id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
197k
| cpes
listlengths 0
4.89k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ |
---|---|---|---|---|---|---|---|
GHSA-4486-4c28-44r7 | Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," a different vulnerability than CVE-2015-1743. | []
| null | null | null | null |
|
CVE-2023-35031 | Atos Unify OpenScape 4000 Assistant V10 R1 before V10 R1.42.0 and V10 R1.34.8, Assistant V10 R0, Manager V10 R1 before V10 R1.42.0 and V10 R1.34.8, and Manager V10 R0 allow command injection by authenticated users, aka OSFOURK-24036. | [
"cpe:2.3:a:atos:unify_openscape_4000_assistant:10:r0:*:*:*:*:*:*",
"cpe:2.3:a:atos:unify_openscape_4000_assistant:10:r1:*:*:*:*:*:*",
"cpe:2.3:a:atos:unify_openscape_4000_assistant:10:r1.34.4:*:*:*:*:*:*",
"cpe:2.3:a:atos:unify_openscape_4000_manager:10:r0:*:*:*:*:*:*",
"cpe:2.3:a:atos:unify_openscape_4000_manager:10:r1:*:*:*:*:*:*",
"cpe:2.3:a:atos:unify_openscape_4000_manager:10:r1.34.4:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-6rx8-rv27-h3w8 | Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | []
| null | 5.4 | null | null |
|
CVE-2020-1144 | An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory, aka 'Windows State Repository Service Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1124, CVE-2020-1131, CVE-2020-1134, CVE-2020-1184, CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189, CVE-2020-1190, CVE-2020-1191. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.6 |
|
RHSA-2015:2534 | Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0, 6.1.0, and 6.2.0 security update | apache-commons-collections: InvokerTransformer code execution during deserialisation | [
"cpe:/a:redhat:jboss_data_virtualization:6.0",
"cpe:/a:redhat:jboss_data_virtualization:6.1",
"cpe:/a:redhat:jboss_data_virtualization:6.2"
]
| null | null | null | null |
CVE-2017-12536 | A Remote Code Execution vulnerability in HPE Intelligent Management Center (iMC) PLAT version PLAT 7.3 (E0504) was found. The problem was resolved in HPE Intelligent Management Center PLAT v7.3 (E0506) or any subsequent version. | [
"cpe:2.3:a:hp:intelligent_management_center:7.3:e0504:*:*:*:*:*:*"
]
| null | null | 8.8 | 9 |
|
GHSA-3299-q63p-824w | In the Linux kernel, the following vulnerability has been resolved:dlm: prevent NPD when writing a positive value to event_donedo_uevent returns the value written to event_done. In case it is a
positive value, new_lockspace would undo all the work, and lockspace
would not be set. __dlm_new_lockspace, however, would treat that
positive value as a success due to commit 8511a2728ab8 ("dlm: fix use
count with multiple joins").Down the line, device_create_lockspace would pass that NULL lockspace to
dlm_find_lockspace_local, leading to a NULL pointer dereference.Treating such positive values as successes prevents the problem. Given
this has been broken for so long, this is unlikely to break userspace
expectations. | []
| null | null | null | null |
|
CVE-2005-3916 | SQL injection vulnerability in memberlist.php in WSN Forum 1.21 allows remote attackers to execute arbitrary SQL commands via the id parameter in a profile action. | [
"cpe:2.3:a:wsn_forum:wsn_forum:1.21:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-jh38-v2jj-jjv3 | IBM Planning Analytics Local 2.0.0 through 2.0.9 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 176735. | []
