id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
197k
cpes
sequencelengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
CVE-2013-2012
autojump before 21.5.8 allows local users to gain privileges via a Trojan horse custom_install directory in the current working directory.
[ "cpe:2.3:a:autojump_project:autojump:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
7.3
null
4.4
CVE-2009-1270
libclamav/untar.c in ClamAV before 0.95 allows remote attackers to cause a denial of service (infinite loop) via a crafted TAR file that causes (1) clamd and (2) clamscan to hang.
[ "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-hwc2-6cgc-779p
Certain NETGEAR devices are affected by authentication bypass. This affects AC2400 before 1.1.0.84, AC2600 before 1.1.0.84, D7000 before 1.0.1.82, R6020 before 1.0.0.52, R6080 before 1.0.0.52, R6120 before 1.0.0.80, R6220 before 1.1.0.110, R6230 before 1.1.0.110, R6260 before 1.1.0.84, R6330 before 1.1.0.84, R6350 before 1.1.0.84, R6700v2 before 1.1.0.84, R6800 before 1.1.0.84, R6850 before 1.1.0.84, R6900v2 before 1.1.0.84, R7200 before 1.1.0.84, R7350 before 1.1.0.84, R7400 before 1.1.0.84, and R7450 before 1.1.0.84.
[]
null
9.8
null
null
GHSA-4g23-3mc5-9qf9
An improper neutralization of input vulnerability [CWE-79] in FortiClientEMS versions 6.4.1 and below and 6.2.9 and below may allow a remote authenticated attacker to inject malicious script/tags via the name parameter of various sections of the server.
[]
null
null
null
null
CVE-2020-16098
It is possible to enumerate access card credentials via an unauthenticated network connection to the server in versions of Command Centre v8.20 prior to v8.20.1166(MR3), versions of 8.10 prior to v8.10.1211(MR5), versions of 8.00 prior to v8.00.1228(MR6), all versions of 7.90 and earlier. These credentials can then be used to encode low security cards to be used by the system where insecure card technologies are supported.
[ "cpe:2.3:a:gallagher:command_centre:*:*:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.00.1228:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.10.1211:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.20.1166:-:*:*:*:*:*:*", "cpe:2.3:a:gallagher:command_centre:8.30.1236:-:*:*:*:*:*:*" ]
null
9.8
null
null
CVE-2024-6507
Deep Lake Kaggle command injection
Command injection when ingesting a remote Kaggle dataset due to a lack of input sanitization in the ingest_kaggle() API
[ "cpe:2.3:a:deeplake:deeplake:3.9.10:*:*:*:*:*:*:*" ]
null
8.1
null
null
RHSA-2018:0058
Red Hat Security Advisory: qemu-kvm-rhev security update
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 10.0 (Newton). Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
[ "cpe:/a:redhat:openstack:10::el7" ]
null
null
null
null
GHSA-mrg8-h43c-3q4j
A vulnerability was discovered in SS in Samsung Mobile Processor, Wearable Processor, and Modems with versions Exynos 9820, Exynos 9825, Exynos 980, Exynos 990, Exynos 850, Exynos 1080, Exynos 2100, Exynos 2200, Exynos 1280, Exynos 1380, Exynos 1330, Exynos 2400, Exynos 9110, Exynos W920, Exynos W930, Exynos Modem 5123, and Exynos Modem 5300 that involves a NULL pointer dereference which can cause abnormal termination of a mobile phone via a manipulated packet.
[]
null
5.3
null
null
CVE-2024-49604
WordPress Simple User Registration plugin <= 5.5 - Account Takeover vulnerability
Authentication Bypass Using an Alternate Path or Channel vulnerability in Najeeb Ahmad Simple User Registration allows Authentication Bypass.This issue affects Simple User Registration: from n/a through 5.5.
[ "cpe:2.3:a:najeeb_ahmad:simple_user_registration:*:*:*:*:*:*:*:*", "cpe:2.3:a:najeebmedia:simple_user_registration:*:*:*:*:*:wordpress:*:*" ]
null
9.8
null
null
GHSA-57pq-pp54-cgmc
Cross-site scripting (XSS) vulnerability in Request Tracker (RT) 4.x before 4.0.25, 4.2.x before 4.2.14, and 4.4.x before 4.4.2, when the AlwaysDownloadAttachments config setting is not in use, allows remote attackers to inject arbitrary web script or HTML via a file upload with an unspecified content type.
[]
null
null
6.1
null
GHSA-6xf7-p3jx-g67x
Adobe Reader and Acrobat 10.x before 10.1.15 and 11.x before 11.0.12, Acrobat and Acrobat Reader DC Classic before 2015.006.30060, and Acrobat and Acrobat Reader DC Continuous before 2015.008.20082 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2015-3095, CVE-2015-5087, CVE-2015-5094, CVE-2015-5100, CVE-2015-5102, CVE-2015-5103, and CVE-2015-5104.
[]
null
null
null
null
GHSA-hf29-9hfh-w63j
Duplicate Advisory: Gogs allows argument injection during the previewing of changes
Duplicate AdvisoryThis advisory has been withdrawn because it is a duplicate of GHSA-9pp6-wq8c-3w2c. This link is maintained to preserve external references.Original DescriptionGogs through 0.13.0 allows argument injection during the previewing of changes.
[]
9.4
9.9
null
null
GHSA-gmmm-vrfh-pfj9
Unspecified vulnerability in the WebLogic Portal component in BEA Product Suite 10.3, 10.2, 10.0 MP1, 9.2 MP3, and 8.1 SP6 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.
[]
null
null
null
null
GHSA-8w66-g4m4-h3qv
SAP BusinessObjects Business Intelligence platform, versions 410, 420, allows an authenticated attacker to inject malicious JavaScript payload into the custom value input field of an Input Control, which can be executed by User who views the relevant application content, which leads to Stored Cross-Site Scripting.
