id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
RHSA-2014:1920 | Red Hat Security Advisory: Red Hat JBoss Web Server 2.1.0 openssl security update | SSL/TLS: Padding Oracle On Downgraded Legacy Encryption attack | [
"cpe:/a:redhat:jboss_enterprise_web_server:2.1"
]
| null | null | null | null |
CVE-2007-2910 | Cross-site scripting (XSS) vulnerability in Jelsoft vBulletin before 3.6.7 PL1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, related to the vb_367_xss_fix_plugin.xml update, a related issue to CVE-2007-2909. | [
"cpe:2.3:a:jelsoft:vbulletin:*:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
CVE-2022-4746 | FluentAuth < 1.0.2 - Bypass blocks by IP Spoofing | The FluentAuth WordPress plugin before 1.0.2 prioritizes getting a visitor's IP address from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass the IP-based blocks set by the plugin. | [
"cpe:2.3:a:wpmanageninja:fluentauth:*:*:*:*:*:wordpress:*:*"
]
| null | 7.5 | null | null |
CVE-2020-5232 | Ethereum Name Service - Malicious takeover of previously owned ENS names | A user who owns an ENS domain can set a trapdoor, allowing them to transfer ownership to another user, and later regain ownership without the new owners consent or awareness. A new ENS deployment is being rolled out that fixes this vulnerability in the ENS registry. | [
"cpe:2.3:a:ens.domains:ethereum_name_service:*:*:*:*:*:*:*:*"
]
| null | 8.7 | null | null |
CVE-2021-39286 | Webrecorder pywb before 2.6.0 allows XSS because it does not ensure that Jinja2 templates are autoescaped. | [
"cpe:2.3:a:webrecorder:pywb:*:*:*:*:*:*:*:*"
]
| null | 6.1 | null | 4.3 |
|
GHSA-w8gr-f976-pqpf | Improper authorization involving a fuse in TrustZone in snapdragon automobile, snapdragon mobile and snapdragon wear in versions MDM9206, MDM9607, MSM8996AU, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SD 810, SD 820, SD 820A, SD 835, SDA660, SDM439, SDM630, SDM660, SDX24, Snapdragon_High_Med_2016. | []
| null | null | 7.8 | null |
|
RHSA-2024:6702 | Red Hat Security Advisory: pcs security update | rexml: rubygem-rexml: DoS when parsing an XML having many specific characters such as whitespace character, >] and ]> rexml: DoS vulnerability in REXML rexml: DoS vulnerability in REXML | [
"cpe:/a:redhat:rhel_e4s:8.6::highavailability",
"cpe:/a:redhat:rhel_tus:8.6::highavailability"
]
| null | 5.9 | null | null |
GHSA-83q3-9mcq-8fw6 | In nDPI through 3.2, the H.323 dissector is vulnerable to a heap-based buffer over-read in ndpi_search_h323 in lib/protocols/h323.c, as demonstrated by a payload packet length that is too short. | []
| null | 9.1 | null | null |
|
CVE-2024-4535 | KKProgressbar2 Free <= 1.1.4.2 - Progress Bar Deletion via CSRF | The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks | []
| null | 8.8 | null | null |
CVE-2023-43043 | IBM Maximo Application Suite information disclosure | IBM Maximo Application Suite - Maximo Mobile for EAM 8.10 and 8.11 could disclose sensitive information to a local user. IBM X-Force ID: 266875. | []
| null | 5.1 | null | null |
CVE-2018-10973 | An integer overflow in the transferMulti function of a smart contract implementation for KoreaShow, an Ethereum ERC20 token, allows attackers to accomplish an unauthorized increase of digital assets via crafted _value parameters. | [
"cpe:2.3:a:koreashow_project:koreashow:-:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2016-9683 | The SonicWall Secure Remote Access server (version 8.1.0.2-14sv) is vulnerable to a Remote Command Injection vulnerability in its web administrative interface. This vulnerability occurs in the 'extensionsettings' CGI (/cgi-bin/extensionsettings) component responsible for handling some of the server's internal configurations. The CGI application doesn't properly escape the information it's passed when processing a particular multi-part form request involving scripts. The filename of the 'scriptname' variable is read in unsanitized before a call to system() is performed - allowing for remote command injection. Exploitation of this vulnerability yields shell access to the remote machine under the nobody user account. This is SonicWall Issue ID 181195. | [
"cpe:2.3:o:dell:sonicwall_secure_remote_access_server:8.1.0.2-14sv:*:*:*:*:*:*:*"
]
| null | null | 9.8 | 10 |
|
GHSA-gxqw-pvp2-vpq6 | An issue was discovered in GPAC version 0.8.0 and 1.0.1. There is an invalid pointer dereference in the function SetupWriters() in isomedia/isom_store.c. | []
| null | null | null | null |
|
CVE-2019-13025 | Compal CH7465LG CH7465LG-NCIP-6.12.18.24-5p8-NOSH devices have Incorrect Access Control because of Improper Input Validation. The attacker can send a maliciously modified POST (HTTP) request containing shell commands, which will be executed on the device, to an backend API endpoint of the cable modem. | [
"cpe:2.3:o:compal:ch7465lg_firmware:ch7465lg-ncip-6.12.18.24-5p8-nosh:*:*:*:*:*:*:*",
"cpe:2.3:h:compal:ch7465lg:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-xhv3-vpp2-g34f | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Syed Balkhi Floating Social Bar allows Stored XSS. This issue affects Floating Social Bar: from n/a through 1.1.7. | []
| null | 5.9 | null | null |
|