| null | null | null | null |
|
CVE-2010-0196 | Unspecified vulnerability in Adobe Reader and Acrobat 9.x before 9.3.2, and 8.x before 8.2.2 on Windows and Mac OS X, allows attackers to cause a denial of service or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2010-0192 and CVE-2010-0193. | [
"cpe:2.3:a:adobe:acrobat:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:9.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader:8.2.1:*:*:*:*:*:*:*"
]
| null | null | null | 9.3 |
|
GHSA-xph2-rhph-vxvm | In the Linux kernel, the following vulnerability has been resolved:mm/vmalloc: combine all TLB flush operations of KASAN shadow virtual address into one operationWhen compiling kernel source 'make -j $(nproc)' with the up-and-running
KASAN-enabled kernel on a 256-core machine, the following soft lockup is
shown:watchdog: BUG: soft lockup - CPU#28 stuck for 22s! [kworker/28:1:1760]
CPU: 28 PID: 1760 Comm: kworker/28:1 Kdump: loaded Not tainted 6.10.0-rc5 #95
Workqueue: events drain_vmap_area_work
RIP: 0010:smp_call_function_many_cond+0x1d8/0xbb0
Code: 38 c8 7c 08 84 c9 0f 85 49 08 00 00 8b 45 08 a8 01 74 2e 48 89 f1 49 89 f7 48 c1 e9 03 41 83 e7 07 4c 01 e9 41 83 c7 03 f3 90 <0f> b6 01 41 38 c7 7c 08 84 c0 0f 85 d4 06 00 00 8b 45 08 a8 01 75
RSP: 0018:ffffc9000cb3fb60 EFLAGS: 00000202
RAX: 0000000000000011 RBX: ffff8883bc4469c0 RCX: ffffed10776e9949
RDX: 0000000000000002 RSI: ffff8883bb74ca48 RDI: ffffffff8434dc50
RBP: ffff8883bb74ca40 R08: ffff888103585dc0 R09: ffff8884533a1800
R10: 0000000000000004 R11: ffffffffffffffff R12: ffffed1077888d39
R13: dffffc0000000000 R14: ffffed1077888d38 R15: 0000000000000003
FS: 0000000000000000(0000) GS:ffff8883bc400000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005577b5c8d158 CR3: 0000000004850000 CR4: 0000000000350ef0
Call Trace:
<IRQ>
? watchdog_timer_fn+0x2cd/0x390
? __pfx_watchdog_timer_fn+0x10/0x10
? __hrtimer_run_queues+0x300/0x6d0
? sched_clock_cpu+0x69/0x4e0
? __pfx___hrtimer_run_queues+0x10/0x10
? srso_return_thunk+0x5/0x5f
? ktime_get_update_offsets_now+0x7f/0x2a0
? srso_return_thunk+0x5/0x5f
? srso_return_thunk+0x5/0x5f
? hrtimer_interrupt+0x2ca/0x760
? __sysvec_apic_timer_interrupt+0x8c/0x2b0
? sysvec_apic_timer_interrupt+0x6a/0x90
</IRQ>
<TASK>
? asm_sysvec_apic_timer_interrupt+0x16/0x20
? smp_call_function_many_cond+0x1d8/0xbb0
? __pfx_do_kernel_range_flush+0x10/0x10
on_each_cpu_cond_mask+0x20/0x40
flush_tlb_kernel_range+0x19b/0x250
? srso_return_thunk+0x5/0x5f
? kasan_release_vmalloc+0xa7/0xc0
purge_vmap_node+0x357/0x820
? __pfx_purge_vmap_node+0x10/0x10
__purge_vmap_area_lazy+0x5b8/0xa10
drain_vmap_area_work+0x21/0x30
process_one_work+0x661/0x10b0
worker_thread+0x844/0x10e0
? srso_return_thunk+0x5/0x5f
? __kthread_parkme+0x82/0x140
? __pfx_worker_thread+0x10/0x10
kthread+0x2a5/0x370
? __pfx_kthread+0x10/0x10
ret_from_fork+0x30/0x70
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30
</TASK>Debugging Analysis:The following ftrace log shows that the lockup CPU spends too much
time iterating vmap_nodes and flushing TLB when purging vm_area
structures. (Some info is trimmed).kworker: funcgraph_entry: | drain_vmap_area_work() {
kworker: funcgraph_entry: | mutex_lock() {
kworker: funcgraph_entry: 1.092 us | __cond_resched();
kworker: funcgraph_exit: 3.306 us | }
... ...