[]
null
null
null
null
GHSA-pwc7-rcq3-j2vw
In the Linux kernel, the following vulnerability has been resolved:arm64/fpsimd: Discard stale CPU state when handling SME trapsThe logic for handling SME traps manipulates saved FPSIMD/SVE/SME state incorrectly, and a race with preemption can result in a task having TIF_SME set and TIF_FOREIGN_FPSTATE clear even though the live CPU state is stale (e.g. with SME traps enabled). This can result in warnings from do_sme_acc() where SME traps are not expected while TIF_SME is set:| /* With TIF_SME userspace shouldn't generate any traps */ | if (test_and_set_thread_flag(TIF_SME)) | WARN_ON(1);This is very similar to the SVE issue we fixed in commit:751ecf6afd6568ad ("arm64/sve: Discard stale CPU state when handling SVE traps")The race can occur when the SME trap handler is preempted before and after manipulating the saved FPSIMD/SVE/SME state, starting and ending on the same CPU, e.g.| void do_sme_acc(unsigned long esr, struct pt_regs *regs) | { | // Trap on CPU 0 with TIF_SME clear, SME traps enabled | // task->fpsimd_cpu is 0. | // per_cpu_ptr(&fpsimd_last_state, 0) is task. | | ... | | // Preempted; migrated from CPU 0 to CPU 1. | // TIF_FOREIGN_FPSTATE is set. | | get_cpu_fpsimd_context(); | | /* With TIF_SME userspace shouldn't generate any traps */ | if (test_and_set_thread_flag(TIF_SME)) | WARN_ON(1); | | if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) { | unsigned long vq_minus_one = | sve_vq_from_vl(task_get_sme_vl(current)) - 1; | sme_set_vq(vq_minus_one); | | fpsimd_bind_task_to_cpu(); | } | | put_cpu_fpsimd_context(); | | // Preempted; migrated from CPU 1 to CPU 0. | // task->fpsimd_cpu is still 0 | // If per_cpu_ptr(&fpsimd_last_state, 0) is still task then: | // - Stale HW state is reused (with SME traps enabled) | // - TIF_FOREIGN_FPSTATE is cleared | // - A return to userspace skips HW state restore | }Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set by calling fpsimd_flush_task_state() to detach from the saved CPU state. This ensures that a subsequent context switch will not reuse the stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the new state to be reloaded from memory prior to a return to userspace.Note: this was originallly posted as [1].[ Rutland: rewrite commit message ]
[]
null
null
null
null
GHSA-2jg6-w6jg-4rh2
Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819.
[]
null
6.5
null
null
GHSA-fwr2-hpwg-f69q
Unified Automation UaGateway OPC UA Server Use-After-Free Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Unified Automation UaGateway. Authentication is required to exploit this vulnerability.The specific flaw exists within the implementation of the ImportXML function. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-20497.
[]
null
null
6.5
null
GHSA-qhqw-wg75-8f69
The WP Simple Shopping Cart plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 4.6.3 due to the plugin saving shopping cart data exports in a publicly accessible location (/wp-content/plugins/wordpress-simple-paypal-shopping-cart/includes/admin/). This makes it possible for unauthenticated attackers to view information that should be limited to administrators only and can include data like first name, last name, email, address, IP Address, and more.
[]
null
5.3
null
null
GHSA-86qm-m584-7grg
A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_fuel.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
null
null
CVE-2022-40816
Zammad 5.2.1 is vulnerable to Incorrect Access Control. Zammad's asset handling mechanism has logic to ensure that customer users are not able to see personal information of other users. This logic was not effective when used through a web socket connection, so that a logged-in attacker would be able to fetch personal data of other users by querying the Zammad API. This issue is fixed in , 5.2.2.
[ "cpe:2.3:a:zammad:zammad:*:*:*:*:*:*:*:*" ]
null
6.5
null
null
CVE-2002-2105
Microsoft Windows XP allows local users to prevent the system from booting via a corrupt explorer.exe.manifest file.
[ "cpe:2.3:o:microsoft:windows_xp:*:*:home:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:gold:professional:*:*:*:*:*" ]
null
null
null
2.1
CVE-2025-23423
WordPress SendGrid for WordPress plugin <= 1.4 - Broken Access Control vulnerability
Missing Authorization vulnerability in Smackcoders SendGrid for WordPress allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects SendGrid for WordPress: from n/a through 1.4.
[]
null
4.3
null
null
GHSA-j36c-g9g3-m3ph
Incorrect handling of picture ID in WebRTC in Google Chrome prior to 58.0.3029.96 for Mac, Windows, and Linux allowed a remote attacker to trigger a race condition via a crafted HTML page.
[]
null
7.5
null
null
GHSA-7mqh-jgh5-fv37
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the arpbrocast binary.
[]
null
9.8
null
null
GHSA-3fhv-q33v-8j9m
Improper access control in Azure SaaS Resources allows an authorized attacker to disclose information over a network.
[]
null
8.8
null
null
GHSA-pxxv-rv32-2qgv
OpenStack Nova uses insecure keystone middleware tmpdir by default
keystone/middleware/auth_token.py in OpenStack Nova Folsom, Grizzly, and Havana uses an insecure temporary directory for storing signing certificates, which allows local users to spoof servers by pre-creating this directory, which is reused by Nova, as demonstrated using /tmp/keystone-signing-nova on Fedora.
[]
null
4.3
null
null
CVE-2024-36840
SQL Injection vulnerability in Boelter Blue System Management v.1.3 allows a remote attacker to execute arbitrary code and obtain sensitive information via the id parameter to news_details.php and location_details.php; and the section parameter to services.php.
