id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
CVE-2023-1243 | Cross-site Scripting (XSS) - Stored in answerdev/answer | Cross-site Scripting (XSS) - Stored in GitHub repository answerdev/answer prior to 1.0.6. | [
"cpe:2.3:a:answer:answer:*:*:*:*:*:*:*:*"
]
| null | null | 6 | null |
CVE-2022-3746 | A potential vulnerability was discovered in LCFC BIOS for some Lenovo consumer notebook models that could allow a local attacker with elevated privileges to cause some peripherals to work abnormally due to an exposed Embedded Controller (EC) interface. | [
"cpe:2.3:o:lenovo:ideapad_1_14iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_14iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1_14igl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_14igl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1_15iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_15iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1_15igl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1_15igl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1-14ijl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1-14ijl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_1-15ijl7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_1-15ijl7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3_14iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3_14iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3_15iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3_15iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3_17iau7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3_17iau7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5_15ial7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5_15ial7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3-15iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3-15iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:l3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:l3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_15iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_15iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_15iah7h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_15iah7h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro_16iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro_16iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro_16iah7h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro_16iah7h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5_pro-16ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5_pro-16ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh05h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh05h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15imh6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15imh6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-15ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-15ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17imh05h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17imh05h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5-17ith6h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5-17ith6h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5p-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5p-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_5p-15imh05h_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_5p-15imh05h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7_16iax7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7_16iax7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:legion_7-16ithg6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:legion_7-16ithg6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s14_g2_itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s14_g2_itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s14_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s14_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_carbon_13iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_carbon_13iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_prox_14iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_prox_14iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_9_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_9_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15p_imh_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15p_imh:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2_ijl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2_ijl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2_ijl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2_ijl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17_g3_iap_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17_g3_iap:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:s540-13itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:s540-13itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_7_pro-14ihu5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_7_pro-14ihu5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:slim_9-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:slim_9-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:thinkbook_15p_g2_ith_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:thinkbook_15p_g2_ith:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g1-iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g1-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v14-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v14-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g1-iml_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g1-iml:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v15-igl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v15-igl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17_g2-itl_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17_g2-itl:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:v17-iil_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:v17-iil:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7_14ial7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7_14ial7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7_16iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7_16iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7_16iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7_16iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7-14itl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7-14itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_7-15itl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_7-15itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_9_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_9_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_carbon_13iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_carbon_13iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro_14iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro_14iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14ihu5_o_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14ihu5_o:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_pro-14itl5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_pro-14itl5:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_7_prox_14iah7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_7_prox_14iah7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_9_14iap7_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_9_14iap7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:yoga_slim_9-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:yoga_slim_9-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14igl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14igl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-14itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-14itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15itl05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15itl05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-15itl6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-15itl6:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_3-17iml05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_3-17iml05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_5-15iil05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_5-15iil05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_creator_5-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_creator_5-15imh05:-:*:*:*:*:*:*:*",
"cpe:2.3:o:lenovo:ideapad_gaming_3-15imh05_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:lenovo:ideapad_gaming_3-15imh05:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | null |
|
CVE-2022-22349 | IBM Sterling External Authentication Server 3.4.3.2, 6.0.2.0, and 6.0.3.0 is vulnerable to path traversals, due to not properly validating RESTAPI configuration data. An authorized user could import invalid data which could be used for an attack. IBM X-Force ID: 220144. | [
"cpe:2.3:a:ibm:sterling_external_authentication_server:3.4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_external_authentication_server:6.0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:sterling_external_authentication_server:6.0.3.0:*:*:*:*:*:*:*"
]
| null | null | 4.3 | null |
|
RHSA-2023:1469 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: net: CPU soft lockup in TC mirred egress-to-ingress action kernel: tun: avoid double free in tun_free_netdev ALSA: pcm: Move rwsem lock inside snd_ctl_elem_read to prevent UAF | [
"cpe:/a:redhat:enterprise_linux:9::nfv",
"cpe:/a:redhat:enterprise_linux:9::realtime"
]
| null | 7.8 | null | null |
CVE-2019-10094 | A carefully crafted package/compressed file that, when unzipped/uncompressed yields the same file (a quine), causes a StackOverflowError in Apache Tika's RecursiveParserWrapper in versions 1.7-1.21. Apache Tika users should upgrade to 1.22 or later. | [
"cpe:2.3:a:apache:tika:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 6.8 |
|
CVE-2010-3415 | Google Chrome before 6.0.472.59 does not properly implement Geolocation, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2023-48751 | WordPress Participants Database Plugin <= 2.5.5 is vulnerable to Broken Access Control | Missing Authorization, Cross-Site Request Forgery (CSRF) vulnerability in Roland Barker, xnau webdesign Participants Database allows Accessing Functionality Not Properly Constrained by ACLs, Cross Site Request Forgery.This issue affects Participants Database: from n/a through 2.5.5.