GHSA-565r-pf5q-45v6 | Jenkins Missing Permission Check | Jenkins 2.503 and earlier, LTS 2.492.2 and earlier does not perform a permission check in an HTTP endpoint.This allows attackers with Computer/Create permission but without Computer/Extended Read permission to copy an agent, gaining access to its configuration.Jenkins 2.504, LTS 2.492.3 requires Computer/Extended Read permission to copy an agent. | []
| null | 4.3 | null | null |
GHSA-rjfp-c7rp-vx8v | Wyse Management Suite 3.8 and below contain an improper access control vulnerability. A authenticated malicious admin user can edit general client policy for which the user is not authorized. | []
| null | 4.9 | null | null |
|
CVE-2020-29616 | A memory corruption issue was addressed with improved input validation. This issue is fixed in macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave. Processing a maliciously crafted image may lead to arbitrary code execution. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2019-007:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-002:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-003:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-004:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-005:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:security_update_2020-006:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.14.6:supplemental_update_2:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:-:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.15.7:supplemental_update:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2022-43537 | Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploits could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
| [
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-97h7-m3vr-34f5 | Clients hostname gets added to DNS record on device which is running dnsmasq resulting in an information exposure in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Wearables in MDM9206, MDM9607, MDM9640, MDM9650, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 615/16/SD 415, SD 625, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 730, SD 820, SD 820A, SD 835, SD 855, SDA660, SDM630, SDM660 | []
| null | null | 7.5 | null |
|
RHSA-2023:1514 | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.10 on RHEL 9 security update | SnakeYaml: Constructor Deserialization Remote Code Execution undertow: Server identity in https connection is not checked by the undertow client snakeyaml: Uncaught exception in java.base/java.util.ArrayList.hashCode hsqldb: Untrusted input may lead to RCE attack dev-java/snakeyaml: DoS via stack overflow codec-haproxy: HAProxyMessageDecoder Stack Exhaustion DoS apache-james-mime4j: Temporary File Information Disclosure in MIME4J TempFileStorageProvider RESTEasy: creation of insecure temp files Undertow: Infinite loop in SslConduit during close | [
"cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
]
| null | 7.5 | null | null |
GHSA-qrjq-gjcr-v9fp | Cross-site scripting (XSS) vulnerability in index.php in SoftBB 0.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the page parameter. | []
| null | null | null | null |
|
GHSA-h425-cg84-p722 | A cross-site scripting (XSS) vulnerability in Wolf CMS 0.75 and earlier allows remote attackers to inject arbitrary web script or HTML via the setting[admin_email] parameter to admin/setting. | []
| null | null | null | null |
|
CVE-2023-52110 | The sensor module has an out-of-bounds access vulnerability.Successful exploitation of this vulnerability may affect availability. | [
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
CVE-2018-18655 | Prayer through 1.3.5 sends a Referer header, containing a user's username, when a user clicks on a link in their email because header.t lacks a no-referrer setting. | [
"cpe:2.3:a:prayer_project:prayer:*:*:*:*:*:*:*:*"
]
| null | null | 4.3 | 4.3 |
|
GHSA-5cmp-hg8h-m2f5 | HOME SPOT CUBE2 firmware V101 and earlier allows an attacker to bypass authentication to load malicious firmware via WebUI. | []
| null | null | 8.8 | null |
|
GHSA-6xgq-2vm2-cp8h | Specific page parameters in Dr. ID Door Access Control and Personnel Attendance Management system does not filter special characters. Remote attackers can apply Path Traversal means to download credential files from the system without permission. | []
| null | null | null | null |
|
GHSA-6xrw-q954-8cqh | A stored cross-site scripting vulnerability exists in TCExam <= 14.8.1. Valid files uploaded via tce_filemanager.php with a filename beggining with a period will be rendered as text/html. An attacker with access to tce_filemanager.php could upload a malicious javascript payload which would be triggered when another user views the file. | []
| null | null | null | null |
|
CVE-2022-44184 | Netgear R7000P V1.3.0.8 is vulnerable to Buffer Overflow in /usr/sbin/httpd via parameter wan_dns1_sec. | [
"cpe:2.3:o:netgear:r7000p_firmware:1.3.0.8:*:*:*:*:*:*:*",
"cpe:2.3:h:netgear:r7000p:-:*:*:*:*:*:*:*"
]
| null | 9.8 | null | null |
|
GHSA-5qfh-5q2m-xr68 | Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors. | []
| null | null | null | null |
|
GHSA-56c7-fm3g-6g6m | In the Linux kernel, the following vulnerability has been resolved:KVM: x86/mmu: Don't advance iterator after restart due to yieldingAfter dropping mmu_lock in the TDP MMU, restart the iterator during
tdp_iter_next() and do not advance the iterator. Advancing the iterator
results in skipping the top-level SPTE and all its children, which is