kworker: funcgraph_entry: | flush_tlb_kernel_range() {
... ...
kworker: funcgraph_exit: # 7533.649 us | }
... ...
kworker: funcgraph_entry: 2.344 us | mutex_unlock();
kworker: funcgraph_exit: $ 23871554 us | }The drain_vmap_area_work() spends over 23 seconds.There are 2805 flush_tlb_kernel_range() calls in the ftrace log.One is called in __purge_vmap_area_lazy().Others are called by purge_vmap_node->kasan_release_vmalloc.
purge_vmap_node() iteratively releases kasan vmalloc
allocations and flushes TLB for each vmap_area.[Rough calculation] Each flush_tlb_kernel_range() runs
about 7.5ms.
-- 2804 * 7.5ms = 21.03 seconds.
-- That's why a soft lock is triggered.Extending the soft lockup time can work around the issue (For example,echo---truncated--- | []
| null | null | null | null |
|
GHSA-w59r-wjpf-fgqc | Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via the peer-to-peer (P2P) service. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK. | []
| null | null | null | null |
|
CVE-2017-5929 | QOS.ch Logback before 1.2.0 has a serialization vulnerability affecting the SocketServer and ServerSocketReceiver components. | [
"cpe:2.3:a:qos:logback:*:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite:6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:satellite_capsule:6.4:*:*:*:*:*:*:*"
]
| null | 9.8 | null | 7.5 |
|
GHSA-6289-2jjg-22cm | An issue was discovered in ADTRAN PMAA 1.6.2-1, 1.6.3, and 1.6.4. NETCONF Access Management (NACM) allows unprivileged users to create privileged users and execute arbitrary commands via the use of the diagnostic-profile over RESTCONF. | []
| null | null | 8.8 | null |
|
CVE-2023-5227 | Unrestricted Upload of File with Dangerous Type in thorsten/phpmyfaq | Unrestricted Upload of File with Dangerous Type in GitHub repository thorsten/phpmyfaq prior to 3.1.8. | [
"cpe:2.3:a:phpmyfaq:phpmyfaq:*:*:*:*:*:*:*:*"
]
| null | null | 6.5 | null |
GHSA-7g9v-7vc7-pmrw | libheif before 1.19.6 has a NULL pointer dereference in ImageItem_iden in image-items/iden.cc. | []
| null | 2.9 | null | null |
|
CVE-2009-4034 | PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | [
"cpe:2.3:a:postgresql:postgresql:7.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.23:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.24:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.25:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:7.4.26:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:postgresql:postgresql:8.4.1:*:*:*:*:*:*:*"
]
| null | null | null | 5.8 |
|
GHSA-gjqf-66pg-h4cm | An issue was discovered on D-Link DIR-878 devices with firmware 1.12A1. This issue is a Command Injection allowing a remote attacker to execute arbitrary code, and get a root shell. A command Injection vulnerability allows attackers to execute arbitrary OS commands via a crafted /HNAP1 POST request. This occurs when any HNAP API function triggers a call to the system function with untrusted input from the request body for the SetStaticRouteIPv4Settings API function, as demonstrated by shell metacharacters in the Gateway field. | []
| null | 8.8 | null | null |
|
GHSA-xj63-5v6j-3xr7 | Improper Access Control in the RCP+ server of the Bosch Video Recording Manager (VRM) component allows arbitrary and unauthenticated access to a limited subset of certificates, stored in the underlying Microsoft Windows operating system. The fixed versions implement modified authentication checks. Prior releases of VRM software version 3.70 are considered unaffected. This vulnerability affects VRM v3.70.x, v3.71 < v3.71.0034 and v3.81 < 3.81.0050; DIVAR IP 5000 3.80 < 3.80.0039; BVMS all versions using VRM. | []
| null | null | null | null |
|
