id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
listlengths 0
5.42k
|
---|---|---|---|
CVE-2021-26028
|
[20210308] - Core - Path Traversal within joomla/archive zip class
|
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] |
CVE-2022-25696
|
Memory corruption in display due to time-of-check time-of-use race condition during map or unmap in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables
|
[
"cpe:2.3:o:qualcomm:apq8053_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8053:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qualcomm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qualcomm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8_gen1_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd680_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd680:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd695_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd695:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd780g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd780g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx50m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx50m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm4125_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm4125:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8475_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8475p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8475p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3990_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3990:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn7851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn7851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-5870
|
Tweaker5 <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Button Shortcode
|
The Tweaker5 theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘url’ parameter within the theme's Button shortcode in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
|
[
"cpe:2.3:a:arnoldgoodway:tweaker5:*:*:*:*:*:wordpress:*:*"
] |
GHSA-5v93-w7mf-hc4q
|
A vulnerability has been identified in SINEMA Remote Connect Client (All versions < V3.2 SP2). The affected application does not expire the user session on reboot without logout. This could allow an attacker to bypass Multi-Factor Authentication.
|
[] |
|
GHSA-fpgv-fc8m-fmmm
|
In the Linux kernel, the following vulnerability has been resolved:icmp: prevent possible NULL dereferences from icmp_build_probe()First problem is a double call to __in_dev_get_rcu(), because
the second one could return NULL.if (__in_dev_get_rcu(dev) && __in_dev_get_rcu(dev)->ifa_list)Second problem is a read from dev->ip6_ptr with no NULL check:if (!list_empty(&rcu_dereference(dev->ip6_ptr)->addr_list))Use the correct RCU API to fix these.v2: add missing include <net/addrconf.h>
|
[] |
|
GHSA-xwx2-g2mj-g29r
|
Cross-site scripting (XSS) vulnerability in jax_linklists.php in Jack (tR) Jax LinkLists 1.00 allows remote attackers to inject arbitrary web script or HTML via the cat parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] |
|
CVE-2022-21510
|
Vulnerability in the Oracle Database - Enterprise Edition Sharding component of Oracle Database Server. For supported versions that are affected see note. Easily exploitable vulnerability allows low privileged attacker having Local Logon privilege with logon to the infrastructure where Oracle Database - Enterprise Edition Sharding executes to compromise Oracle Database - Enterprise Edition Sharding. While the vulnerability is in Oracle Database - Enterprise Edition Sharding, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle Database - Enterprise Edition Sharding. Note: None of the supported versions are affected. CVSS 3.1 Base Score 8.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H).
|
[
"cpe:2.3:a:oracle:database:-:*:*:*:enterprise:*:*:*"
] |
|
GHSA-97hh-rrpx-8434
|
An Incorrect Default Permissions vulnerability in Juniper Networks Junos OS allows an unauthenticated attacker with local access to the device to create a backdoor with root privileges. The issue is caused by improper directory permissions on a certain system directory, allowing an attacker with access to this directory to create a backdoor with root privileges.This issue affects Juniper Networks Junos OS:All versions prior to 20.4R3-S5;21.1 versions prior to 21.1R3-S4;21.2 versions prior to 21.2R3-S4;21.3 versions prior to 21.3R3-S3;21.4 versions prior to 21.4R3-S1.
|
[] |
|
GHSA-h4v8-pm3p-jrv2
|
Adobe Dimension versions 3.4.5 is affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] |
|
GHSA-jc6h-6j87-fx8m
|
An issue was discovered in GitLab Community and Enterprise Edition before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2. It has a Race Condition which could allow users to approve a merge request multiple times and potentially reach the approval count required to merge.
|
[] |
|
GHSA-4f29-4fj4-943j
|
Yamaha LTE VoIP Router(NVR700W firmware Rev.15.00.15 and earlier), Yamaha Gigabit VoIP Router(NVR510 firmware Rev.15.01.14 and earlier), Yamaha Gigabit VPN Router(RTX810 firmware Rev.11.01.33 and earlier, RTX830 firmware Rev.15.02.09 and earlier, RTX1200 firmware Rev.10.01.76 and earlier, RTX1210 firmware Rev.14.01.33 and earlier, RTX3500 firmware Rev.14.00.26 and earlier, and RTX5000 firmware Rev.14.00.26 and earlier), Yamaha Broadband VoIP Router(NVR500 firmware Rev.11.00.38 and earlier), and Yamaha Firewall(FWX120 firmware Rev.11.03.27 and earlier) allow remote attackers to cause a denial of service via unspecified vectors.
|
[] |
|
CVE-2024-45071
|
IBM WebSphere Application Server cross-site scripting
|
IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.
|
[
"cpe:2.3:a:ibm:websphere_application_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*"
] |
CVE-2025-25330
|
An issue in Boohee Technology Boohee Health iOS 13.0.13 allows attackers to access sensitive user information via supplying a crafted link.
|
[] |
|
CVE-2000-0071
|
IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions.