[ "cpe:2.3:a:boelter:blue_system_management:*:*:*:*:*:*:*:*" ]
null
9.1
null
null
CVE-2024-12233
code-projects Online Notice Board Profile Picture registration.php unrestricted upload
A vulnerability was found in code-projects Online Notice Board up to 1.0 and classified as critical. This issue affects some unknown processing of the file /registration.php of the component Profile Picture Handler. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:kashipara:online_notice_board_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:fabianros:online_notice_board:1.0:*:*:*:*:*:*:*" ]
6.9
7.3
7.3
7.5
CVE-2024-20918
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u391, 8u391-perf, 11.0.21, 17.0.9, 21.0.1; Oracle GraalVM for JDK: 17.0.9, 21.0.1; Oracle GraalVM Enterprise Edition: 20.3.12, 21.3.8 and 22.3.4. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
[ "cpe:2.3:a:oracle:graalvm:20.3.12:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:21.3.8:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm:22.3.4:*:*:*:enterprise:*:*:*", "cpe:2.3:a:oracle:graalvm_for_jdk:17.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:graalvm_for_jdk:21.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update391:*:*:-:*:*:*", "cpe:2.3:a:oracle:jdk:1.8.0:update391:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jdk:11.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:17.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jdk:21.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update391:*:*:-:*:*:*", "cpe:2.3:a:oracle:jre:1.8.0:update391:*:*:enterprise_performance_pack:*:*:*", "cpe:2.3:a:oracle:jre:11.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:17.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:jre:21.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_insights_acquisition_unit:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:cloud_insights_storage_workload_security_agent:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*" ]
null
7.4
null
null
GHSA-xx2h-qwcv-vv5w
In the Linux kernel, the following vulnerability has been resolved:arm64/crc-t10dif: fix use of out-of-scope array in crc_t10dif_arch()Fix a silly bug where an array was used outside of its scope.
[]
null
null
null
null
CVE-2021-24878
SupportCandy < 2.2.7 - Reflected Cross-Site Scripting
The SupportCandy WordPress plugin before 2.2.7 does not sanitise and escape the query string before outputting it back in pages with the [wpsc_create_ticket] shortcode embed, leading to a Reflected Cross-Site Scripting issue
[ "cpe:2.3:a:supportcandy:supportcandy:*:*:*:*:*:wordpress:*:*" ]
null
6.1
null
4.3
GHSA-jjh8-mf4r-2cw2
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Microsoft Edge accesses objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8649, CVE-2017-8660, CVE-2017-8729, CVE-2017-8738, CVE-2017-8740, CVE-2017-8741, CVE-2017-8748, CVE-2017-8752, CVE-2017-8753, CVE-2017-8755, and CVE-2017-11764.
[]
null
null
7.5
null
GHSA-gpgc-3g77-hjgf
The ax25_recvmsg function in net/ax25/af_ax25.c in the Linux kernel before 3.9-rc7 does not initialize a certain data structure, which allows local users to obtain sensitive information from kernel stack memory via a crafted recvmsg or recvfrom system call.
[]
null
null
null
null
GHSA-fjc5-6pxf-p2h2
Multiple SQL injection vulnerabilities in mcGallery PRO 2.2 and earlier allow remote attackers to execute arbitrary SQL commands via the (1) id, (2) start, and (3) rand parameters to show.php, and the (4) album parameter to index.php.
[]
null
null
null
null
CVE-2014-2777
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary web script with increased privileges via unspecified vectors, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2014-1778.
[ "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-7p4v-ppf8-95r7
A vulnerability has been identified in APOGEE MBC (PPC) (BACnet) (All versions), APOGEE MBC (PPC) (P2 Ethernet) (All versions), APOGEE MEC (PPC) (BACnet) (All versions), APOGEE MEC (PPC) (P2 Ethernet) (All versions), APOGEE PXC Compact (BACnet) (All versions), APOGEE PXC Compact (P2 Ethernet) (All versions), APOGEE PXC Modular (BACnet) (All versions), APOGEE PXC Modular (P2 Ethernet) (All versions), Capital VSTAR (All versions), Nucleus NET (All versions), Nucleus ReadyStart V3 (All versions < V2017.02.4), Nucleus Source Code (All versions), TALON TC Compact (BACnet) (All versions), TALON TC Modular (BACnet) (All versions). The DHCP client application assumes that the data supplied with the “Hostname” DHCP option is NULL terminated. In cases when global hostname variable is not defined, this may lead to Out-of-bound reads, writes, and Denial-of-service conditions. (FSMD-2021-0014)
[]
null
9.8
null
null
CVE-2017-15380
XSS exists in the E-Sic 1.0 /cadastro/index.php URI (aka the requester's registration area) via the nome parameter.
[ "cpe:2.3:a:softwarepublico:e-sic:1.0:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
CVE-2022-30659
Adobe InDesign Font Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability
Adobe InDesign versions 17.2.1 (and earlier) and 16.4.1 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[ "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
null
7.8
null
CVE-2017-13053
The BGP parser in tcpdump before 4.9.2 has a buffer over-read in print-bgp.c:decode_rt_routing_info().
[ "cpe:2.3:a:tcpdump:tcpdump:*:*:*:*:*:*:*:*" ]
null
null
9.8
7.5
CVE-2023-42749
In enginnermode service, there is a possible way to write permission usage records of an app due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed
[ "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:s8000:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc7731e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9832e:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:sc9863a:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t310:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t606:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t610:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t612:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t616:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t618:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t760:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t770:-:*:*:*:*:*:*:*", "cpe:2.3:h:unisoc:t820:-:*:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-c7c7-8vw9-wpp6
Uncontrolled search path in some Intel(R) Rendering Toolkit software before version 2024.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
[]
5.4
6.7
null
null
GHSA-55jm-hf67-79p8
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Office 365 ProPlus, Microsoft Office.