CVE-2021-31194 | OLE Automation Remote Code Execution Vulnerability | OLE Automation Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17134.2207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:10.0.17134.2207:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1935:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1935:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1556:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1556:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:10.0.18363.1556:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.982:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.982:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.982:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.982:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18931:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4401:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4401:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24598:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24597:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.24598:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20017:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20017:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21117:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.24597:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.24598:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23347:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20017:*:*:*:*:*:x64:*"
]
| null | 8.8 | null | null |
CVE-2017-7218 | The Management Web Interface in Palo Alto Networks PAN-OS before 7.1.9 allows remote authenticated users to gain privileges via unspecified request parameters. | [
"cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*"
]
| null | null | 7.8 | 4.6 |
|
CVE-2017-14937 | The airbag detonation algorithm allows injury to passenger-car occupants via predictable Security Access (SA) data to the internal CAN bus (or the OBD connector). This affects the airbag control units (aka pyrotechnical control units or PCUs) of unspecified passenger vehicles manufactured in 2014 or later, when the ignition is on and the speed is less than 6 km/h. Specifically, there are only 256 possible key pairs, and authentication attempts have no rate limit. In addition, at least one manufacturer's interpretation of the ISO 26021 standard is that it must be possible to calculate the key directly (i.e., the other 255 key pairs must not be used). Exploitation would typically involve an attacker who has already gained access to the CAN bus, and sends a crafted Unified Diagnostic Service (UDS) message to detonate the pyrotechnical charges, resulting in the same passenger-injury risks as in any airbag deployment. | [
"cpe:2.3:h:pcu:pcu:2014:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 1.9 |
|
GHSA-ghq9-g65f-2r4v | Cross-Site Request Forgery (CSRF) vulnerability in WP Trio Conditional Payments for WooCommerce allows Cross Site Request Forgery. This issue affects Conditional Payments for WooCommerce: from n/a through 3.3.0. | []
| null | 6.5 | null | null |
|
GHSA-2j85-3j4x-cwwf | WebKit, as used in Apple Safari before 5.0.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2011-07-20-1. | []
| null | null | null | null |
|
GHSA-7rjj-x9r2-43h4 | The Login Screen Manager WordPress plugin through 3.5.2 does not sanitize and escape some of its settings, which could allow high-privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | []
| null | 4.8 | null | null |
|
GHSA-v3hx-qxqq-j8jp | In gsc_gsa_rescue of gsc_gsa.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. | []
| null | 5.1 | null | null |
|
GHSA-2jvj-mhf2-g99w | SilverStripe CSV Excel Macro Injection | In the CSV export feature of SilverStripe before 3.5.6, 3.6.x before 3.6.3, and 4.x before 4.0.1, it's possible for the output to contain macros and scripts, which may be executed if imported without sanitization into common software (including Microsoft Excel). For example, the CSV data may contain untrusted user input from the "First Name" field of a user's /myprofile page. | []
| null | null | 5.5 | null |
CVE-2017-17847 | An issue was discovered in Enigmail before 1.9.9. Signature spoofing is possible because the UI does not properly distinguish between an attachment signature, and a signature that applies to the entire containing message, aka TBE-01-021. This is demonstrated by an e-mail message with an attachment that is a signed e-mail message in message/rfc822 format. | [
"cpe:2.3:a:enigmail:enigmail:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
]
| null | null | 7.5 | 5 |
|
CVE-2024-23963 | Alpine Halo9 Stack-based Buffer Overflow | This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine Halo9 devices. An attacker must first obtain the ability to pair a malicious Bluetooth device with the target system in order to exploit this vulnerability.