|
[
"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*"
] |
|
GHSA-7w35-8v2m-9grg
|
Insecure inherited permissions in some Intel(R) HID Event Filter software installers before version 2.2.2.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
|
[] |
|
CVE-2021-23420
|
Deserialization of Untrusted Data
|
This affects the package codeception/codeception from 4.0.0 and before 4.1.22, before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
|
[
"cpe:2.3:a:codeception:codeception:*:*:*:*:*:*:*:*"
] |
GHSA-463r-p989-2f9j
|
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
|
[] |
|
GHSA-9v9h-cgj8-h64p
|
Null pointer dereference in PKCS12 parsing
|
Issue summary: Processing a maliciously formatted PKCS12 file may lead OpenSSL
to crash leading to a potential Denial of Service attackImpact summary: Applications loading files in the PKCS12 format from untrusted
sources might terminate abruptly.A file in PKCS12 format can contain certificates and keys and may come from an
untrusted source. The PKCS12 specification allows certain fields to be NULL, but
OpenSSL does not correctly check for this case. This can lead to a NULL pointer
dereference that results in OpenSSL crashing. If an application processes PKCS12
files from an untrusted source using the OpenSSL APIs then that application will
be vulnerable to this issue.OpenSSL APIs that are vulnerable to this are: PKCS12_parse(),
PKCS12_unpack_p7data(), PKCS12_unpack_p7encdata(), PKCS12_unpack_authsafes()
and PKCS12_newpass().We have also fixed a similar issue in SMIME_write_PKCS7(). However since this
function is related to writing data we do not consider it security significant.The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue.
|
[] |
CVE-2024-12933
|
code-projects Simple Admin Panel updateItemController.php cross site scripting
|
A vulnerability was found in code-projects Simple Admin Panel 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file updateItemController.php. The manipulation of the argument p_name/p_desc leads to cross site scripting. The attack may be launched remotely.
|
[] |
CVE-2018-11451
|
A vulnerability has been identified in Firmware variant IEC 61850 for EN100 Ethernet module (All versions < V4.33), Firmware variant PROFINET IO for EN100 Ethernet module (All versions), Firmware variant Modbus TCP for EN100 Ethernet module (All versions), Firmware variant DNP3 TCP for EN100 Ethernet module (All versions), Firmware variant IEC104 for EN100 Ethernet module (All versions < V1.22), SIPROTEC 5 relays with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.80), SIPROTEC 5 relays with CPU variants CP200 and the respective Ethernet communication modules (All versions < V7.58). Specially crafted packets to port 102/tcp could cause a denial-of-service condition in the affected products. A manual restart is required to recover the EN100 module functionality of the affected devices. Successful exploitation requires an attacker with network access to send multiple packets to the affected products or modules. As a precondition the IEC 61850-MMS communication needs to be activated on the affected products or modules. No user interaction or privileges are required to exploit the vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the network functionality of the device, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known.
|
[
"cpe:2.3:o:siemens:dnp3_tcp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:iec_61850_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:iec104_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:modbus_tcp_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:profinet_io_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:en100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp200_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:cp300_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ke85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ss85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*"
] |
|
CVE-2008-1318
|
Unspecified vulnerability in MediaWiki 1.11 before 1.11.2 allows remote attackers to obtain sensitive "cross-site" information via the callback parameter in an API call for JavaScript Object Notation (JSON) formatted results.
|
[
"cpe:2.3:a:mediawiki:mediawiki:1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mediawiki:mediawiki:1.11.1:*:*:*:*:*:*:*"
] |
|
CVE-2002-0922
|
CGIScript.net csNews.cgi allows remote attackers to obtain database files via a direct URL-encoded request to (1) default%2edb or (2) default%2edb.style, or remote authenticated users to perform administrative actions via (3) a database parameter set to default%2edb.
|
[
"cpe:2.3:a:cgiscript.net:csnews:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cgiscript.net:csnews:1.0_professional:*:*:*:*:*:*:*"
] |
|
GHSA-vpw8-43wm-rxw5
|
Double free in endian_trait
|
An issue was discovered in the endian_trait crate through 2021-01-04 for Rust. A double drop can occur when a user-provided Endian impl panics.
|
[] |
GHSA-76q3-ghmm-vj23
|
In the Linux kernel, the following vulnerability has been resolved:ACPI: CPPC: Make rmw_lock a raw_spin_lockThe following BUG was triggered:=============================
[ BUG: Invalid wait context ]
6.12.0-rc2-XXX #406 Not taintedkworker/1:1/62 is trying to lock:
ffffff8801593030 (&cpc_ptr->rmw_lock){+.+.}-{3:3}, at: cpc_write+0xcc/0x370
other info that might help us debug this:
context-{5:5}
2 locks held by kworker/1:1/62:
#0: ffffff897ef5ec98 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2c/0x50
#1: ffffff880154e238 (&sg_policy->update_lock){....}-{2:2}, at: sugov_update_shared+0x3c/0x280
stack backtrace:
CPU: 1 UID: 0 PID: 62 Comm: kworker/1:1 Not tainted 6.12.0-rc2-g9654bd3e8806 #406
Workqueue: 0x0 (events)
Call trace:
dump_backtrace+0xa4/0x130
show_stack+0x20/0x38
dump_stack_lvl+0x90/0xd0
dump_stack+0x18/0x28
__lock_acquire+0x480/0x1ad8
lock_acquire+0x114/0x310
_raw_spin_lock+0x50/0x70
cpc_write+0xcc/0x370
cppc_set_perf+0xa0/0x3a8
cppc_cpufreq_fast_switch+0x40/0xc0
cpufreq_driver_fast_switch+0x4c/0x218
sugov_update_shared+0x234/0x280
update_load_avg+0x6ec/0x7b8
dequeue_entities+0x108/0x830
dequeue_task_fair+0x58/0x408
__schedule+0x4f0/0x1070
schedule+0x54/0x130
worker_thread+0xc0/0x2e8
kthread+0x130/0x148
ret_from_fork+0x10/0x20sugov_update_shared() locks a raw_spinlock while cpc_write() locks a
spinlock.To have a correct wait-type order, update rmw_lock to a raw spinlock and
ensure that interrupts will be disabled on the CPU holding it.[ rjw: Changelog edits ]
|
[] |
|
CVE-2017-8703
|
The Microsoft Windows Subsystem for Linux on Microsoft Windows 10 1703 allows a denial of service vulnerability when it improperly handles objects in memory, aka "Windows Subsystem for Linux Denial of Service Vulnerability".