fatal if any of the skipped SPTEs were not visited before yielding.When zapping all SPTEs, i.e. when min_level == root_level, restarting the
iter and then invoking tdp_iter_next() is always fatal if the current gfn
has as a valid SPTE, as advancing the iterator results in try_step_side()
skipping the current gfn, which wasn't visited before yielding.Sprinkle WARNs on iter->yielded being true in various helpers that are
often used in conjunction with yielding, and tag the helper with
__must_check to reduce the probabily of improper usage.Failing to zap a top-level SPTE manifests in one of two ways. If a valid
SPTE is skipped by both kvm_tdp_mmu_zap_all() and kvm_tdp_mmu_put_root(),
the shadow page will be leaked and KVM will WARN accordingly.WARNING: CPU: 1 PID: 3509 at arch/x86/kvm/mmu/tdp_mmu.c:46 [kvm]
RIP: 0010:kvm_mmu_uninit_tdp_mmu+0x3e/0x50 [kvm]
Call Trace:
<TASK>
kvm_arch_destroy_vm+0x130/0x1b0 [kvm]
kvm_destroy_vm+0x162/0x2a0 [kvm]
kvm_vcpu_release+0x34/0x60 [kvm]
__fput+0x82/0x240
task_work_run+0x5c/0x90
do_exit+0x364/0xa10
? futex_unqueue+0x38/0x60
do_group_exit+0x33/0xa0
get_signal+0x155/0x850
arch_do_signal_or_restart+0xed/0x750
exit_to_user_mode_prepare+0xc5/0x120
syscall_exit_to_user_mode+0x1d/0x40
do_syscall_64+0x48/0xc0
entry_SYSCALL_64_after_hwframe+0x44/0xaeIf kvm_tdp_mmu_zap_all() skips a gfn/SPTE but that SPTE is then zapped by
kvm_tdp_mmu_put_root(), KVM triggers a use-after-free in the form of
marking a struct page as dirty/accessed after it has been put back on the
free list. This directly triggers a WARN due to encountering a page with
page_count() == 0, but it can also lead to data corruption and additional
errors in the kernel.WARNING: CPU: 7 PID: 1995658 at arch/x86/kvm/../../../virt/kvm/kvm_main.c:171
RIP: 0010:kvm_is_zone_device_pfn.part.0+0x9e/0xd0 [kvm]
Call Trace:
<TASK>
kvm_set_pfn_dirty+0x120/0x1d0 [kvm]
__handle_changed_spte+0x92e/0xca0 [kvm]
__handle_changed_spte+0x63c/0xca0 [kvm]
__handle_changed_spte+0x63c/0xca0 [kvm]
__handle_changed_spte+0x63c/0xca0 [kvm]
zap_gfn_range+0x549/0x620 [kvm]
kvm_tdp_mmu_put_root+0x1b6/0x270 [kvm]
mmu_free_root_page+0x219/0x2c0 [kvm]
kvm_mmu_free_roots+0x1b4/0x4e0 [kvm]
kvm_mmu_unload+0x1c/0xa0 [kvm]
kvm_arch_destroy_vm+0x1f2/0x5c0 [kvm]
kvm_put_kvm+0x3b1/0x8b0 [kvm]
kvm_vcpu_release+0x4e/0x70 [kvm]
__fput+0x1f7/0x8c0
task_work_run+0xf8/0x1a0
do_exit+0x97b/0x2230
do_group_exit+0xda/0x2a0
get_signal+0x3be/0x1e50
arch_do_signal_or_restart+0x244/0x17f0
exit_to_user_mode_prepare+0xcb/0x120
syscall_exit_to_user_mode+0x1d/0x40
do_syscall_64+0x4d/0x90
entry_SYSCALL_64_after_hwframe+0x44/0xaeNote, the underlying bug existed even before commit 1af4a96025b3 ("KVM:
x86/mmu: Yield in TDU MMU iter even if no SPTES changed") moved calls to
tdp_mmu_iter_cond_resched() to the beginning of loops, as KVM could still
incorrectly advance past a top-level entry when yielding on a lower-level
entry. But with respect to leaking shadow pages, the bug was introduced
by yielding before processing the current gfn.Alternatively, tdp_mmu_iter_cond_resched() could simply fall through, or
callers could jump to their "retry" label. The downside of that approach
is that tdp_mmu_iter_cond_resched() _must_ be called before anything else
in the loop, and there's no easy way to enfornce that requirement.Ideally, KVM would handling the cond_resched() fully within the iterator
macro (the code is actually quite clean) and avoid this entire class of
bugs, but that is extremely difficult do wh
---truncated--- | []
| null | 7.1 | null | null |
|
CVE-2023-42362 | An arbitrary file upload vulnerability in Teller Web App v.4.4.0 allows a remote attacker to execute arbitrary commands and obtain sensitive information via uploading a crafted file. | [
"cpe:2.3:a:teller:teller:4.4.0:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
GHSA-c635-w8p8-6666 | The Everest Poker (aka com.wEverestPoker) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | []
| null | null | null | null |
|
GHSA-x2x5-2j3g-8q37 | ClamAV (aka Clam AntiVirus) before 0.99.2 allows remote attackers to cause a denial of service (application crash) via a crafted mew packer executable. | []
| null | null | 5.5 | null |
|
CVE-2021-3605 | There's a flaw in OpenEXR's rleUncompress functionality in versions prior to 3.0.5. An attacker who is able to submit a crafted file to an application linked with OpenEXR could cause an out-of-bounds read. The greatest risk from this flaw is to application availability. | [
"cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
CVE-2021-46365 | An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute XML External Entity attacks via a crafted XLF file. | [
"cpe:2.3:a:magnolia-cms:magnolia_cms:*:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 6.8 |
|
CVE-2019-25002 | An issue was discovered in the sodiumoxide crate before 0.2.5 for Rust. generichash::Digest::eq compares itself to itself and thus has degenerate security properties. | [
"cpe:2.3:a:sodiumoxide_project:sodiumoxide:*:*:*:*:*:rust:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-76vv-65xc-fv9q | In affected versions of Octopus Deploy it is possible to render user supplied input into the webpage | []
| null | 5.3 | null | null |
|
CVE-2010-1868 | The (1) sqlite_single_query and (2) sqlite_array_query functions in ext/sqlite/sqlite.c in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to execute arbitrary code by calling these functions with an empty SQL query, which triggers access of uninitialized memory. | [