[]
null
null
5.5
null
GHSA-4r8h-m8q8-74wm
A reflected XSS vulnerability exists in tohtml/convert.php of Winmail 6.5, which can cause JavaScript code to be executed.
[]
null
null
null
null
CVE-2019-1003035
An information exposure vulnerability exists in Jenkins Azure VM Agents Plugin 0.8.0 and earlier in src/main/java/com/microsoft/azure/vmagent/AzureVMAgentTemplate.java, src/main/java/com/microsoft/azure/vmagent/AzureVMCloud.java that allows attackers with Overall/Read permission to perform the 'verify configuration' form validation action, thereby obtaining limited information about the Azure configuration.
[ "cpe:2.3:a:jenkins:azure_vm_agents:*:*:*:*:*:jenkins:*:*" ]
null
4.3
null
4
CVE-2016-6045
IBM Tivoli Storage Manager Operations Center is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.
[ "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:6.4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:tivoli_storage_manager:7.1.7:*:*:*:*:*:*:*" ]
null
null
8.8
6.8
GHSA-jp54-39p3-825v
In Medtronic Valleylab FT10 Energy Platform (VLFT10GEN) version 2.1.0 and lower and version 2.0.3 and lower, and Valleylab LS10 Energy Platform (VLLS10GEN?not available in the United States) version 1.20.2 and lower, the RFID security mechanism used for authentication between the FT10/LS10 Energy Platform and instruments can be bypassed, allowing for inauthentic instruments to connect to the generator.
[]
null
4.6
null
null
CVE-2024-23787
Path traversal vulnerability in Energy Management Controller with Cloud Services JH-RVB1 /JH-RV11 Ver.B0.1.9.1 and earlier allows a network-adjacent unauthenticated attacker to obtain an arbitrary file in the affected product.
[ "cpe:2.3:a:sharp_corporation:energy_management_controller_with_cloud_services:*:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:jh-rvb1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:jh-rvb1:-:*:*:*:*:*:*:*", "cpe:2.3:o:sharp:jh-rv11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:sharp:jh-rv11:-:*:*:*:*:*:*:*" ]
null
7.5
null
null
CVE-2018-1447
The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.
[ "cpe:2.3:a:ibm:spectrum_protect_for_space_management:*:*:*:*:*:vmware:*:*", "cpe:2.3:a:ibm:spectrum_protect_for_virtual_environments:*:*:*:*:*:vmware:*:*", "cpe:2.3:a:ibm:spectrum_protect_snapshot:*:*:*:*:*:vmware:*:*" ]
null
null
5.1
null
GHSA-c3x8-mv88-7qvp
Cups Easy (Purchase & Inventory) 1.0 is vulnerable to CSRF that leads to admin account takeover via passwordmychange.php.
[]
null
null
null
null
GHSA-g5cv-cw8w-2mp7
A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with "NT AUTHORITY\NetworkService" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.
[]
8.7
8.8
null
null
GHSA-4832-c6xm-3mhf
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in SKT Themes SKT Addons for Elementor allows Stored XSS.This issue affects SKT Addons for Elementor: from n/a through 2.1.
[]
null
6.5
null
null
GHSA-8j8v-v524-wqw4
Cross-site scripting (XSS) vulnerability in thread.php in WoltLab Burning Board 2.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via the hilight parameter.
[]
null
null
null
null
CVE-2003-1311
siteminderagent/SmMakeCookie.ccc in Netegrity SiteMinder does not ensure that the TARGET parameter names a valid redirection resource, which allows remote attackers to construct a URL that might trick users into visiting an arbitrary web site referenced by this parameter.
[ "cpe:2.3:a:netegrity:siteminder:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
CVE-2013-2784
Triangle Research International (aka Tri) Nano-10 PLC devices with firmware before r81 use an incorrect algorithm for bounds checking of data in Modbus/TCP packets, which allows remote attackers to cause a denial of service (networking outage) via a crafted packet to TCP port 502.
[ "cpe:2.3:o:triplc:nano-10_plc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:triplc:nano-10_plc:-:*:*:*:*:*:*:*" ]
null
null
null
7.8
GHSA-56gq-w62x-558w
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes an RFC 1918 IP address within a web page, which allows remote attackers to obtain potentially sensitive information by reading this page, as demonstrated by smb/user/list-data/items-per-page/ and certain other files.
[]
null
null
null
null
CVE-2018-6544
pdf_load_obj_stm in pdf/pdf-xref.c in Artifex MuPDF 1.12.0 could reference the object stream recursively and therefore run out of error stack, which allows remote attackers to cause a denial of service via a crafted PDF document.
[ "cpe:2.3:a:artifex:mupdf:1.12.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*" ]
null
null
5.5
4.3
CVE-2024-12627
Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups <= 1.3.5 - Missing Authorization to Authenticated (Contributor+) PHP Object Injection
The Coupon X: Discount Pop Up, Promo Code Pop Ups, Announcement Pop Up, WooCommerce Popups plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.3.5 via deserialization of untrusted input from post content passed to the capture_email AJAX action. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code.
[]
null
7.5
null
null
GHSA-rw3g-85qv-84cg
The vulnerability allows attackers access to the root account without having to authenticate. Specifically, if the device is configured with the IP address of 10.10.10.10, the root user is automatically logged in.
[]
null
9.8
null
null
CVE-2025-0706
JoeyBling bootplus admin.html cross site scripting
A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/sys/admin.html. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
[]
5.1
2.4
2.4
3.3
CVE-2015-3214
The pit_ioport_read in i8254.c in the Linux kernel before 2.6.33 and QEMU before 2.3.1 does not distinguish between read lengths and write lengths, which might allow guest OS users to execute arbitrary code on the host OS by triggering use of an invalid index.