|
[
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
] |
|
GHSA-2jpv-47cx-7mgq
|
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the libcommonprod.so binary.
|
[] |
|
CVE-2023-22756
|
Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
|
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
|
[
"cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*",
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*"
] |
CVE-2023-20220
|
Multiple vulnerabilities in the web-based management interface of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system. To exploit these vulnerabilities, the attacker must have valid device credentials, but does not need Administrator privileges. These vulnerabilities are due to insufficient validation of user-supplied input for certain configuration options. An attacker could exploit these vulnerabilities by using crafted input within the device configuration GUI. A successful exploit could allow the attacker to execute arbitrary commands on the device, including on the underlying operating system, which could also affect the availability of the device.
|
[
"cpe:2.3:h:cisco:firepower_management_center:-:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:secure_firewall_management_center:*:*:*:*:*:*:*:*"
] |
|
GHSA-4j59-hfw6-6w7h
|
Downloads Resources over HTTP in cmake
|
Affected versions of `cmake` insecurely download an executable over an unencrypted HTTP connection.In scenarios where an attacker has a privileged network position, it is possible to intercept the response and replace the executable with a malicious one, resulting in code execution on the system running `cmake`.RecommendationNo patch is currently available for this vulnerability.The best mitigation is currently to avoid using this package, using a different package if available, or installing the cmake binaries via a system package manager, such as `apt-get`.Alternatively, the risk of exploitation can be reduced by ensuring that this package is not installed while connected to a public network. If the package is installed on a private network, the only people who can exploit this vulnerability are those who have compromised your network or those who have privileged access to your ISP, such as Nation State Actors or Rogue ISP Employees.
|
[] |
CVE-2013-5016
|
Symantec Critical System Protection (SCSP) before 5.2.9, when installed on an unpatched Windows Server 2003 R2 platform, allows remote attackers to bypass policy settings via unspecified vectors.
|
[
"cpe:2.3:a:broadcom:symantec_critical_system_protection:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_2003_server:*:r2:*:*:*:*:*:*"
] |
|
CVE-2017-13681
|
Symantec Endpoint Protection prior to SEP 12.1 RU6 MP9 could be susceptible to a privilege escalation vulnerability, which is a type of issue that allows a user to gain elevated access to resources that are normally protected at lower access levels. In the circumstances of this issue, the capability of exploit is limited by the need to perform multiple file and directory writes to the local filesystem and as such, is not feasible in a standard drive-by type attack.
|
[
"cpe:2.3:a:symantec:endpoint_protection:*:m9:*:*:*:*:*:*"
] |
|
GHSA-582f-p4pg-xc74
|
Regular Expression Denial of Service in csv-parse
|
Versions of `csv-parse` prior to 4.4.6 are vulnerable to Regular Expression Denial of Service. The `__isInt()` function contains a malformed regular expression that processes large specially-crafted input very slowly, leading to a Denial of Service. This is triggered when using the `cast` option.RecommendationUpgrade to version 4.4.6 or later.
|
[] |
GHSA-4m2m-4c4q-xx7m
|
RG-NBR-E Enterprise Gateway RG-NBR2100G-E was discovered to contain an arbitrary file read vulnerability via the url parameter in check.php.
|
[] |
|
CVE-2018-6032
|
Insufficient policy enforcement in Blink in Google Chrome prior to 64.0.3282.119 allowed a remote attacker to potentially leak user cross-origin data via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
GHSA-4rhq-vpg8-62j3
|
In Whitechapel, there is a possible out of bounds read due to memory corruption. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
|
[] |
|
GHSA-fgjm-pghw-gf5m
|
In telephony service, there is a possible missing permission check. This could lead to remote information disclosure no additional execution privileges needed
|
[] |
|
CVE-2021-0938
|
In memzero_explicit of compiler-clang.h, there is a possible bypass of defense in depth due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-171418586References: Upstream kernel
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
GHSA-96xr-96m2-7jh5
|
Directory traversal vulnerability in phpinc/news.php in actSite 1.56 allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the do parameter.