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
RHSA-2023:1443 | Red Hat Security Advisory: thunderbird security update | nss: Arbitrary memory write via PKCS 12 Mozilla: Incorrect code generation during JIT compilation Mozilla: Potential out-of-bounds when accessing throttled streams Mozilla: Invalid downcast in Worklets Mozilla: URL being dragged from a removed cross-origin iframe into the same tab triggered navigation Mozilla: Memory safety bugs fixed in Firefox 111 and Firefox ESR 102.9 | [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/a:redhat:rhel_e4s:8.2::appstream",
"cpe:/a:redhat:rhel_tus:8.2::appstream"
]
| null | 8.8 | null | null |
CVE-2022-24607 | Luocms v2.0 is affected by SQL Injection in /admin/news/news_ok.php. | [
"cpe:2.3:a:luocms_project:luocms:2.0:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
RHSA-2008:0556 | Red Hat Security Advisory: freetype security update | FreeType PFB integer overflow FreeType invalid free() flaw FreeType off-by-one flaws | [
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws",
"cpe:/o:redhat:enterprise_linux:4::as",
"cpe:/o:redhat:enterprise_linux:4::desktop",
"cpe:/o:redhat:enterprise_linux:4::es",
"cpe:/o:redhat:enterprise_linux:4::ws",
"cpe:/o:redhat:enterprise_linux:5::client",
"cpe:/o:redhat:enterprise_linux:5::client_workstation",
"cpe:/o:redhat:enterprise_linux:5::server"
]
| null | null | null | null |
GHSA-jqmc-79gx-7g8p | Incorrect Permission Assignment for Critical Resource in CRI-O | An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace. | []
| null | 4.2 | null | null |
GHSA-gph4-ppxc-ppv3 | Unspecified vulnerability in the Application Server Control component in Oracle Fusion Middleware 10.1.2.3 and 10.1.4.0.1 allows remote authenticated users to affect integrity via unknown vectors, a different vulnerability than CVE-2010-2381. | []
| null | null | null | null |
|
GHSA-rp9w-gg6h-qj9m | OECMS v4.3.R60321 and v4.3 later is affected by: Cross Site Request Forgery (CSRF). The impact is: The victim clicks on adding an administrator account. The component is: admincp.php. The attack vector is: network connectivity. The fixed version is: v4.3. | []
| null | null | 8.8 | null |
|
CVE-2021-2323 | Vulnerability in the Oracle FLEXCUBE Universal Banking product of Oracle Financial Services Applications (component: Flex-Branch). Supported versions that are affected are 12.3, 12.4, 14.0-14.4 and . Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle FLEXCUBE Universal Banking. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle FLEXCUBE Universal Banking accessible data. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N). | [
"cpe:2.3:a:oracle:flexcube_universal_banking:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_universal_banking:12.4.0:*:*:*:*:*:*:*"
]
| null | 5.9 | null | null |
|
RHSA-2020:0815 | Red Hat Security Advisory: firefox security update | usrsctp: Out of bounds reads in sctp_load_addresses_from_init() Mozilla: Use-after-free when removing data about origins Mozilla: BodyStream:: OnInputStreamReady was missing protections against state confusion Mozilla: Use-after-free in cubeb during stream destruction Mozilla: Devtools' 'Copy as cURL' feature did not fully escape website-controlled data, potentially leading to command injection Mozilla: The names of AirPods with personally identifiable information were exposed to websites with camera or microphone permission Mozilla: Memory safety bugs fixed in Firefox 74 and Firefox ESR 68.6 | [
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
]
| null | 9.8 | 6.1 | null |
GHSA-4pv8-hfx7-rfh8 | The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure." | []
| null | null | null | null |
|
GHSA-6cq4-xx4r-xc82 | In Exiv2 0.26, Exiv2::IptcParser::decode in iptc.cpp (called from psdimage.cpp in the PSD image reader) may suffer from a denial of service (heap-based buffer over-read) caused by an integer overflow via a crafted PSD image file. | []
| null | null | 6.5 | null |
|
CVE-2013-6336 | The ieee802154_map_rec function in epan/dissectors/packet-ieee802154.c in the IEEE 802.15.4 dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 uses an incorrect pointer chain, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. | [
"cpe:2.3:a:wireshark:wireshark:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.9:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.8.10:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:wireshark:wireshark:1.10.2:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
GHSA-3rx9-3f42-rqvh | Use-after-free vulnerability in the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.91, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving movement of a SCRIPT element across documents. | []
| null | null | null | null |
|
RHEA-2021:5066 | Red Hat Enhancement Advisory: MTV 2.2.0 Images | nodejs-axios: Regular expression denial of service in trim function moby: `docker cp` allows unexpected chmod of host file | [
"cpe:/a:redhat:migration_toolkit_virtualization:2.2::el8"
]
| null | 5.3 | null | null |
GHSA-4r6m-j55r-vxwv | The quicktime_user_atoms_read_atom function in useratoms.c in libquicktime 1.2.4 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) via a crafted mp4 file. | []
| null | null | 6.5 | null |