[ "cpe:2.3:a:qemu:qemu:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.12:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.13:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.14:*:*:*:*:*:*:*", "cpe:2.3:o:arista:eos:4.15:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:emc_px12-400r_ivx:*:*:*:*:*:*:*:*", "cpe:2.3:o:lenovo:emc_px12-450r_ivx:*:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:virtualization:3.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_compute_node_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.1_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.2_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.3:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:7.7:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*" ]
null
null
null
6.9
CVE-2003-0835
Multiple buffer overflows in asf_http_request of MPlayer before 0.92 allows remote attackers to execute arbitrary code via an ASX header with a long hostname.
[ "cpe:2.3:a:mplayer:mplayer:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:0.90_pre:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:0.90_rc:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:0.90_rc4:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:mplayer:mplayer:1.0_pre1:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-pmp4-prv5-pw73
The Slider comparison image before and after plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's [sciba] shortcode in all versions up to, and including, 0.8.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
[]
null
6.4
null
null
CVE-2018-7793
A Credential Management vulnerability exists in FoxView HMI SCADA (All Foxboro DCS, Foxboro Evo, and IA Series versions prior to Foxboro DCS Control Core Services 9.4 (CCS 9.4) and FoxView 10.5.) which could cause unauthorized disclosure, modification, or disruption in service when the password is modified without permission.
[ "cpe:2.3:a:schneider-electric:foxboro_dcs:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:foxboro_evo:*:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:foxview:10.5:*:*:*:*:*:*:*", "cpe:2.3:a:schneider-electric:ia_series:*:*:*:*:*:*:*:*" ]
null
null
8.7
4.6
CVE-2021-47413
usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle
In the Linux kernel, the following vulnerability has been resolved: usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle When passing 'phys' in the devicetree to describe the USB PHY phandle (which is the recommended way according to Documentation/devicetree/bindings/usb/ci-hdrc-usb2.txt) the following NULL pointer dereference is observed on i.MX7 and i.MX8MM: [ 1.489344] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000098 [ 1.498170] Mem abort info: [ 1.500966] ESR = 0x96000044 [ 1.504030] EC = 0x25: DABT (current EL), IL = 32 bits [ 1.509356] SET = 0, FnV = 0 [ 1.512416] EA = 0, S1PTW = 0 [ 1.515569] FSC = 0x04: level 0 translation fault [ 1.520458] Data abort info: [ 1.523349] ISV = 0, ISS = 0x00000044 [ 1.527196] CM = 0, WnR = 1 [ 1.530176] [0000000000000098] user address but active_mm is swapper [ 1.536544] Internal error: Oops: 96000044 [#1] PREEMPT SMP [ 1.542125] Modules linked in: [ 1.545190] CPU: 3 PID: 7 Comm: kworker/u8:0 Not tainted 5.14.0-dirty #3 [ 1.551901] Hardware name: Kontron i.MX8MM N801X S (DT) [ 1.557133] Workqueue: events_unbound deferred_probe_work_func [ 1.562984] pstate: 80000005 (Nzcv daif -PAN -UAO -TCO BTYPE=--) [ 1.568998] pc : imx7d_charger_detection+0x3f0/0x510 [ 1.573973] lr : imx7d_charger_detection+0x22c/0x510 This happens because the charger functions check for the phy presence inside the imx_usbmisc_data structure (data->usb_phy), but the chipidea core populates the usb_phy passed via 'phys' inside 'struct ci_hdrc' (ci->usb_phy) instead. This causes the NULL pointer dereference inside imx7d_charger_detection(). Fix it by also searching for 'phys' in case 'fsl,usbphy' is not found. Tested on a imx7s-warp board.
[ "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc1:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc2:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc3:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:5.15:rc4:*:*:*:*:*:*" ]
null
5.5
null
null
GHSA-j9f5-mv8w-78qj
In the Linux kernel, the following vulnerability has been resolved:scsi: zfcp: Fix double free of FSF request when qdio send failsWe used to use the wrong type of integer in 'zfcp_fsf_req_send()' to cache the FSF request ID when sending a new FSF request. This is used in case the sending fails and we need to remove the request from our internal hash table again (so we don't keep an invalid reference and use it when we free the request again).In 'zfcp_fsf_req_send()' we used to cache the ID as 'int' (signed and 32 bit wide), but the rest of the zfcp code (and the firmware specification) handles the ID as 'unsigned long'/'u64' (unsigned and 64 bit wide [s390x ELF ABI]). For one this has the obvious problem that when the ID grows past 32 bit (this can happen reasonably fast) it is truncated to 32 bit when storing it in the cache variable and so doesn't match the original ID anymore. The second less obvious problem is that even when the original ID has not yet grown past 32 bit, as soon as the 32nd bit is set in the original ID (0x80000000 = 2'147'483'648) we will have a mismatch when we cast it back to 'unsigned long'. As the cached variable is of a signed type, the compiler will choose a sign-extending instruction to load the 32 bit variable into a 64 bit register (e.g.: 'lgf %r11,188(%r15)'). So once we pass the cached variable into 'zfcp_reqlist_find_rm()' to remove the request again all the leading zeros will be flipped to ones to extend the sign and won't match the original ID anymore (this has been observed in practice).If we can't successfully remove the request from the hash table again after 'zfcp_qdio_send()' fails (this happens regularly when zfcp cannot notify the adapter about new work because the adapter is already gone during e.g. a ChpID toggle) we will end up with a double free. We unconditionally free the request in the calling function when 'zfcp_fsf_req_send()' fails, but because the request is still in the hash table we end up with a stale memory reference, and once the zfcp adapter is either reset during recovery or shutdown we end up freeing the same