|
[] |
|
CVE-2024-30645
|
Tenda AC15V1.0 V15.03.20_multi has a command injection vulnerability via the deviceName parameter.
|
[
"cpe:2.3:o:tenda:ac15v1.0_firmware:15.03.20_multi:*:*:*:*:*:*:*"
] |
|
GHSA-pf33-g3xv-r9v8
|
Multiple cross-site scripting (XSS) vulnerabilities in DKScript.com Dragon's Kingdom Script 1.0 allow remote attackers to inject arbitrary web script or HTML via a javascript URI in the SRC attribute of an IMG element in the (1) Subject and (2) Message fields in a do=write (aka Send Mail Message) action in gamemail.php; the (3) Gender, (4) Country/Location, (5) MSN Messenger, (6) AOL Instant Messenger, (7) Yahoo Instant Messenger, and (8) ICQ fields in a do=onlinechar (aka Edit your Profile) action in index.php, as accessed by dk.php; a javascript URI in the SRC attribute of an IMG element in the (9) Title and (10) Message fields in a do=new (aka Create Thread) action in general.php; and a javascript URI in the SRC attribute of an IMG element in unspecified fields in (11) other Forum posts and (12) Forum replies.
|
[] |
|
CVE-2010-2455
|
Opera does not properly manage the address bar between the request to open a URL and the retrieval of the new document's content, which might allow remote attackers to conduct spoofing attacks via a crafted HTML document, a related issue to CVE-2010-1206.
|
[
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*"
] |
|
GHSA-qph7-xc8r-fqmj
|
Digigram's PYKO-OUT audio-over-IP (AoIP) web-server does not require a password by default, allowing any attacker with the target IP address to connect and compromise the device, potentially pivoting to connected network or hardware devices.
|
[] |
|
CVE-2016-4898
|
The datamover module in the Linux version of NovaBACKUP DataCenter before 09.06.03.0353 is vulnerable to remote command execution via unspecified attack vectors.
|
[
"cpe:2.3:a:novastor:novabackup_datacenter:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-32005
|
Local File Inclusion in NiceGUI leaflet component
|
NiceGUI is an easy-to-use, Python-based UI framework. A local file inclusion is present in the NiceUI leaflet component when requesting resource files under the `/_nicegui/{__version__}/resources/{key}/{path:path}` route. As a result any file on the backend filesystem which the web server has access to can be read by an attacker with access to the NiceUI leaflet website. This vulnerability has been addressed in version 1.4.21. Users are advised to upgrade. There are no known workarounds for this vulnerability.
|
[
"cpe:2.3:a:zauberzeug:nicegui:*:*:*:*:*:*:*:*"
] |
CVE-2014-7336
|
The Taking Your Company Public (aka biz.app4mobile.app_016e43d03ee54d1facd6c9532a00e724.app) application 1.28.44.441 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
|
[
"cpe:2.3:a:princetoncorporatesolutions:taking_your_company_public:1.28.44.441:*:*:*:*:android:*:*"
] |
|
CVE-2004-0336
|
LAN SUITE Web Mail 602Pro allows remote attackers to gain sensitive information via the mail login form, which contains the path to the mail directory.
|
[
"cpe:2.3:a:software602:602pro_lan_suite:2002:*:*:*:*:*:*:*",
"cpe:2.3:a:software602:602pro_lan_suite:2003:*:*:*:*:*:*:*"
] |
|
CVE-2023-37467
|
Discourse CSP nonce reuse vulnerability for anonymous users
|
Discourse is an open source discussion platform. Prior to version 3.1.0.beta7 of the `beta` and `tests-passed` branches, a CSP (Content Security Policy) nonce reuse vulnerability was discovered could allow cross-site scripting (XSS) attacks to bypass CSP protection for anonymous (i.e. unauthenticated) users. There are no known XSS vectors at the moment, but should one be discovered, this vulnerability would allow the XSS attack to bypass CSP and execute successfully. This vulnerability isn't applicable to logged-in users. Version 3.1.0.beta7 contains a patch. The stable branch doesn't have this vulnerability. A workaround to prevent the vulnerability is to disable Google Tag Manager, i.e., unset the `gtm container id` setting.
|
[
"cpe:2.3:a:discourse:discourse:*:*:*:*:*:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta6b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.1.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta13b:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.5.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.6.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta17:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:1.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.0.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.1.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.2.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.3.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.4.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.5.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.6.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.7.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.8.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta10:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta11:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta12:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta13:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta14:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta4:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta6:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta7:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta8:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:2.9.0:beta9:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta15:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.0.0:beta16:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta1:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta2:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta3:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta5:*:*:beta:*:*:*",
"cpe:2.3:a:discourse:discourse:3.1.0:beta6:*:*:beta:*:*:*"
] |
GHSA-wj86-wmr8-wpx4
|
Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Backend - Dashboard parameter in the Languages Menu component.
|
[] |
|
GHSA-6j47-h927-wmwr
|
** DISPUTED ** The ipv6_getsockopt_sticky function in the kernel in Red Hat Enterprise Linux (RHEL) Beta 5.1.0 allows local users to obtain sensitive information (kernel memory contents) via a negative value of the len parameter. NOTE: this issue has been disputed in a bug comment, stating that "len is ignored when copying header info to the user's buffer."