|
GHSA-q77g-pr8j-57vw | Use-after-free vulnerability in browser/ui/views/speech_recognition_bubble_views.cc in Google Chrome before 34.0.1847.131 on Windows and OS X and before 34.0.1847.132 on Linux allows remote attackers to cause a denial of service or possibly have unspecified other impact via an INPUT element that triggers the presence of a Speech Recognition Bubble window for an incorrect duration. | []
| null | null | null | null |
|
RHSA-2020:4827 | Red Hat Security Advisory: oniguruma security update | oniguruma: NULL pointer dereference in match_at() in regexec.c | [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
]
| null | null | 5.3 | null |
GHSA-8xjh-5fhm-3f4q | EMC Isilon OneFS is affected by a path traversal vulnerability that may potentially be exploited by attackers to compromise the affected system. Affected versions are 7.1.0 - 7.1.1.10, 7.2.0 - 7.2.1.3, and 8.0.0 - 8.0.0.1. | []
| null | null | 7.5 | null |
|
CVE-2024-8395 | FlyCASS Cockpit Access Security System (CASS) SQL Injection | FlyCASS CASS and KCM systems did not correctly filter SQL queries, which
made them vulnerable to attack by outside attackers with no
authentication. | [
"cpe:2.3:a:flycass:flycass:-:*:*:*:*:*:*:*"
]
| 9.3 | 9.8 | null | null |
GHSA-p64x-8rxx-wf6q | Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection | An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The `Trunc()` and `Extract()` database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. | []
| 9.3 | 9.8 | null | null |
GHSA-377x-3gqm-h467 | Multiple SQL injection vulnerabilities in the Call Logging feature in FrontRange HEAT 8.01 allow remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters. | []
| null | null | null | null |
|
CVE-2005-0884 | DigitalHive 2.0 allows remote attackers to re-install the product by directly accessing the install script. | [
"cpe:2.3:a:digitalhive:digitalhive:2.0:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
PYSEC-2022-43156 | null | Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0a4. | []
| null | 9.8 | null | null |
CVE-2019-8938 | VertrigoServ 2.17 allows XSS via the /inc/extensions.php ext parameter. | [
"cpe:2.3:a:vertrigoserv_project:vertrigoserv:2.17:*:*:*:*:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
GHSA-mr2g-87r5-j9x5 | A server-side request forgery (SSRF) was discovered in the Akana Community Manager Developer Portal in versions prior to and including 2022.1.3. Reported by Jakob Antonsson. | []
| null | 9.3 | null | null |
|
CVE-2015-8524 | Cross-site scripting (XSS) vulnerability in Process Portal in IBM Business Process Manager 8.5.0.x through 8.5.0.2, 8.5.5.x through 8.5.5.0, and 8.5.6.x through 8.5.6.2 allows remote attackers to inject arbitrary web script or HTML via a crafted URL. | [
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.1:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.0.2:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.5.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.0:*:*:*:standard:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:advanced:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:business_process_manager:8.5.6.2:*:*:*:standard:*:*:*"
]
| null | null | 6.1 | 4.3 |
|
CVE-2010-3041 | Multiple buffer overflows in the Cisco WebEx Recording Format (WRF) and Advanced Recording Format (ARF) Players T27LB before SP21 EP3 and T27LC before SP22 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted (1) .wrf or (2) .arf file, related to atas32.dll, a different vulnerability than CVE-2010-3042, CVE-2010-3043, and CVE-2010-3044. | [
"cpe:2.3:a:cisco:webex_recording_format_player:26.49:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.11.0.3328:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_recording_format_player:27.13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:26.49:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.11.0.3328:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:webex_advanced_recording_format_player:27.13:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
CVE-2021-1460 | Cisco IOx Application Framework Denial of Service Vulnerability | A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition. | [
"cpe:2.3:a:cisco:ios:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:809_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:cgr1000_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:cgr1000:-:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ic3000_industrial_compute_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:ic3000_industrial_compute_gateway:-:*:*:*:*:*:*:*"
]
| null | 5.3 | null | null |
GHSA-wfm8-qgj5-39hf | Office Viewer in Apple iOS before 6 writes cleartext document data to a temporary file, which might allow local users to bypass a document's intended (1) Data Protection level or (2) encryption state by reading the temporary content. | []
| null | null | null | null |
|
CVE-2021-28977 | Cross Site Scripting vulnerability in GetSimpleCMS 3.3.16 in admin/upload.php by adding comments or jpg and other file header information to the content of xla, pages, and gzip files, | [
"cpe:2.3:a:get-simple:getsimplecms:*:*:*:*:*:*:*:*"
]
| null | 4.8 | null | 3.5 |
|
GHSA-mqc9-c5v8-8hw8 | Directory traversal vulnerability in index.php in Anantasoft Gazelle CMS 1.0, when magic_quotes_gpc is disabled, allows remote attackers to read arbitrary files via a .. (dot dot) in the template parameter. | []