| [
"cpe:2.3:a:xnau:participants_database:*:*:*:*:*:wordpress:*:*"
]
| null | 4.3 | null | null |
GHSA-7m27-7836-w9w2 | Buffer overflow in Mozilla Firefox 3.6.x before 3.6.14, Thunderbird before 3.1.8, and SeaMonkey before 2.0.12 might allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted JPEG image. | []
| null | null | null | null |
|
CVE-2018-8269 | A denial of service vulnerability exists when OData Library improperly handles web requests, aka "OData Denial of Service Vulnerability." This affects Microsoft.Data.OData. | [
"cpe:2.3:a:microsoft:microsoft.data.odata:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2015-4382 | Multiple cross-site request forgery (CSRF) vulnerabilities in the Invoice module 6.x-1.x before 6.x-1.2 and 7.x-1.x before 7.x-1.3 for Drupal allow remote attackers to hijack the authentication of arbitrary users for requests that (1) create, (2) delete, or (3) alter invoices via unspecified vectors. | [
"cpe:2.3:a:invoice_project:invoice:6.x-1.1:*:*:*:*:drupal:*:*",
"cpe:2.3:a:invoice_project:invoice:7.x-1.x-dev:*:*:*:*:drupal:*:*"
]
| null | null | null | 6.8 |
|
CVE-2024-43410 | Russh has an OOM Denial of Service due to allocation of untrusted amount | Russh is a Rust SSH client & server library. Allocating an untrusted amount of memory allows any unauthenticated user to OOM a russh server. An SSH packet consists of a 4-byte big-endian length, followed by a byte stream of this length.
After parsing and potentially decrypting the 4-byte length, russh allocates enough memory for this bytestream, as a performance optimization to avoid reallocations later. But this length is entirely untrusted and can be set to any value by the client, causing this much memory to be allocated, which will cause the process to OOM within a few such requests. This vulnerability is fixed in 0.44.1. | [
"cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*"
]
| null | 7.5 | null | null |
GHSA-2fc8-2w75-6pjh | Zimbra Collaboration 8.7.x - 8.8.11P2 contains persistent XSS. | []
| null | null | null | null |
|
CVE-2019-19842 | emfd in Ruckus Wireless Unleashed through 200.7.10.102.64 allows remote attackers to execute OS commands via a POST request with the attribute xcmd=spectra-analysis to admin/_cmdstat.jsp via the mac attribute. | [
"cpe:2.3:o:ruckuswireless:unleashed:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:c110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:e510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:h510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:m510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r320:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r710:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:r720:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t310:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t610:-:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:t710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:ruckuswireless:zonedirector_1200_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ruckuswireless:zonedirector_1200:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
CVE-2022-3762 | Booster for WooCommerce - ShopManager+ Arbitrary File Download | The Booster for WooCommerce WordPress plugin before 5.6.7, Booster Plus for WooCommerce WordPress plugin before 5.6.5, Booster Elite for WooCommerce WordPress plugin before 1.1.7 do not validate files to download in some of its modules, which could allow ShopManager and Admin to download arbitrary files from the server even when they are not supposed to be able to (for example in multisite) | [
"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*",
"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:plus:wordpress:*:*",
"cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:*:wordpress:*:*"
]
| null | 6.5 | null | null |
CVE-2024-31506 | Sourcecodester Online Graduate Tracer System v1.0 is vulnerable to SQL Injection via the "id" parameter in admin/admin_cs.php. | [
"cpe:2.3:a:online_graduate_tracer_system_project:online_graduate_tracer_system:1.0:*:*:*:*:*:*:*"
]
| null | 4.9 | null | null |
|
CVE-2014-0701 | Cisco Wireless LAN Controller (WLC) devices 7.0 before 7.0.250.0, 7.2, 7.3, and 7.4 before 7.4.110.0 do not properly deallocate memory, which allows remote attackers to cause a denial of service (reboot) by sending WebAuth login requests at a high rate, aka Bug ID CSCuf52361. | [
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.220.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.235.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.2.103.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.2.110.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.101.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.60:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2025-23882 | WordPress WP Download Codes Plugin <= 2.5.4 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound WP Download Codes allows Reflected XSS. This issue affects WP Download Codes: from n/a through 2.5.4. | []
| null | 7.1 | null | null |
CVE-2016-2047 | The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10; Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier; and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com." | [
"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:linux:7:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*"
]
| null | null | 5.9 | 4.3 |
|
CVE-2010-1387 | Use-after-free vulnerability in JavaScriptCore in WebKit in Apple iTunes before 9.2 on Windows, and Apple iOS before 4 on the iPhone and iPod touch, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors related to page transitions, a different vulnerability than CVE-2010-1763 and CVE-2010-1769. | [
"cpe:2.3:a:apple:itunes:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:4.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:7.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:itunes:9.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:3.2:*:*:*:*:*:*:*",
"cpe:2.3:h:apple:ipod_touch:*:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-gqr3-72h3-gh3f | Vulnerability in the Oracle iStore product of Oracle E-Business Suite (component: User Registration). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.9. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle iStore. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle iStore, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle iStore accessible data as well as unauthorized update, insert or delete access to some of Oracle iStore accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N). | []
| null | null | null | null |
|
GHSA-fjmx-5ghq-2wxh | A vulnerability was found in SourceCodester Online Graduate Tracer System 1.0. It has been classified as critical. This affects the function mysqli_query of the file bsitemp.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-222981 was assigned to this vulnerability. | []
| null | 9.8 | null | null |
|
GHSA-jrr2-6pgv-vqqm | Huawei Sophia-L10 smartphones with software before P7-L10C900B852 allow attackers to cause a denial of service (system panic) via a crafted application with the system or camera privilege. | []
| null | null | 5.5 | null |
|
CVE-2022-28099 | Poultry Farm Management System v1.0 was discovered to contain a SQL injection vulnerability via the Item parameter at /farm/store.php. | [
"cpe:2.3:a:poultry_farm_management_system_project:poultry_farm_management_system:1.0:*:*:*:*:*:*:*"
]
| null | 8.8 | null | 6.5 |
|
CVE-2012-4249 | The Amazon Lab126 com.lab126.system sendEvent implementation on the Kindle Touch before 5.1.2 allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a string, as demonstrated by using lipc-set-prop to set an LIPC property, a different vulnerability than CVE-2012-4248. | [
"cpe:2.3:h:amazon:kindle_touch:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:amazon:kindle_touch:5.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2024-27220 | In lpm_req_handler of , there is a possible out of bounds memory access due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. | [
"cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*"
]
| null | 8.4 | null | null |
|
CVE-1999-1225 | rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not. | [
"cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-4484-gw7x-x6r9 | On BIG-IP versions 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, 12.1.x before 12.1.5.3, and 11.6.x before 11.6.5.3, undisclosed endpoints in iControl REST allow for a reflected XSS attack, which could lead to a complete compromise of the BIG-IP system if the victim user is granted the admin role. This vulnerability is due to an incomplete fix for CVE-2020-5948. Note: Software versions which have reached End of Software Development (EoSD) are not evaluated. | []
| null | null | null | null |
|
CVE-2023-48740 | WordPress Easy Social Feed plugin <= 6.5.1 - Broken Access Control vulnerability | Missing Authorization vulnerability in Easy Social Feed Easy Social Feed allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Social Feed: from n/a through 6.5.1. | []
| null | 4.3 | null | null |
GHSA-c965-qc2m-fc59 | SQL injection vulnerability in eClient 7.3.2.3 in Enspire Distribution Management Solution 7.3.2.7 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. | []
| null | null | null | null |
|
RHSA-2023:3297 | Red Hat Security Advisory: Red Hat Advanced Cluster Management 2.7.4 security fixes and container updates | vm2: Inspect Manipulation vm2: Sandbox Escape | [
"cpe:/a:redhat:acm:2.7::el8"
]
| null | 9.8 | null | null |
CVE-2024-9160 | Security Misconfiguration in Forge module PEADM | In versions of the PEADM Forge Module prior to 3.24.0 a security misconfiguration was discovered. | []
| 5.4 | null | null | null |
CVE-2021-30285 | Improper validation of memory region in Hypervisor can lead to incorrect region mapping in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking | [
"cpe:2.3:o:qualcomm:ar8031_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8031:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6620_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6620:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csra6640_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csra6640:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:csrb31024_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:csrb31024:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10055_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10055:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:fsm10056_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:fsm10056:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:mdm9205_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:mdm9205:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca4004_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca4004:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6390_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6390:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca9984_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca9984:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs2290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs2290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs4290_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs4290:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs603_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs603:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcx315_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcx315:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa415m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa415m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa515m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa515m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_8cx_gen2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_8cx_gen2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd460_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd460:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd662_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd662:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd678_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd678:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd690_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd690_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd720g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd720g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd750g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd750g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd765g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd765g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd768g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd768g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd778g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd778g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd7c_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd7c:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd870_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd870:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd888_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd888_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx24_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx55m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx55m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdxr2_5g_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdxr2_5g:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6225_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6225:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9306_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9306:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9335_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9335:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3991_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3991:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn3999_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn3999:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6750_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6750:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6851_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6851:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wcn6856_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wcn6856:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*"
]
| null | 9.3 | null | null |
|
CVE-2024-9608 | MyParcel <= 4.24.1 - Reflected Cross-Site Scripting | The MyParcel plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 4.24.1. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. Please note this is only exploitable when the WooCommerce store is set to Belgium. | []
| null | 6.1 | null | null |
GHSA-phm5-xv24-x889 | The voice wakeup module has a vulnerability of using externally-controlled format strings. Successful exploitation of this vulnerability may affect system availability. | []
| null | 7.5 | null | null |
|
RHSA-2019:3834 | Red Hat Security Advisory: kernel security update | hw: Machine Check Error on Page Size Change (IFU) hw: Intel GPU Denial Of Service while accessing MMIO in lower power state hw: TSX Transaction Asynchronous Abort (TAA) | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | null | 6.5 | null |
RHSA-2013:1652 | Red Hat Security Advisory: coreutils security, bug fix, and enhancement update | coreutils: segfault in "sort -d" and "sort -M" with long line input coreutils: segfault in uniq with long line input coreutils: segfault in "join -i" with long line input | [
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
]
| null | null | null | null |
GHSA-783h-w6p2-278g | Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact. | []
| null | 9.8 | null | null |
|
CVE-2022-46699 | A memory corruption issue was addressed with improved state management. This issue is fixed in Safari 16.2, tvOS 16.2, macOS Ventura 13.1, iOS 16.2 and iPadOS 16.2, watchOS 9.2. Processing maliciously crafted web content may lead to arbitrary code execution. | [
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-p8j5-xg8p-f3xm | The Contact Form by Supsystic WordPress plugin before 1.7.15 did not sanitise the tab parameter of its options page before outputting it in an attribute, leading to a reflected Cross-Site Scripting issue | []