|
[] |
|
CVE-2021-38131
|
Cross-Site Scripting (XSS) Vulnerability
|
Possible Cross-Site Scripting (XSS) Vulnerability
in eDirectory has been discovered in
OpenText™ eDirectory 9.2.5.0000.
|
[
"cpe:2.3:a:microfocus:edirectory:*:*:*:*:*:*:*:*"
] |
GHSA-47gg-6526-hq9v
|
The DB service in IBM System Networking Switch Center (SNSC) before 7.3.1.5 and Lenovo Switch Center before 8.1.2.0 allows remote attackers to obtain sensitive administrator-account information via a request on port 40999, as demonstrated by an improperly encrypted password.
|
[] |
|
CVE-2019-6196
|
A symbolic link vulnerability in some Lenovo installation packages, prior to version 1.2.9.3, could allow privileged file operations during file extraction and installation.
|
[
"cpe:2.3:a:lenovo:installation_package:*:*:*:*:*:*:*:*"
] |
|
GHSA-jcff-w8hg-gx77
|
EGavilanMedia User Registration and Login System With Admin Panel 1.0 is affected by SQL injection in the User Login Page.
|
[] |
|
GHSA-6fr4-8mj5-5xc5
|
kmmodreg in HP-UX 11.11, 11.04 and 11.00 allows local users to create arbitrary world-writeable files via a symlink attack on the (1) /tmp/.kmmodreg_lock and (2) /tmp/kmpath.tmp temporary files.
|
[] |
|
CVE-2022-0136
|
A vulnerability was discovered in GitLab versions 10.5 to 14.5.4, 14.6 to 14.6.4, and 14.7 to 14.7.1. GitLab was vulnerable to a blind SSRF attack through the Project Import feature.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] |
|
GHSA-f7rw-4wx7-r7g2
|
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Computer Graphics Metafile (CGM) file, aka "CGM File Format Memory Corruption Vulnerability."
|
[] |
|
CVE-2011-1984
|
WINS in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 allows local users to gain privileges by sending crafted packets over the loopback interface, aka "WINS Local Elevation of Privilege Vulnerability."
|
[
"cpe:2.3:o:microsoft:windows_2003_server:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2003:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x32:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:*:sp2:x64:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:*:x64:*:*:*:*:*"
] |
|
GHSA-c8jh-vcjh-fx2w
|
usememos/memos vulnerable to stored cross-site scripting (XSS)
|
usememos/memos is an open-source, self-hosted memo hub with knowledge management and socialization. Memos prior to 0.9.0 has a feature to upload file and display it, and by uploading a crafted SVG file, an attacker could perform a stored cross-site scripting attack with the image direct link. This was patched in version 0.9.0.
|
[] |
CVE-2024-44132
|
This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15. An app may be able to break out of its sandbox.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-14781
|
Medtronic MiniMed MMT-500/MMT-503 Remote Controllers Authentication Bypass by Capture-replay
|
Medtronic MiniMed MMT
devices when paired with a remote controller and having the “easy bolus” and “remote bolus” options enabled (non-default), are vulnerable to a capture-replay attack. An attacker can capture the wireless transmissions between the remote controller and the pump and replay them to cause an insulin (bolus) delivery.
|
[
"cpe:2.3:o:medtronicdiabetes:508_minimed_insulin_pump_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:508_minimed_insulin_pump:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:522_paradigm_real-time_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:522_paradigm_real-time:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:722_paradigm_real-time_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:722_paradigm_real-time:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:523_paradigm_revel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:523_paradigm_revel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:723_paradigm_revel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:723_paradigm_revel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:523k_paradigm_revel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:523k_paradigm_revel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:723k_paradigm_revel_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:723k_paradigm_revel:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:551_minimed_530g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:551_minimed_530g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:medtronicdiabetes:751_minimed_530g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:medtronicdiabetes:751_minimed_530g:-:*:*:*:*:*:*:*"
] |
CVE-2019-15587
|
In the Loofah gem for Ruby through v2.3.0 unsanitized JavaScript may occur in sanitized output when a crafted SVG element is republished.
|
[
"cpe:2.3:a:loofah_project:loofah:*:*:*:*:*:ruby:*:*",
"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-cgqm-vxrq-vp47
|
The VikRentCar Car Rental Management System plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the do_updatecar and createcar functions in all versions up to, and including, 1.4.3. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server, which may make remote code execution possible.
|
[] |
|
GHSA-x4qg-m523-2cjh
|
sshd program in the Rapidstream 2.1 Beta VPN appliance has a hard-coded "rsadmin" account with a null password, which allows remote attackers to execute arbitrary commands via ssh.
|
[] |
|
GHSA-p2xq-64qm-cf6f
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HasThemes HT Mega allows Stored XSS.This issue affects HT Mega: from n/a through 2.4.3.
|
[] |
|
GHSA-444g-7h8r-45m8
|
Internet Communication Manager (aka ICMAN.exe or ICM) in SAP NetWeaver Application Server 6.x and 7.x, possibly only on Windows, allows remote attackers to cause a denial of service (process crash) via a URI of a certain length that contains a sap-isc-key parameter, related to configuration of a web cache.
