:*:sp2:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.5.12a:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.5.27:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp1:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp2:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp3:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp4:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp5:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp6:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp7:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp8:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3:sp9:windows:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.8_presp9:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.9:*:linux:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.9:*:solaris:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.9:*:windows_2000:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.9:*:windows_2003:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.7.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:*:linux:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:*:solaris:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:*:windows_2000:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8:*:windows_2003:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.1:*:linux:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.1:*:solaris:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.1:*:windows_2000:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.1:*:windows_2003:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.2:*:linux:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.2:*:solaris:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.2:*:windows_2000:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:8.8.2:*:windows_2003:*:*:*:*:*",
"cpe:2.3:a:novell:edirectory:85.20:*:*:*:*:*:*:*"
] |
|
CVE-2003-0357 | Multiple integer overflow vulnerabilities in Ethereal 0.9.11 and earlier allow remote attackers to cause a denial of service and possibly execute arbitrary code via the (1) Mount and (2) PPP dissectors. | [
"cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*"
] |
|
GHSA-5jxj-j7hg-xw4v | A hardcoded AES key in CipherUtils.java in the Java applet of konzept-ix publiXone before 2020.015 allows attackers to craft password-reset tokens or decrypt server-side configuration files. | [] |
|
GHSA-qc4q-2vxw-j8pc | Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects D6100 before 1.0.0.57, R7500 before 1.0.0.122, R7800 before 1.0.2.40, R9000 before 1.0.2.52, WNDR3700v4 before 1.0.2.92, WNDR4300 before 1.0.2.94, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, and WNR2000v5 before 1.0.0.62. | [] |
|
GHSA-h94r-w24g-cp37 | In Snapdragon (Mobile, Wear) in version MDM9206, MDM9607, MDM9635M, MDM9640, MDM9645, MDM9655, MSM8909W, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 450, SD 615/16/SD 415, SD 617, SD 625, SD 650/52, SD 810, SD 820, SD 835, Snapdragon_High_Med_2016, a double free of ASN1 heap memory used for EUTRA CAP container occurs during UTRAN to LTE Capability inquiry procedure. | [] |
|
CVE-2016-1010 | Integer overflow in Adobe Flash Player before 18.0.0.333 and 19.x through 21.x before 21.0.0.182 on Windows and OS X and before 11.2.202.577 on Linux, Adobe AIR before 21.0.0.176, Adobe AIR SDK before 21.0.0.176, and Adobe AIR SDK & Compiler before 21.0.0.176 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2016-0963 and CVE-2016-0993. | [
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk:*:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:x14j_firmware:t-ms14jakucb-1102.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_desktop_runtime:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:air_sdk_\\&_compiler:*:*:*:*:*:*:*:*"
] |
|
GHSA-m2gw-8mqj-wxvv | Unspecified vulnerability in the Textdroid (com.app.android.textdroid) application 2.5.2 for Android has unknown impact and attack vectors. | [] |
|
CVE-2025-26967 | WordPress Events Calendar for GeoDirectory plugin <= 2.3.14 - PHP Object Injection vulnerability | Deserialization of Untrusted Data vulnerability in Stiofan Events Calendar for GeoDirectory allows Object Injection. This issue affects Events Calendar for GeoDirectory: from n/a through 2.3.14. | [] |
GHSA-24jj-j75x-h48w | The Web3 – Crypto wallet Login & NFT token gating plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.6.0. This is due to incorrect authentication checking in the 'hidden_form_data' function. This makes it possible for authenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username. | [] |
|
CVE-2015-0844 | The WML/Lua API in Battle for Wesnoth 1.7.x through 1.11.x and 1.12.x before 1.12.2 allows remote attackers to read arbitrary files via a crafted (1) campaign or (2) map file. | [
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.8:beta1:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.9:beta2:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.10-1.8:beta3:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.11-1.8:beta4:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.12-1.8:beta5:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.13-1.8:beta6:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.14-1.8:beta7:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.7.15-1.8:rc1:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.9.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.11:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.12:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.13:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.14:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.15:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.16:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.17:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.18:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.11.19:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wesnoth:battle_for_wesnoth:1.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:21:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:22:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.