| null | null | null | null |
|
GHSA-3rm2-x64w-wcx9 | CSCMS Music Portal System v4.2 was discovered to contain a blind SQL injection vulnerability via the id parameter at /admin.php/singer/admin/lists/zhuan. | []
| null | 7.2 | null | null |
|
GHSA-47gq-m9v9-v35g | File Upload vulnerability found in Oretnom23 Storage Unit Rental Management System v.1.0 allows a remote attacker to execute arbitrary code via the update_settings parameter. | []
| null | 9.8 | null | null |
|
CVE-2023-41980 | A permissions issue was addressed with additional restrictions. This issue is fixed in iOS 17 and iPadOS 17, macOS Sonoma 14. An app may be able to bypass Privacy preferences. | [
"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | null |
|
CVE-2023-46805 | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 22.x and Ivanti Policy Secure allows a remote attacker to access restricted resources by bypassing control checks. | [
"cpe:2.3:a:ivanti:connect_secure:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r7:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r8.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r8.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r9:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:9.1:r9.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.2:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.4:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.5:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.6:-:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.6:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:connect_secure:22.6:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r10:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r11:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r12:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r13:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r13.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r14:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r15:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r16:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r17:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r18:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r3.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r4.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r5:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r7:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r8:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r8.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r8.2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:9.1:r9:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.1:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.1:r6:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.2:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.2:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.3:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.3:r3:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.4:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.4:r2:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.4:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.5:r1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.5:r2.1:*:*:*:*:*:*",
"cpe:2.3:a:ivanti:policy_secure:22.6:r1:*:*:*:*:*:*"
]
| null | null | 8.2 | null |
|
CVE-2004-1490 | Opera 7.54 and earlier allows remote attackers to spoof file types in the download dialog via dots and non-breaking spaces (ASCII character code 160) in the (1) Content-Disposition or (2) Content-Type headers. | [
"cpe:2.3:a:opera:opera_browser:*:*:*:*:*:*:*:*"
]
| null | null | null | 2.6 |
|
GHSA-m9w8-v359-9ffr | Improper Certificate Validation in Apache activemq-client | TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default. | []
| null | null | 7.4 | null |
CVE-2011-1375 | IBM AIX 6.1 and 7.1 does not restrict the wpar_limits_config and wpar_limits_modify system calls, which allows local users to cause a denial of service (system crash) via a crafted call. | [
"cpe:2.3:o:ibm:aix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:7.1:*:*:*:*:*:*:*"
]
| null | null | null | 4.9 |
|
CVE-2022-32859 | A logic issue was addressed with improved state management. This issue is fixed in iOS 16. Deleted contacts may still appear in spotlight search results. | [
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
|
CVE-2001-0404 | Directory traversal vulnerability in JavaServer Web Dev Kit (JSWDK) 1.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP request to the WEB-INF directory. | [
"cpe:2.3:a:sun:javaserver_web_dev_kit:1.0.1:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2018-10704 | yidashi yii2cmf 2.0 has XSS via the /search q parameter. | [
"cpe:2.3:a:yii2cmf_project:yii2cmf:2.0:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
CVE-2019-10509 | Device record of the pairing device used after free during ACL disconnection in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in MSM8909W, MSM8996AU, QCA6574AU, QCS405, QCS605, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 665, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016 | [
"cpe:2.3:o:qualcomm:msm8909w_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8909w:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs405_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs405:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_425_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_425:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_427_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_427:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_430_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_430:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_435_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_435:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_625_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_625:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_665_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_665:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_675_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_675:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_712_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_712:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_730_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_730:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_820a_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_820a:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_835_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_835:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_845_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_845:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_850_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_850:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sd_855_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sd_855:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sda660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sda660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:snapdragon_high_med_2016_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:snapdragon_high_med_2016:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 10 |
|
GHSA-j6wh-9fq4-rcrh | The issue was addressed with improved input sanitization. This issue is fixed in visionOS 2.5, iOS 18.5 and iPadOS 18.5, macOS Sequoia 15.5, tvOS 18.5. An attacker may be able to cause unexpected system termination or corrupt kernel memory. | []
| null | 8.2 | null | null |
|
GHSA-qx85-gr6x-6vqf | In the Linux kernel, the following vulnerability has been resolved:ath11k: fix netdev open raceMake sure to allocate resources needed before registering the device.This specifically avoids having a racing open() trigger a BUG_ON() in
mod_timer() when ath11k_mac_op_start() is called before the
mon_reap_timer as been set up.I did not see this issue with next-20220310, but I hit it on every probe
with next-20220511. Perhaps some timing changed in between.Here's the backtrace:[ 51.346947] kernel BUG at kernel/time/timer.c:990!