memory twice.The resulting stack traces vary depending on the kernel and have no direct correlation to the place where the bug occurs. Here are three examples that have been seen in practice:list_del corruption. next->prev should be 00000001b9d13800, but was 00000000dead4ead. (next=00000001bd131a00) ------------[ cut here ]------------ kernel BUG at lib/list_debug.c:62! monitor event: 0040 ilc:2 [#1] PREEMPT SMP Modules linked in: ... CPU: 9 PID: 1617 Comm: zfcperp0.0.1740 Kdump: loaded Hardware name: ... Krnl PSW : 0704d00180000000 00000003cbeea1f8 (__list_del_entry_valid+0x98/0x140) R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:1 PM:0 RI:0 EA:3 Krnl GPRS: 00000000916d12f1 0000000080000000 000000000000006d 00000003cb665cd6 0000000000000001 0000000000000000 0000000000000000 00000000d28d21e8 00000000d3844000 00000380099efd28 00000001bd131a00 00000001b9d13800 00000000d3290100 0000000000000000 00000003cbeea1f4 00000380099efc70 Krnl Code: 00000003cbeea1e8: c020004f68a7 larl %r2,00000003cc8d7336 00000003cbeea1ee: c0e50027fd65 brasl %r14,00000003cc3e9cb8 #00000003cbeea1f4: af000000 mc 0,0 >00000003cbeea1f8: c02000920440 larl %r2,00000003cd12aa78 00000003cbeea1fe: c0e500289c25 brasl %r14,00000003cc3fda48 00000003cbeea204: b9040043 lgr %r4,%r3 00000003cbeea208: b9040051 lgr %r5,%r1 00000003cbeea20c: b9040032 lgr %r3,%r2 Call Trace: [<00000003cbeea1f8>] __list_del_entry_valid+0x98/0x140 ([<00000003cbeea1f4>] __list_del_entry_valid+0x94/0x140) [<000003ff7ff502fe>] zfcp_fsf_req_dismiss_all+0xde/0x150 [zfcp] [<000003ff7ff49cd0>] zfcp_erp_strategy_do_action+0x160/0x280 [zfcp] ---truncated---
[]
null
null
null
null
CVE-2008-5516
The web interface in git (gitweb) 1.5.x before 1.5.5 allows remote attackers to execute arbitrary commands via shell metacharacters related to git_search.
[ "cpe:2.3:a:git:git:0.99.9j:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:0.99.9k:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:0.99.9l:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:0.99.9m:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:0.99.9n:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.2.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.4.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3:rc4:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3:rc5:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3:rc7:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.7:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.3.8:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc0:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc1.1136.g2794:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc2:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc3:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc4:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4:rc5:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.4.7:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5:rc1:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5:rc2:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5:rc3:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.6.3:*:*:*:*:*:*:*", "cpe:2.3:a:git:git:1.5.6.4:*:*:*:*:*:*:*", "cpe:2.3:a:git-scm:git:0.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:git-scm:git:0.7.0:*:*:*:*:*:*:*", "cpe:2.3:o:rpath:linux:2:*:*:*:*:*:*:*" ]
null
null
null
7.5
GHSA-rqg5-f3m3-r3xh
The L3 agent in OpenStack Neutron 2014.2.x before 2014.2.2, when using radvd 2.0+, allows remote authenticated users to cause a denial of service (blocked router update processing) by creating eight routers and assigning an ipv6 non-provider subnet to each.
[]
null
null
null
null
GHSA-53gr-p79j-q7q9
Cross-site scripting (XSS) vulnerability in My Little Forum 1.75 and 2.0 Beta 23 allows remote attackers to inject arbitrary web script or HTML via BBcode IMG tags.
[]
null
null
null
null
CVE-2024-43626
Windows Telephony Service Elevation of Privilege Vulnerability
Windows Telephony Service Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*", "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*" ]
null
7.8
null
null
GHSA-h3q4-6j7f-r24c
priority vulnerable to denial of service
A HTTP/2 implementation built using any version of the Python priority library prior to version 1.2.0 could be targeted by a malicious peer by having that peer assign priority information for every possible HTTP/2 stream ID. The priority tree would happily continue to store the priority information for each stream, and would therefore allocate unbounded amounts of memory. Attempting to actually use a tree like this would also cause extremely high CPU usage to maintain the tree.
[]
6.6
null
7.5
null
GHSA-xg5j-2463-7x9w
Cross-site scripting (XSS) vulnerability in Nuked-Klan 1.7 allows remote attackers to inject arbitrary web script or HTML via the (1) Search module, (2) certain edit fields in Guestbook, (3) the title in the Forum module, and (4) Textbox.
[]
null
null
null
null
GHSA-mhrf-ccwq-84jf
SQL injection vulnerability in news.php in Virtual War (VWar) 1.5.0 and earlier allows remote attackers to execute arbitrary SQL commands via the (1) sortby and (2) sortorder parameters.
[]
null
null
null
null
CVE-2019-13561
D-Link DIR-655 C devices before 3.02B05 BETA03 allow remote attackers to execute arbitrary commands via shell metacharacters in the online_firmware_check.cgi check_fw_url parameter.
[ "cpe:2.3:o:dlink:dir-655_firmware:3.02b05:*:*:*:*:*:*:*", "cpe:2.3:h:dlink:dir-655:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
CVE-2015-3333
Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:v8:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
CVE-2025-2671
Yue Lao Blind Box 月老盲盒 Upload.php base64image unrestricted upload
A vulnerability was found in Yue Lao Blind Box 月老盲盒 up to 4.0. It has been declared as critical. This vulnerability affects the function base64image of the file /app/controller/Upload.php. The manipulation of the argument data leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
[]
5.3
6.3
6.3
6.5
CVE-2025-22218
VMware Aria Operations for Logs information disclosure vulnerability
VMware Aria Operations for Logs contains an information disclosure vulnerability. A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs
[]
null
8.5
null
null
GHSA-3gfc-hc4g-r887
Stack-based Buffer Overflow in Conda vim prior to 8.2.