| null | null | null | null |
|
GHSA-7j7w-r8q7-jxh2 | The Microsoft (1) JScript and (2) VBScript engines, as used in Internet Explorer 11, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." | []
| null | null | 8.8 | null |
|
CVE-2023-37952 | A cross-site request forgery (CSRF) vulnerability in Jenkins mabl Plugin 0.0.46 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [
"cpe:2.3:a:jenkins:mabl:*:*:*:*:*:jenkins:*:*"
]
| null | 6.5 | null | null |
|
CVE-2022-40849 | ThinkCMF version 6.0.7 is affected by Stored Cross-Site Scripting (XSS). An attacker who successfully exploited this vulnerability could inject a Persistent XSS payload in the Slideshow Management section that execute arbitrary JavaScript code on the client side, e.g., to steal the administrator's PHP session token (PHPSESSID). | [
"cpe:2.3:a:thinkcmf:thinkcmf:6.0.7:*:*:*:*:*:*:*"
]
| null | 5.4 | null | null |
|
CVE-2018-14783 | NetComm Wireless G LTE Light Industrial M2M Router (NWL-25) with firmware 2.0.29.11 and prior. A cross-site request forgery condition can occur, allowing an attacker to change passwords of the device remotely. | [
"cpe:2.3:o:netcommwireless:nwl-25_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:netcommwireless:nwl-25:-:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2021-34619 | Cross-Site Request Forgery in WooCommerce Stock Manager WordPress Plugin | The WooCommerce Stock Manager WordPress plugin is vulnerable to Cross-Site Request Forgery leading to Arbitrary File Upload in versions up to, and including, 2.5.7 due to missing nonce and file validation in the /woocommerce-stock-manager/trunk/admin/views/import-export.php file. | [
"cpe:2.3:a:storeapps:stock_manager_for_woocommerce:*:*:*:*:*:wordpress:*:*"
]
| null | 8.8 | null | null |
CVE-2024-10917 | Eclipse OpenJ9 might return an incorrect value in JNI function GetStringUTFLength | In Eclipse OpenJ9 versions up to 0.47, the JNI function GetStringUTFLength may return an incorrect value which has wrapped around. From 0.48 the value is correct but may be truncated to include a smaller number of characters. | [
"cpe:2.3:a:eclipse:openj9:*:*:*:*:*:*:*:*"
]
| null | 3.7 | null | null |
GHSA-2g8g-29wv-3hm6 | A vulnerability in the routine that loads DLL files in Cisco Meeting App for Windows could allow an authenticated, local attacker to run an executable file with privileges equivalent to those of Cisco Meeting App. The vulnerability is due to incomplete input validation of the path name for DLL files before they are loaded. An attacker could exploit this vulnerability by installing a crafted DLL file in a specific system directory. A successful exploit could allow the attacker to execute commands on the underlying Microsoft Windows host with privileges equivalent to those of Cisco Meeting App. The attacker would need valid user credentials to exploit this vulnerability. Cisco Bug IDs: CSCvd77907. | []
| null | null | 4.2 | null |
|
GHSA-qmxf-pxcp-h7f3 | The crypto provider in Sun Solaris 10 3/05 HW2 without patch 121236-01, when running on Sun Fire T2000 platforms, incorrectly verifies a DSA signature, which might prevent applications from detecting that the data has been modified. | []
| null | null | null | null |
|
GHSA-7wjx-fv7h-5hcg | Rejected reason: Not used | []
| null | null | null | null |
|
CVE-2022-28629 | A local arbitrary code execution vulnerability was discovered in HPE Integrated Lights-Out 5 (iLO 5) firmware version(s): Prior to 2.71. A low privileged user could locally exploit this vulnerability to execute arbitrary code resulting in a complete loss of confidentiality, integrity, and availability. HPE has provided a firmware update to resolve this vulnerability in HPE Integrated Lights-Out 5 (iLO 5). | [
"cpe:2.3:o:hpe:integrated_lights-out_5_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_2000_gen10_plus_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_4510_gen10_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_plus_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_6500_gen10_system:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_n2600_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_n2800_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_r2600_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:apollo_r2800_gen10:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920d_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:edgeline_e920t_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_bl460c_gen10_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl110_gen10_plus_telco_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl120_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl160_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl180_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl20_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl20_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl325_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl345_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl360_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl365_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl380_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl385_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dl580_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx220n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx325_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx360_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx360_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx380_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx380_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx385_gen10_plus_v2_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx4200_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_dx560_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_e910_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_e910t_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_m750_server_blade:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_microserver_gen10_plus:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml110_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml30_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml30_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_ml350_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl170r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl190r_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl220n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl225n_gen10_plus_1u_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl230k_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl270d_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl290n_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl420_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl450_gen10_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl645d_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl675d_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:proliant_xl925g_gen10_plus_server:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storage_file_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storage_performance_file_controller:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1460_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1560_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_expanded_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_performance_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1660_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1860_performance_storage:-:*:*:*:*:*:*:*",
"cpe:2.3:h:hpe:storeeasy_1860_storage:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | null |
|
GHSA-4c37-p59v-2r8g | In JetBrains TeamCity before 2023.05.3 reflected XSS was possible during copying Build Step | []
| null | 4.6 | null | null |
|
GHSA-p7pf-7fvv-cv2q | Integer overflow in the ndn_parse_sequence function in CCN-lite before 2.00 allows context-dependent attackers to have unspecified impact via vectors involving the typ and vallen variables. | []
| null | null | 9.8 | null |
|
GHSA-2qgg-rrhg-f2j5 | The Gentoo mail-filter/assp package 1.9.8.13030 and earlier allows local users to gain privileges by leveraging access to the assp user account to install a Trojan horse /usr/share/assp/assp.pl script. | []
| null | 7.8 | null | null |
|
CVE-2022-43466 | OS command injection vulnerability in Buffalo network devices allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command if a specially crafted request is sent to a specific CGI program. | [
"cpe:2.3:o:buffalo:wsr-3200ax4s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-3200ax4s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-3200ax4b_firmware:1.25:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-3200ax4b:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-2533dhp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-2533dhp2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-a2533dhp2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-a2533dhp2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-2533dhp3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-2533dhp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-a2533dhp3_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-a2533dhp3:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-2533dhpl2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-2533dhpl2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wsr-2533dhpls_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wsr-2533dhpls:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wex-1800ax4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wex-1800ax4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:buffalo:wex-1800ax4ea_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:buffalo:wex-1800ax4ea:-:*:*:*:*:*:*:*"
]
| null | 6.8 | null | null |
|
GHSA-mf4f-cr6h-7rxj | The Cubot Nova Android device with a build fingerprint of CUBOT/CUBOT_NOVA/CUBOT_NOVA:8.1.0/O11019/1527060122:user/release-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. | []
| null | null | null | null |
|
GHSA-v966-22xm-xmh2 | The kernel-mode drivers in Microsoft Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka "Win32k Elevation of Privilege Vulnerability." This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, and CVE-2017-0081. | []
| null | null | 7.8 | null |
|
CVE-2024-20539 | Cisco Identity Services Engine Stored Cross-Site Scripting Vulnerability | A vulnerability in the web-based management interface of Cisco ISE could allow an authenticated, remote attacker to conduct a stored XSS attack against a user of the interface.