[ 51.346958] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP
...
[ 51.578225] Call trace:
[ 51.583293] __mod_timer+0x298/0x390
[ 51.589518] mod_timer+0x14/0x20
[ 51.595368] ath11k_mac_op_start+0x41c/0x4a0 [ath11k]
[ 51.603165] drv_start+0x38/0x60 [mac80211]
[ 51.610110] ieee80211_do_open+0x29c/0x7d0 [mac80211]
[ 51.617945] ieee80211_open+0x60/0xb0 [mac80211]
[ 51.625311] __dev_open+0x100/0x1c0
[ 51.631420] __dev_change_flags+0x194/0x210
[ 51.638214] dev_change_flags+0x24/0x70
[ 51.644646] do_setlink+0x228/0xdb0
[ 51.650723] __rtnl_newlink+0x460/0x830
[ 51.657162] rtnl_newlink+0x4c/0x80
[ 51.663229] rtnetlink_rcv_msg+0x124/0x390
[ 51.669917] netlink_rcv_skb+0x58/0x130
[ 51.676314] rtnetlink_rcv+0x18/0x30
[ 51.682460] netlink_unicast+0x250/0x310
[ 51.688960] netlink_sendmsg+0x19c/0x3e0
[ 51.695458] ____sys_sendmsg+0x220/0x290
[ 51.701938] ___sys_sendmsg+0x7c/0xc0
[ 51.708148] __sys_sendmsg+0x68/0xd0
[ 51.714254] __arm64_sys_sendmsg+0x28/0x40
[ 51.720900] invoke_syscall+0x48/0x120Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3 | []
| null | null | null | null |
|
GHSA-fxx6-99pg-x743 | In the Linux kernel, the following vulnerability has been resolved:net/smc: remove device from smcd_dev_list after failed device_add()If the device_add() for a smcd_dev fails, there's no cleanup step that
rolls back the earlier list_add(). The device subsequently gets freed,
and we end up with a corrupted list.Add some error handling that removes the device from the list. | []
| null | 5.5 | null | null |
|
GHSA-pm7p-jjc6-m4m4 | A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/asset_crud.php. The manipulation of the argument photo1 leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | []
| 5.3 | 6.3 | null | null |
|
CVE-2004-0636 | Buffer overflow in the goaway function in the aim:goaway URI handler for AOL Instant Messenger (AIM) 5.5, including 5.5.3595, allows remote attackers to execute arbitrary code via a long Away message. | [
"cpe:2.3:a:aol:instant_messenger:5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:5.5.3415_beta:*:*:*:*:*:*:*",
"cpe:2.3:a:aol:instant_messenger:5.5.3595:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
GHSA-6g6p-6ppw-xxv2 | IBL Online Weather before 4.3.5a allows unauthenticated eval injection via the queryBCP method of the Auxiliary Service. | []
| null | 9.8 | null | null |
|
CVE-2019-11533 | Cross-site scripting (XSS) vulnerability in ProjectSend before r1070 allows remote attackers to inject arbitrary web script or HTML. | [
"cpe:2.3:a:projectsend:projectsend:*:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2002-0382 | XChat IRC client allows remote attackers to execute arbitrary commands via a /dns command on a host whose DNS reverse lookup contains shell metacharacters. | [
"cpe:2.3:a:xchat:xchat:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-mpgp-fqh7-8mm2 | A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue. | []
| 5.3 | 4.3 | null | null |
|
GHSA-g7mx-vgq4-79gg | This vulnerability allows remote attackers to disclose sensitive information on affected installations of Foxit Studio Photo 3.6.6.922. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of CMP files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated structure. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-11337. | []
| null | null | null | null |
|
CVE-2024-9590 | Category and Taxonomy Meta Fields <= 1.0.0 - Authenticated (Editor+) Stored Cross-Site Scripting | The Category and Taxonomy Meta Fields plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the image meta field value in the 'wpaft_add_meta_textinput' function in versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with editor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled. | [
"cpe:2.3:a:aftabhusain:category_and_taxonomy_meta_fields:*:*:*:*:*:wordpress:*:*"
]
| null | 5.5 | null | null |
CVE-2022-20568 | In (TBD) of (TBD), there is a possible way to corrupt kernel memory due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-220738351References: Upstream kernel | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-qw96-mrmv-h5qw | SQL Injection vulnerability in audit/class.audit.php in osTicket osTicket-plugins before commit a7842d494889fd5533d13deb3c6a7789768795ae via the order parameter to the getOrder function. | []
| null | 9.8 | null | null |
|