[]
null
7.8
null
null
CVE-2016-1290
The web API in Cisco Prime Infrastructure 1.2.0 through 2.2(2) and Cisco Evolved Programmable Network Manager (EPNM) 1.2 allows remote authenticated users to bypass intended RBAC restrictions and gain privileges via an HTTP request that is inconsistent with a pattern filter, aka Bug ID CSCuy10227.
[ "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.2.0.103:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.3:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.3.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.4.0.45:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:2.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*", "cpe:2.3:o:sun:opensolaris:snv_124:*:sparc:*:*:*:*:*" ]
null
null
8.1
5.5
RHSA-2017:2472
Red Hat Security Advisory: kernel security and bug fix update
kernel: NFSv3 server does not properly handle payload bounds checking of WRITE requests
[ "cpe:/o:redhat:rhel_aus:5.9" ]
null
null
6.5
null
CVE-2020-3552
Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability
A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the attacker to cause a NULL pointer access that results in a reload of the affected device.
[ "cpe:2.3:o:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1840:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10\\(1.255\\):*:*:*:*:*:*:*" ]
null
null
7.4
null
CVE-2017-2284
Cross-site scripting vulnerability in Popup Maker prior to version 1.6.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:code-atlantic:popup_maker:1.0.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.0.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.0.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.0.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.0.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.0.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.1.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.2.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.2.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.2.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.3.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.9:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.10:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.11:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.12:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.13:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.14:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.15:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.16:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.17:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.18:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.19:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.20:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.4.21:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.4:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.5:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.6:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.7:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.5.8:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.6.0:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.6.1:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.6.2:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.6.3:*:*:*:*:wordpress:*:*", "cpe:2.3:a:code-atlantic:popup_maker:1.6.4:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
CVE-2016-10962
The icegram plugin before 1.9.19 for WordPress has CSRF via the wp-admin/edit.php option_name parameter.
[ "cpe:2.3:a:icegram:icegram_engage:*:*:*:*:*:wordpress:*:*" ]
null
6.5
null
4.3
CVE-2019-2941
Vulnerability in the Hyperion Profitability and Cost Management product of Oracle Hyperion (component: Modeling). The supported version that is affected is 11.1.2.4. Difficult to exploit vulnerability allows high privileged attacker with network access via HTTP to compromise Hyperion Profitability and Cost Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Hyperion Profitability and Cost Management, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Hyperion Profitability and Cost Management accessible data as well as unauthorized read access to a subset of Hyperion Profitability and Cost Management accessible data. CVSS 3.0 Base Score 4.0 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N).
[ "cpe:2.3:a:oracle:hyperion_enterprise_performance_management_architect:11.1.2.4:*:*:*:*:*:*:*" ]
null
4
null
3.6
CVE-2005-4599
Cross-site scripting (XSS) vulnerability in tiny_mce_gzip.php in TinyMCE Compressor PHP before 1.06 allows remote attackers to inject arbitrary web script or HTML via the index parameter.
[ "cpe:2.3:a:moxiecode:tinymce_compressor_php:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-4jqq-7wwq-485f
An issue was discovered in the IPv6 protocol specification, related to ICMP Packet Too Big (PTB) messages. (The scope of this CVE is all affected IPv6 implementations from all vendors.) The security implications of IP fragmentation have been discussed at length in [RFC6274] and [RFC7739]. An attacker can leverage the generation of IPv6 atomic fragments to trigger the use of fragmentation in an arbitrary IPv6 flow (in scenarios in which actual fragmentation of packets is not needed) and can subsequently perform any type of fragmentation-based attack against legacy IPv6 nodes that do not implement [RFC6946]. That is, employing fragmentation where not actually needed allows for fragmentation-based attack vectors to be employed, unnecessarily. We note that, unfortunately, even nodes that already implement [RFC6946] can be subject to DoS attacks as a result of the generation of IPv6 atomic fragments. Let us assume that Host A is communicating with Host B and that, as a result of the widespread dropping of IPv6 packets that contain extension headers (including fragmentation) [RFC7872], some intermediate node filters fragments between Host B and Host A. If an attacker sends a forged ICMPv6 PTB error message to Host B, reporting an MTU smaller than 1280, this will trigger the generation of IPv6 atomic fragments from that moment on (as required by [RFC2460]). When Host B starts sending IPv6 atomic fragments (in response to the received ICMPv6 PTB error message), these packets will be dropped, since we previously noted that IPv6 packets with extension headers were being dropped between Host B and Host A. Thus, this situation will result in a DoS scenario. Another possible scenario is that in which two BGP peers are employing IPv6 transport and they implement Access Control Lists (ACLs) to drop IPv6 fragments (to avoid control-plane attacks). If the aforementioned BGP peers drop IPv6 fragments but still honor received ICMPv6 PTB error messages, an attacker could easily attack the corresponding peering session by simply sending an ICMPv6 PTB message with a reported MTU smaller than 1280 bytes. Once the attack packet has been sent, the aforementioned routers will themselves be the ones dropping their own traffic.
[]
null
null
8.6
null
CVE-2012-0829
Multiple cross-site request forgery (CSRF) vulnerabilities in Mibew Messenger 1.6.4 and earlier allow remote attackers to hijack the authentication of operators for requests that insert cross-site scripting (XSS) sequences via the (1) address or (2) threadid parameters to operator/ban.php; or (3) geolinkparams, (4) title, or (5) chattitle parameters to operator/settings.php.