|
[] |
|
CVE-2008-1624
|
Directory traversal vulnerability in v2demo/page.php in Jshop Server 1.x through 2.x allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the xPage parameter.
|
[
"cpe:2.3:a:whorl_ltd:jshop_server:1:*:*:*:*:*:*:*",
"cpe:2.3:a:whorl_ltd:jshop_server:2:*:*:*:*:*:*:*"
] |
|
GHSA-qqr6-vm23-m488
|
Galaxy cross-site scripting (XSS)
|
The Galaxy Project Galaxy version v14.10 contains a CWE-79: Improper Neutralization of Input During Web Page Generation vulnerability in Many templates used in the Galaxy server did not properly sanitize user's input, which would allow for cross-site scripting (XSS) attacks. In this form of attack, a malicious person can create a URL which, when opened by a Galaxy user or administrator, would allow the malicious user to execute arbitrary Javascript. that can result in Arbitrary JavaScript code execution. This attack appear to be exploitable via The victim must interact with component on page witch contains injected JavaScript code.. This vulnerability appears to have been fixed in v14.10.1, v15.01.
|
[] |
CVE-2020-3496
|
Cisco Small Business Smart and Managed Switches Denial of Service Vulnerability
|
A vulnerability in the IPv6 packet processing engine of Cisco Small Business Smart and Managed Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet through an affected device. A successful exploit could allow the attacker to cause the switch management CLI to stop responding, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
|
[
"cpe:2.3:o:cisco:sg200-50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-50fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-50fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-26fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-26fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-18_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-10fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-10fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg200-08p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg200-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-24fp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-24fp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf200-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf200-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28pp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28pp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf302-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf302-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf300-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf300-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-10sfp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-10sfp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-28mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg300-52mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg300-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500xg-8f8t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500xg-8f8t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf500-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf500-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500-52p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500-52p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg500x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg500x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-08_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-08:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-08hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-08hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-18_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-18:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-26p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-26p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg250-50p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg250-50p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf250-48hp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf250-48hp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-10mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-10mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg355-10p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg355-10p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350-28mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350-28mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf350-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf350-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-2f10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-2f10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-24f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-24t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-24t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350xg-48t_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350xg-48t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg350x-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg350x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-16ft_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-16ft:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-24ft_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-24ft:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-12f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-12f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-24f_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-24f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sx550x-52_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sx550x-52:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-24mpp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-24mpp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sg550x-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sg550x-48mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-24mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-24mp:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48p_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:sf550x-48mp_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:sf550x-48mp:-:*:*:*:*:*:*:*"
] |
CVE-2013-1920
|
Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
|
[
"cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:3.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:xen:xen:4.2.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-18818
|
strapi before 3.0.0-beta.17.5 mishandles password resets within packages/strapi-admin/controllers/Auth.js and packages/strapi-plugin-users-permissions/controllers/Auth.js.
|
[
"cpe:2.3:a:strapi:strapi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha10.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha10.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha10.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha11:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha11.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha11.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha11.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.1.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.4:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.5:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.6:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha12.7.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha13:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha13.0.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha13.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14.1.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14.4.0:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha14.5:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha15:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha16:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha17:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha18:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha19:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha20:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha21:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha22:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha23:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha23.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha24:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha24.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha25:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha25.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha25.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha26:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha26.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha26.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha4:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha4.8:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha5.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha5.5:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha6.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha6.4:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha6.7:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha7.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha7.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha8:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha8.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha9:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha9.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:alpha9.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta0:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta10:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta11:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta12:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta13:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta14:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta15:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.4:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.5:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.6:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.7:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta16.8:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta17:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta17.1:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta17.2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta17.3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta17.4:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:strapi:strapi:3.0.0:beta9:*:*:*:*:*:*"
] |
|
GHSA-p98r-qmj8-g8hj
|
Tenda AC18 v15.03.05.19 is vulnerable to Buffer Overflow in the formSetPPTPServer function via the endIp parameter.
|
[] |
|
CVE-2021-31843
|
Improper access control vulnerability in McAfee ENS for Windows
|
Improper privileges management vulnerability in McAfee Endpoint Security (ENS) Windows prior to 10.7.0 September 2021 Update allows local users to access files which they would otherwise not have access to via manipulating junction links to redirect McAfee folder operations to an unintended location.
|
[
"cpe:2.3:a:mcafee:endpoint_security:*:*:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:-:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:april_2020:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:april_2021:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:february_2020:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:february_2021:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:july_2020:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:june_2021:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:november_2020:*:*:*:windows:*:*",
"cpe:2.3:a:mcafee:endpoint_security:10.7.0:september_2020:*:*:*:windows:*:*"
] |
CVE-2017-0417
|
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application. Product: Android. Versions: 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1. Android ID: A-32705438.
|
[
"cpe:2.3:o:google:android:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*"
] |
|
GHSA-3g3r-759p-gmmj
|
TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter week, sTime, and eTime in the setParentalRules function.