GHSA-53rh-xg3h-r59m | A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0 in /Scheduling/pages/profile_update.php. Manipulating the parameter username will cause SQL injection attacks. | []
| null | 6.5 | null | null |
|
GHSA-74v5-x8gw-q8f8 | An issue in the handling of environment variables was addressed with improved validation. This issue is fixed in macOS Monterey 12.4. A user may be able to view sensitive user information. | []
| null | 5.5 | null | null |
|
GHSA-m82c-hp7m-9pcc | Unknown "file disclosure" vulnerability in Macromedia JRun 3.0, 3.1, and 4.0, related to a log file or jrun.ini, with unknown impact. | []
| null | null | null | null |
|
GHSA-jj7v-w3xx-rq39 | Cross-site scripting (XSS) vulnerability in low.php in Fuzzylime Forum 1.0 allows remote attackers to inject arbitrary web script or HTML via the topic parameter. NOTE: this might be resultant from SQL injection. | []
| null | null | null | null |
|
GHSA-4hc2-8mh7-5956 | A SQL injection vulnerability exists in the vendor_country parameter of the “vendor print report” feature of the ScienceLogic SL1 that takes unsanitized user?controlled input and passes it directly to a SQL query. This allows for the injection of arbitrary SQL before being executed against the database. | []
| null | 8.8 | null | null |
|
GHSA-grpv-g4qc-62cg | A vulnerability has been identified in RUGGEDCOM ROS RMC8388 (All versions < V5.6.0), RUGGEDCOM ROS RS416Pv2 (All versions < V5.6.0), RUGGEDCOM ROS RS416v2 (All versions < V5.6.0), RUGGEDCOM ROS RS900 (32M) (All versions < V5.6.0), RUGGEDCOM ROS RS900G (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2100 (32M) (All versions < V5.6.0), RUGGEDCOM ROS RSG2288 (All versions < V5.6.0), RUGGEDCOM ROS RSG2300 (All versions < V5.6.0), RUGGEDCOM ROS RSG2300P (All versions < V5.6.0), RUGGEDCOM ROS RSG2488 (All versions < V5.6.0), RUGGEDCOM ROS RSG907R (All versions < V5.6.0), RUGGEDCOM ROS RSG908C (All versions < V5.6.0), RUGGEDCOM ROS RSG909R (All versions < V5.6.0), RUGGEDCOM ROS RSG910C (All versions < V5.6.0), RUGGEDCOM ROS RSG920P (All versions < V5.6.0), RUGGEDCOM ROS RSL910 (All versions < v5.6.0), RUGGEDCOM ROS RST2228 (All versions < v5.6.0), RUGGEDCOM ROS RST2228P (All versions < V5.6.0), RUGGEDCOM ROS RST916C (All versions < v5.6.0), RUGGEDCOM ROS RST916P (All versions < v5.6.0). Affected devices improperly handle partial HTTP requests which makes them vulnerable to slowloris attacks. This could allow a remote attacker to create a denial of service condition that persists until the attack ends. | []
| null | 7.5 | null | null |
|
CVE-2019-16400 | Samsung Galaxy S8 plus (Android version: 8.0.0, Build Number: R16NW.G955USQU5CRG3, Baseband Vendor: Qualcomm Snapdragon 835, Baseband: G955USQU5CRG3), Samsung Galaxy S3 (Android version: 4.3, Build Number: JSS15J.I9300XXUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: I9300XXUGNA8), and Samsung Galaxy Note 2 (Android version: 4.3, Build Number: JSS15J.I9300XUGND5, Baseband Vendor: Samsung Exynos 4412, Baseband: N7100DDUFND1) devices allow attackers to send AT commands over Bluetooth, resulting in several Denial of Service (DoS) attacks. | [
"cpe:2.3:o:samsung:galaxy_s8_plus_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s8_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:galaxy_s3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_s3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:samsung:galaxy_note_2_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:samsung:galaxy_note_2:-:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 3.3 |
|
CVE-2017-5456 | A mechanism to bypass file system access protections in the sandbox using the file system request constructor through an IPC message. This allows for read and write access to the local file system. This vulnerability affects Firefox ESR < 52.1 and Firefox < 53. | [
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 7.5 |
|
CVE-2014-10378 | The duplicate-post plugin before 2.6 for WordPress has XSS. | [
"cpe:2.3:a:duplicate_post_project:duplicate_post:*:*:*:*:*:wordpress:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2024-30233 | WordPress WholesaleX plugin <= 1.3.1 - Sensitive Data Exposure on User Export vulnerability | Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Wholesale Team WholesaleX.This issue affects WholesaleX: from n/a through 1.3.1.