[ "cpe:2.3:a:mibew:mibew_messenger:*:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.0.7:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.0.9:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.4.1:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.4.2:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.6.0:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.6.1:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.6.2:*:*:*:*:*:*:*", "cpe:2.3:a:mibew:mibew_messenger:1.6.3:*:*:*:*:*:*:*" ]
null
null
null
6
CVE-2020-6966
In ApexPro Telemetry Server Versions 4.2 and prior, CARESCAPE Telemetry Server v4.2 & prior, Clinical Information Center (CIC) Versions 4.X and 5.X, CARESCAPE Central Station (CSCS) Versions 1.X, the affected products utilize a weak encryption scheme for remote desktop control, which may allow an attacker to obtain remote code execution of devices on the network.
[ "cpe:2.3:o:gehealthcare:apexpro_telemetry_server_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:gehealthcare:apexpro_telemetry_server:-:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:carescape_central_station_mai700_firmware:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:gehealthcare:carescape_central_station_mai700:-:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:carescape_central_station_mas700_firmware:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:gehealthcare:carescape_central_station_mas700:-:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:clinical_information_center_mp100d_firmware:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:clinical_information_center_mp100d_firmware:5.0:*:*:*:*:*:*:*", "cpe:2.3:h:gehealthcare:clinical_information_center_mp100d:-:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:clinical_information_center_mp100r_firmware:4.0:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:clinical_information_center_mp100r_firmware:5.0:*:*:*:*:*:*:*", "cpe:2.3:h:gehealthcare:clinical_information_center_mp100r:-:*:*:*:*:*:*:*", "cpe:2.3:o:gehealthcare:carescape_telemetry_server_mp100r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:gehealthcare:carescape_telemetry_server_mp100r:-:*:*:*:*:*:*:*" ]
null
10
null
10
GHSA-4xxg-53f5-6j6q
The thread termination routine in the kernel for Windows NT 4.0 and 2000 (NTOSKRNL.EXE) allows local users to modify kernel memory and execution flow via steps in which a terminating thread causes Asynchronous Procedure Call (APC) entries to free the wrong data, aka the "Windows Kernel Vulnerability."
[]
null
null
null
null
PYSEC-2018-31
null
tlslite-ng version 0.7.3 and earlier, since commit d7b288316bca7bcdd082e6ccff5491e241305233 contains a CWE-354: Improper Validation of Integrity Check Value vulnerability in TLS implementation, tlslite/utils/constanttime.py: ct_check_cbc_mac_and_pad(); line "end_pos = data_len - 1 - mac.digest_size" that can result in an attacker manipulating the TLS ciphertext which will not be detected by receiving tlslite-ng. This attack appears to be exploitable via man in the middle on a network connection. This vulnerability appears to have been fixed after commit 3674815d1b0f7484454995e2737a352e0a6a93d8.
[]
null
null
null
null
GHSA-w494-p3qw-3ww3
StrongKey FIDO Server before 4.15.1 treats a non-discoverable (namedcredential) flow as a discoverable transaction.
[]
null
8.4
null
null
GHSA-897p-94fw-f6m3
In the Linux kernel, the following vulnerability has been resolved:Bluetooth: HCI: Fix potential null-ptr-derefFix potential null-ptr-deref in hci_le_big_sync_established_evt().
[]
null
5.5
null
null
GHSA-33c8-cpc2-747q
SQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.
[]
null
null
8.8
null
CVE-2023-32879
In battery, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08308070; Issue ID: ALPS08308064.
[ "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8167:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*", "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*" ]
null
6.7
null
null
CVE-2024-32140
WordPress Libsyn Publisher Hub plugin <= 1.4.4 - Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Libsyn Libsyn Publisher Hub allows Stored XSS.This issue affects Libsyn Publisher Hub: from n/a through 1.4.4.
[]
null
6.5
null
null
CVE-2021-45479
XSS in Yordam Library Automation System
Improper Neutralization of Input During Web Page Generation vulnerability in Yordam Information Technologies Library Automation System allows Stored XSS.This issue affects Library Automation System: before 19.2.
[ "cpe:2.3:a:yordam:library_automation_system:*:*:*:*:*:*:*:*" ]
null
5.4
null
null
GHSA-hvmx-5hv4-f235
Sandbox bypass vulnerability in Jenkins Script Security Plugin
A sandbox bypass vulnerability in Jenkins Script Security Plugin 1.62 and earlier related to the handling of property names in property expressions on the left-hand side of assignment expressions allowed attackers to execute arbitrary code in sandboxed scripts.
[]
null
4.2
null
null
CVE-2019-20744
NETGEAR WAC510 devices before 5.0.10.2 are affected by disclosure of sensitive information.
[ "cpe:2.3:o:netgear:wac510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:netgear:wac510:-:*:*:*:*:*:*:*" ]
null
null
6.1
null
GHSA-ppwh-7vq9-qpqc
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
[]
null
null
null
null
CVE-2008-7175
Cross-site scripting (XSS) vulnerability in wp-admin/admin.php in NextGEN Gallery 0.96 and earlier plugin for Wordpress allows remote attackers to inject arbitrary web script or HTML via the picture description field in a page edit action.
[ "cpe:2.3:a:alex_rabe:nextgen_gallery:*:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.33:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.34:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.35:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.36:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.37:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.39:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.40:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.41:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.42:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.43:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.50:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.51:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.52:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.60:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.61:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.62:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.63:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.64:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.70:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.71:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.72:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.73:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.74:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.80:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.81:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.82:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.83:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.90:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.91:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.92:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.93:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.94:*:*:*:*:*:*:*", "cpe:2.3:a:alex_rabe:nextgen_gallery:0.95:*:*:*:*:*:*:*", "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*" ]
null
null
null
4.3
GHSA-73q6-p6x5-9wrv
In "Xray Test Management for Jira" prior to version 3.5.5, remote authenticated attackers can cause XSS in the Pre-Condition Summary entry point via the summary field of a Create Pre-Condition action for a new Test Issue.
[]
null
null
null
null