|
[] |
|
CVE-2019-14089
|
u'Keymaster attestation key and device IDs provisioning which is a one time process is incorrectly allowed to be re-provisioned after a user data erase or a factory reset' in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in Kamorta, Nicobar, QCS404, QCS610, Rennell, SA515M, SA6155P, SC7180, SC8180X, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130
|
[
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs404_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs404:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc7180_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc7180:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sc8180x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sc8180x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] |
|
CVE-2022-1991
|
Fast Food Ordering System Master List Master.php cross site scripting
|
A vulnerability classified as problematic has been found in Fast Food Ordering System 1.0. Affected is the file Master.php of the Master List. The manipulation of the argument Description with the input foo "><img src="" onerror="alert(document.cookie)"> leads to cross site scripting. It is possible to launch the attack remotely but it requires authentication. Exploit details have been disclosed to the public.
|
[
"cpe:2.3:a:fast_food_ordering_system_project:fast_food_ordering_system:1.0:*:*:*:*:*:*:*"
] |
GHSA-p9wc-6qg4-wxc8
|
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 contains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data. IBM X-Force ID: 176206.
|
[] |
|
GHSA-3p47-qj26-6gg7
|
In the Linux kernel, the following vulnerability has been resolved:mlxbf-bootctl: use sysfs_emit_at() in secure_boot_fuse_state_show()A warning is seen when running the latest kernel on a BlueField SOC:
[251.512704] ------------[ cut here ]------------
[251.512711] invalid sysfs_emit: buf:0000000003aa32ae
[251.512720] WARNING: CPU: 1 PID: 705264 at fs/sysfs/file.c:767 sysfs_emit+0xac/0xc8The warning is triggered because the mlxbf-bootctl driver invokes
"sysfs_emit()" with a buffer pointer that is not aligned to the
start of the page. The driver should instead use "sysfs_emit_at()"
to support non-zero offsets into the destination buffer.
|
[] |
|
CVE-2017-7542
|
The ip6_find_1stfragopt function in net/ipv6/output_core.c in the Linux kernel through 4.12.3 allows local users to cause a denial of service (integer overflow and infinite loop) by leveraging the ability to open a raw socket.
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
GHSA-jq68-96jh-4wjh
|
The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.
|
[] |
|
CVE-2023-37280
|
Pimcore admin UI vulnerable to Cross-site Scripting in two factor authentication setup page
|
Pimcore Admin Classic Bundle provides a Backend UI for Pimcore based on the ExtJS framework. An admin who has not setup two factor authentication before is vulnerable for this attack, without need for any form of privilege, causing the application to execute arbitrary scripts/HTML content. This vulnerability has been patched in version 1.0.3.
|
[
"cpe:2.3:a:pimcore:admin_classic_bundle:*:*:*:*:*:pimcore:*:*"
] |
GHSA-f624-74px-f7hv
|
A vulnerability was found in TOTOLINK EX1800T up to 9.1.0cu.2112_B20220316. It has been classified as critical. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument admpass leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] |
|
CVE-2014-3651
|
JBoss KeyCloak before 1.0.3.Final allows remote attackers to cause a denial of service (resource consumption) via a large value in the size parameter to auth/qrcode, related to QR code generation.
|
[
"cpe:2.3:a:keycloak:keycloak:*:*:*:*:*:*:*:*"
] |
|
GHSA-wmh3-2439-2hpr
|
Nginx NJS v0.7.2 was discovered to contain a segmentation violation in the function njs_string_offset at src/njs_string.c.
|
[] |
|
CVE-2023-53097
|
powerpc/iommu: fix memory leak with using debugfs_lookup()
|
In the Linux kernel, the following vulnerability has been resolved:
powerpc/iommu: fix memory leak with using debugfs_lookup()
When calling debugfs_lookup() the result must have dput() called on it,
otherwise the memory will leak over time. To make things simpler, just
call debugfs_lookup_and_remove() instead which handles all of the logic
at once.
|
[] |
CVE-2015-0591
|
Cisco Unified Communications Domain Manager (UCDM) 10 allows remote attackers to cause a denial of service (daemon hang and GUI outage) via a flood of malformed TCP packets, aka Bug ID CSCur44177.
|
[
"cpe:2.3:a:cisco:unified_communications_domain_manager:10.0:*:*:*:*:*:*:*"
] |
|
GHSA-57gp-qx9r-6m7m
|
A vulnerability in the boot logic of Cisco IOS XE Software could allow an authenticated, local attacker with level 15 privileges or an unauthenticated attacker with physical access to execute arbitrary code on the underlying Linux operating system of an affected device. This vulnerability is due to incorrect validations of specific function arguments that are passed to the boot script. An attacker could exploit this vulnerability by tampering with a specific file, which an affected device would process during the initial boot process. On systems that are protected by the Unified Extensible Firmware Interface (UEFI) secure boot feature, a successful exploit could allow the attacker to execute unsigned code at boot time and bypass the image verification check in the secure boot process of the affected device.
|
[] |
|
CVE-2024-55959
|
Northern.tech Mender Client 4.x before 4.0.5 has Insecure Permissions.
|
[] |
|
GHSA-3f9v-x6pf-3296
|
The tr_rx function in ibmtr.c for Linux kernel 2.6.19 assigns the wrong flag to the ip_summed field, which allows remote attackers to cause a denial of service (memory corruption) via crafted packets that cause the kernel to interpret another field as an offset.