| []
| null | 6.5 | null | null |
RHSA-2011:0163 | Red Hat Security Advisory: kernel security and bug fix update | kernel: sctp: a race between ICMP protocol unreachable and connect() | [
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-pwv9-2w3m-5m4w | An exploitable code execution vulnerability exists in the SavePatientMontage functionality of Natus Xltek NeuroWorks 8. A specially crafted network packet can cause a stack buffer overflow resulting in code execution. An attacker can a malicious packet to trigger this vulnerability. | []
| null | null | 9.8 | null |
|
CVE-2014-7071 | The Autocar India (aka com.magzter.autocarindia) application 3.03 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [
"cpe:2.3:a:magzter:autocar_india:3.03:*:*:*:*:android:*:*"
]
| null | null | null | 5.4 |
|
CVE-2016-3457 | Unspecified vulnerability in the PeopleSoft Enterprise HCM ePerformance component in Oracle PeopleSoft Products 9.2 allows remote authenticated users to affect confidentiality and integrity via vectors related to Security. | [
"cpe:2.3:a:oracle:peoplesoft_enterprise_human_capital_management_eperformance:9.2:*:*:*:*:*:*:*"
]
| null | null | 4.6 | 4.9 |
|
CVE-2024-34050 | Open Networking Foundation SD-RAN Rimedo rimedo-ts 0.1.1 has a slice bounds out-of-range panic in "return uint64(b[2])<<16 | uint64(b[1])<<8 | uint64(b[0])" in reader.go. | [
"cpe:2.3:a:onosproject:onos:0.1.1:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2013-2931 | Multiple unspecified vulnerabilities in Google Chrome before 31.0.1650.48 allow attackers to execute arbitrary code or possibly have other impact via unknown vectors. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.2:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.3:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.4:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.5:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.6:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.8:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.9:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.10:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.11:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.12:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.13:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.14:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.15:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.16:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.17:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.18:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.19:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.20:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.22:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.23:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.25:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.26:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.27:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.28:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.29:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.30:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.31:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.32:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.33:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.34:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.35:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.36:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.37:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.38:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.39:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.41:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.42:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.43:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.44:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.45:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:31.0.1650.46:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
|
CVE-2015-6292 | The proxy-cache implementation in Cisco AsyncOS 8.0.x before 8.0.7-151, 8.1.x and 8.5.x before 8.5.2-004, 8.6.x and 8.7.x before 8.7.0-171-LD, and 8.8.x before 8.8.0-085 on Web Security Appliance (WSA) devices allows remote attackers to cause a denial of service (memory consumption) via multiple proxy connections, aka Bug ID CSCus10922. | [
"cpe:2.3:a:cisco:web_security_appliance:8.0.0-000:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.5:hp1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.0.6-119:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.5.0-497:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:web_security_appliance:8.5.0.000:*:*:*:*:*:*:*"
]
| null | null | null | 7.8 |
|
CVE-2014-4410 | WebKit, as used in Apple iOS before 8 and Apple TV before 7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-09-17-1 and APPLE-SA-2014-09-17-2. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:6.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:7.1.1:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
GHSA-gwpm-4xfr-x3gg | Remote code execution | []
| null | 9.8 | null | null |
|
GHSA-c998-93wx-vqcj | IBM AppScan Enterprise Edition could allow a remote attacker to execute arbitrary code on the system, caused by improper handling of objects in memory. By persuading a victim to open specially-crafted content, an attacker could exploit this vulnerability to execute arbitrary code on the system in the same context as the victim. | []
| null | null | 7.3 | null |
|
GHSA-hpmr-g4pq-jhgp | Denial of service in chrono-node | This affects the package chrono-node before 2.2.4. It hangs on a date-like string with lots of embedded spaces. | []
| null | 7.5 | null | null |
CVE-2018-1000121 | A NULL pointer dereference exists in curl 7.21.0 to and including curl 7.58.0 in the LDAP code that allows an attacker to cause a denial of service | [
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*",
"cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.55:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2023-50374 | WordPress CMP – Coming Soon & Maintenance Plugin by NiteoThemes plugin <= 4.1.10 - Server Side Request Forgery (SSRF) vulnerability | Server-Side Request Forgery (SSRF) vulnerability in NiteoThemes CMP – Coming Soon & Maintenance.This issue affects CMP – Coming Soon & Maintenance: from n/a through 4.1.10.
| []
| null | 5.5 | null | null |
CVE-2014-1969 | Directory traversal vulnerability in the apps4u@android SD Card Manager application before 20140224 for Android allows attackers to overwrite or create arbitrary files via a crafted filename. | [
"cpe:2.3:a:apps4u\\@android:sd_card_manager:*:*:*:*:*:android:*:*"
]