This vulnerability exists because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need valid administrative credentials on an affected device. | [
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.0.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*"
]
| null | 4.8 | null | null |
GHSA-9px8-x88q-7f39 | UpdateAgent in Lenovo Accelerator Application allows man-in-the-middle attackers to execute arbitrary code by spoofing an update response from susapi.lenovomm.com. | []
| null | null | 7.5 | null |
|
CVE-2021-45440 | A unnecessary privilege vulnerability in Trend Micro Apex One and Trend Micro Worry-Free Business Security 10.0 SP1 (on-prem versions only) could allow a local attacker to abuse an impersonation privilege and elevate to a higher level of privileges. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. | [
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:-:*:*:*",
"cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:saas:*:*:*",
"cpe:2.3:a:trendmicro:worry-free_business_security:10.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:trendmicro:worry-free_business_security_services:-:*:*:*:saas:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 7.2 |
|
CVE-2012-0735 | IBM Rational AppScan Enterprise 5.x and 8.x before 8.5.0.1 does not properly scan file: URLs, which allows man-in-the-middle attackers to obtain sensitive information or possibly have unspecified other impact via a crafted URI. | [
"cpe:2.3:a:ibm:rational_appscan:5.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:5.4:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:5.5.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:5.5.0.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:5.5.0.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:5.6.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:5.6.0.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.0.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.0.0.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.0.0.2:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.0.0.3:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.0.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.0.1.1:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.5.0:*:enterprise:*:*:*:*:*",
"cpe:2.3:a:ibm:rational_appscan:8.5.0.0:*:enterprise:*:*:*:*:*"
]
| null | null | null | 7.6 |
|
CVE-2022-31121 | Improper Input Validation in fabric hyperledger | Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue. | [
"cpe:2.3:a:hyperledger:fabric:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
cisco-sa-20180418-starosasr | Cisco StarOS IPsec Manager Denial of Service Vulnerability | A vulnerability in the IPsec Manager of Cisco StarOS for Cisco Aggregation Services Router (ASR) 5000 Series Routers and Virtualized Packet Core (VPC) System Software could allow an unauthenticated, remote attacker to terminate all active IPsec VPN tunnels and prevent new tunnels from being established, resulting in a denial of service (DoS) condition.
The vulnerability is due to improper processing of corrupted Internet Key Exchange Version 2 (IKEv2) messages. An attacker could exploit this vulnerability by sending crafted IKEv2 messages toward an affected router. A successful exploit could allow the attacker to cause the ipsecmgr service to reload. A reload of this service could cause all IPsec VPN tunnels to be terminated and prevent new tunnels from being established until the service has restarted, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-starosasr ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-starosasr"] | []
| null | null | 5.3 | null |
GHSA-gcqq-w6gr-h9j9 | Directory traversal vulnerability in RubyZip | The `Zip::File` component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses `../` pathname substrings to write arbitrary files to the filesystem. | []
| null | 9.8 | null | null |
GHSA-pf9j-q5x3-c4pq | tkdiff before 4.1.1 allows local users to overwrite arbitrary files via a symlink attack on temporary files. | []
| null | null | null | null |
|
GHSA-88qx-mx9f-rxcf | Dataprobe iBootBar (with 2007-09-20 and possibly later released firmware) allows remote attackers to bypass authentication, and conduct power-cycle attacks on connected devices, via a DCRABBIT cookie. | []
| null | null | 9.8 | null |
|
GHSA-vhxf-7vqr-mrjg | DOMPurify allows Cross-site Scripting (XSS) | DOMPurify before 3.2.4 has an incorrect template literal regular expression when SAFE_FOR_TEMPLATES is set to true, sometimes leading to mutation cross-site scripting (mXSS). | []
| null | 4.5 | null | null |
GHSA-r326-v6ph-fqqg | BD Alaris Gateway versions, 1.0.13,1.1.3 Build 10,1.1.3 MR Build 11,1.1.5, and 1.1.6, The web browser user interface on the Alaris Gateway Workstation does not prevent an attacker with knowledge of the IP address of the Alaris Gateway Workstation terminal to gain access to the status and configuration information of the device. | []
| null | 5.3 | null | null |
|
CVE-2020-4151 | IBM QRadar SIEM 7.3.0 through 7.3.3 could allow an authenticated attacker to perform unauthorized actions due to improper input validation. IBM X-Force ID: 174201. | [
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
|
CVE-2020-5582 | Cybozu Garoon 4.0.0 to 5.0.1 allows remote authenticated attackers to bypass access restriction to alter the data for the file attached to Report via unspecified vectors. | [
"cpe:2.3:a:cybozu:garoon:*:*:*:*:*:*:*:*"
]
| null | 4.3 | null | 4 |
|
CVE-2022-2549 | NULL Pointer Dereference in gpac/gpac | NULL Pointer Dereference in GitHub repository gpac/gpac prior to v2.1.0-DEV. | [
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
]
| null | null | 5.7 | null |
CVE-2013-2727 | Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-2729. | [
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.1:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.2:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.3:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.4:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.5:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.6:-:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.1:-:pro:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:10.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:11.0.2:*:*:*:*:*:*:*"
]
| null | null | null | 10 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.