|
[] |
|
CVE-2001-1212
|
Cross-site scripting vulnerability in catgy.cgi for Aktivate 1.03 allows remote attackers to execute arbitrary Javascript via the desc parameter.
|
[
"cpe:2.3:a:aktivate:aktivate:1.03:*:*:*:*:*:*:*"
] |
|
GHSA-v735-hrpq-c278
|
A reflected Cross-site Scripting (XSS) vulnerability affecting 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session.
|
[] |
|
GHSA-m5gv-wj6x-54cq
|
The (1) fwdrv.sys and (2) khips.sys drivers in Sunbelt Kerio Personal Firewall 4.3.268 and earlier do not validate arguments passed through to SSDT functions, including NtCreateFile, NtDeleteFile, NtLoadDriver, NtMapViewOfSection, NtOpenFile, and NtSetInformationFile, which allows local users to cause a denial of service (crash) and possibly other impacts via unspecified vectors.
|
[] |
|
CVE-2020-0970
|
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0968.
|
[
"cpe:2.3:a:microsoft:chakracore:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
GHSA-mjqv-xhgm-gx8c
|
IO FinNet tss-lib vulnerable to timing attack from non-constant time scalar arithmetic
|
io.finnet tss-lib before 2.0.0 can leak the lambda value of a private key via a timing side-channel attack because it relies on Go big.Int, which is not constant time for Cmp, modular exponentiation, or modular inverse. An example leak is in crypto/paillier/paillier.go. (bnb-chain/tss-lib and thorchain/tss are also affected.)
|
[] |
CVE-2023-29296
|
[Cloud] Customer suspects IDOR vulnerability
|
Adobe Commerce versions 2.4.6 (and earlier), 2.4.5-p2 (and earlier) and 2.4.4-p3 (and earlier) are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. A low-privileged attacker could leverage this vulnerability to modify a minor functionality of another user's data. Exploitation of this issue does not require user interaction.
|
[
"cpe:2.3:a:adobe:commerce:2.3.7:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.3.7:p4-ext2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.0:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.1:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.2:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.3:ext-2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
"cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.4:p3:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
"cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*"
] |
GHSA-m93w-4fxv-r35v
|
PocketBase performs password auth and OAuth2 unverified email linking
|
**In order to be exploited you must have both OAuth2 and Password auth methods enabled.**A possible attack scenario could be:a malicious actor register with the targeted user's email (it is unverified)at some later point in time the targeted user stumble on your app and decides to sign-up with OAuth2 (_this step could be also initiated by the attacker by sending an invite email to the targeted user_)on successful OAuth2 auth we search for an existing PocketBase user matching with the OAuth2 user's email and associate thembecause we haven't changed the password of the existing PocketBase user during the linking, the malicious actor has access to the targeted user account and will be able to login with the initially created email/passwordTo prevent this for happening we now reset the password for this specific case if the previously created user wasn't verified (an exception to this is if the linking is explicit/manual, aka. when you send `Authorization:TOKEN` with the OAuth2 auth call).Additionally to warn existing users we now send an email alert in case the user has logged in with password but has at least one OAuth2 account linked. It looks something like:_Hello,
Just to let you know that someone has logged in to your Acme account using a password while you already have OAuth2 GitLab auth linked.
If you have recently signed in with a password, you may disregard this email.
**If you don't recognize the above action, you should immediately change your Acme account password.**
Thanks,
Acme team_The flow will be further improved with the [ongoing refactoring](https://github.com/pocketbase/pocketbase/discussions/4355) and we will start sending emails for "unrecognized device" logins (OTP and MFA is already implemented and will be available with the next v0.23.0 release in the near future).
|
[] |
CVE-2017-9994
|
libavcodec/webp.c in FFmpeg before 2.8.12, 3.0.x before 3.0.8, 3.1.x before 3.1.8, 3.2.x before 3.2.5, and 3.3.x before 3.3.1 does not ensure that pix_fmt is set, which allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file, related to the vp8_decode_mb_row_no_filter and pred8x8_128_dc_8_c functions.
|
[
"cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*"
] |
|
CVE-2024-10571
|
Chartify – WordPress Chart Plugin <= 2.9.5 - Unauthenticated Local File Inclusion via source
|
The Chartify – WordPress Chart Plugin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.9.5 via the 'source' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
|
[
"cpe:2.3:a:ays-pro:chartify:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ays-pro:chartify:*:*:*:*:free:wordpress:*:*"
] |
GHSA-35w5-h9v9-m2qp
|
Unrestricted Upload of File with Dangerous Type vulnerability in Vasilis Kerasiotis Affiliator allows Upload a Web Shell to a Web Server.This issue affects Affiliator: from n/a through 2.1.3.
|
[] |
|
CVE-2015-3380
|
Multiple cross-site request forgery (CSRF) vulnerabilities in the Feature Set module for Drupal allow remote attackers to hijack the authentication of administrators for requests that (1) enable or (2) disable a module via unspecified vectors.
|
[
"cpe:2.3:a:funnymonkey:feature_set:*:*:*:*:*:drupal:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.