| null | null | null | 5.8 |
|
CVE-2021-40484 | Microsoft SharePoint Server Spoofing Vulnerability | Microsoft SharePoint Server Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*"
]
| null | 7.6 | null | null |
CVE-2016-3055 | IBM FileNet Workplace 4.0.2 before 4.0.2.14 LA012 allows remote authenticated users to read arbitrary files or cause a denial of service (memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. | [
"cpe:2.3:a:ibm:filenet_workplace:4.0.2:*:*:*:*:*:*:*"
]
| null | null | 8.1 | 5.5 |
|
GHSA-572v-35qp-6587 | An incorrect default permissions vulnerability in Lenovo Leyun cloud music application could allow denial of service. | []
| null | 7.5 | null | null |
|
GHSA-44m2-j498-j5h8 | Unspecified vulnerability in Oracle Sun Solaris 10 allows remote attackers to affect confidentiality and integrity, related to libsasl. | []
| null | null | null | null |
|
GHSA-ch74-fvqr-x5q8 | Microsoft DWM Core Library Elevation of Privilege Vulnerability. | []
| null | 7.8 | null | null |
|
GHSA-c3mw-526g-r2pc | IBM Maximo Asset Management 7.1 through 7.1.1.13, 7.5.0 before 7.5.0.8 IFIX001, and 7.6.0 before 7.6.0.0 IFIX005 does not prevent caching of HTTPS responses, which allows physically proximate attackers to obtain sensitive local-cache information by leveraging an unattended workstation. | []
| null | null | null | null |
|
GHSA-3xrf-vrqp-mvm5 | A vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC) Software could allow an authenticated, remote attacker to inject arbitrary commands that are executed with root privileges on an affected device. The vulnerability is due to insufficient validation of user-supplied input by the affected software. An attacker could exploit this vulnerability by invoking an interface monitoring mechanism with a crafted argument on the affected software. A successful exploit could allow the attacker to inject and execute arbitrary, system-level commands with root privileges on an affected device. | []
| null | 8.8 | null | null |
|
GHSA-h645-7253-pp3x | An issue in H3C Technologies Co., Limited H3C Magic RC3000 RC3000V100R009 allows a remote attacker to execute arbitrary code via the Routing functionality. | []
| null | 8.8 | null | null |
|
CVE-2022-35964 | Segfault in `BlockLSTMGradV2` in TensorFlow | TensorFlow is an open source platform for machine learning. The implementation of `BlockLSTMGradV2` does not fully validate its inputs. This results in a a segfault that can be used to trigger a denial of service attack. We have patched the issue in GitHub commit 2a458fc4866505be27c62f81474ecb2b870498fa. The fix will be included in TensorFlow 2.10.0. We will also cherrypick this commit on TensorFlow 2.9.1, TensorFlow 2.8.1, and TensorFlow 2.7.2, as these are also affected and still in supported range. There are no known workarounds for this issue. | [
"cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc2:*:*:*:*:*:*",
"cpe:2.3:a:google:tensorflow:2.10:rc3:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
GHSA-84wc-9427-hw23 | When Security Assertion Markup Language (SAML) authentication is enabled and the 'Validate Identity Provider Certificate' option is disabled (unchecked), improper verification of signatures in PAN-OS SAML authentication enables an unauthenticated network-based attacker to access protected resources. The attacker must have network access to the vulnerable server to exploit this vulnerability. This issue affects PAN-OS 9.1 versions earlier than PAN-OS 9.1.3; PAN-OS 9.0 versions earlier than PAN-OS 9.0.9; PAN-OS 8.1 versions earlier than PAN-OS 8.1.15, and all versions of PAN-OS 8.0 (EOL). This issue does not affect PAN-OS 7.1. This issue cannot be exploited if SAML is not used for authentication. This issue cannot be exploited if the 'Validate Identity Provider Certificate' option is enabled (checked) in the SAML Identity Provider Server Profile. Resources that can be protected by SAML-based single sign-on (SSO) authentication are: GlobalProtect Gateway, GlobalProtect Portal, GlobalProtect Clientless VPN, Authentication and Captive Portal, PAN-OS next-generation firewalls (PA-Series, VM-Series) and Panorama web interfaces, Prisma Access In the case of GlobalProtect Gateways, GlobalProtect Portal, Clientless VPN, Captive Portal, and Prisma Access, an unauthenticated attacker with network access to the affected servers can gain access to protected resources if allowed by configured authentication and Security policies. There is no impact on the integrity and availability of the gateway, portal or VPN server. An attacker cannot inspect or tamper with sessions of regular users. In the worst case, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N). In the case of PAN-OS and Panorama web interfaces, this issue allows an unauthenticated attacker with network access to the PAN-OS or Panorama web interfaces to log in as an administrator and perform administrative actions. In the worst-case scenario, this is a critical severity vulnerability with a CVSS Base Score of 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). If the web interfaces are only accessible to a restricted management network, then the issue is lowered to a CVSS Base Score of 9.6 (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H). Palo Alto Networks is not aware of any malicious attempts to exploit this vulnerability. | []
| null | 10 | null | null |
|
RHSA-2023:2805 | Red Hat Security Advisory: xorg-x11-server-Xwayland security update | xorg-x11-server: buffer overflow in _GetCountedString() in xkb/xkb.c xorg-x11-server: memory leak in ProcXkbGetKbdByName() in xkb/xkb.c xorg-x11-server: XkbGetKbdByName use-after-free xorg-x11-server: XTestSwapFakeInput stack overflow xorg-x11-server: XIPassiveUngrab out-of-bounds access xorg-x11-server: XvdiSelectVideoNotify use-after-free xorg-x11-server: ScreenSaverSetAttributes use-after-free xorg-x11-server: XIChangeProperty out-of-bounds access xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation | [
"cpe:/a:redhat:enterprise_linux:8::appstream"
]
| null | 7.8 | null | null |
CVE-2007-0311 | Texas Imperial Software WFTPD and WFTPD Pro Server 3.25 and earlier allow remote attackers to cause a denial of service (application crash) via a long SITE ADMIN command. | [
"cpe:2.3:a:texas_imperial_software:wftpd:*:*:*:*:*:*:*:*",
"cpe:2.3:a:texas_imperial_software:wftpd_pro_server:*:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-53rf-mqh4-c9m2 | IBM Curam Social Program Management 6.1.x before 6.1.1.1 allows remote authenticated users to bypass intended access restrictions and obtain sensitive document information by guessing the document id. IBM X-Force ID: 107106. | []
| null | null | 4.3 | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.