The specific flaw exists within the PBAP_DecodeVCARD function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. | []
| null | 8 | null | null |
CVE-2025-0588 | In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated. | []
| 5.9 | null | null | null |
|
GHSA-qhmg-pv98-3cg7 | The 1E-Exchange-CommandLinePing instruction that is part of the Network product pack available on the 1E Exchange does not properly validate the input parameter, which allows for a specially crafted input to perform arbitrary code execution with SYSTEM permissions.To remediate this issue download the updated Network product pack from the 1E Exchange and update the 1E-Exchange-CommandLinePing instruction to v18.1 by uploading it through the 1E Platform instruction upload UI | []
| null | 9.9 | null | null |
|
GHSA-7m36-cvpv-mmfp | In the Linux kernel, the following vulnerability has been resolved:ftrace: Fix invalid address access in lookup_rec() when index is 0KASAN reported follow problem:BUG: KASAN: use-after-free in lookup_rec
Read of size 8 at addr ffff000199270ff0 by task modprobe
CPU: 2 Comm: modprobe
Call trace:
kasan_report
__asan_load8
lookup_rec
ftrace_location
arch_check_ftrace_location
check_kprobe_address_safe
register_kprobeWhen checking pg->records[pg->index - 1].ip in lookup_rec(), it can get a
pg which is newly added to ftrace_pages_start in ftrace_process_locs().
Before the first pg->index++, index is 0 and accessing pg->records[-1].ip
will cause this problem.Don't check the ip when pg->index is 0. | []
| null | null | null | null |
|
GHSA-5642-gwrq-7pjj | Improper file verification in Intel? Driver & Support Assistant before 19.7.30.2 may allow an authenticated user to potentially enable escalation of privilege via local access. | []
| null | 7.8 | null | null |
|
CVE-2012-1982 | Cross-site scripting (XSS) vulnerability in my_admin/admin1_list_pages.php in SocialCMS 1.0.2 and earlier allows remote authenticated users to inject arbitrary web script or HTML via the TR_title parameter in an edit action. | [
"cpe:2.3:a:socialcms:socialcms:*:*:*:*:*:*:*:*"
]
| null | null | null | 3.5 |
|
CVE-2020-25242 | A vulnerability has been identified in SIMATIC NET CP 343-1 Advanced (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Lean (incl. SIPLUS variants) (All versions), SIMATIC NET CP 343-1 Standard (incl. SIPLUS variants) (All versions). Specially crafted packets sent to TCP port 102 could cause a Denial-of-Service condition on the affected devices. A cold restart might be necessary in order to recover. | [
"cpe:2.3:o:siemens:simatic_net_cp_343-1_advanced_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_343-1_advanced:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp_343-1_lean_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_343-1_lean:-:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:simatic_net_cp_343-1_standard_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:simatic_net_cp_343-1_standard:-:*:*:*:*:*:*:*"
]
| null | 7.5 | null | 7.8 |
|
CVE-2008-2759 | Multiple cross-site scripting (XSS) vulnerabilities in Xigla Absolute Form Processor XE 4.0 allow remote attackers to inject arbitrary web script or HTML via the (1) showfields, (2) text, and (3) submissions parameters to search.asp and the (4) name parameter to users.asp. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:a:xigla:absolute_form_processor_xe:4.0:*:*:*:*:*:*:*"
]
| null | null | null | 4.3 |
|
RHSA-2018:2152 | Red Hat Security Advisory: ansible security update | ansible: Inventory variables are loaded from current working directory when running ad-hoc command that can lead to code execution ansible: ansible.cfg is being read from current working directory allowing possible code execution | [
"cpe:/a:redhat:ansible_engine:2.4::el7"
]
| null | null | 7.8 | null |
GHSA-jmv9-5gx8-7xpf | Minion identity not validated in saltstack | Salt (aka SaltStack) before 0.15.0 through 0.17.0 allows remote authenticated minions to impersonate arbitrary minions via a crafted minion with a valid key. | []
| 7.1 | 6.5 | null | null |
GHSA-4vfc-cjfg-mv6g | Windows Mobile Broadband Driver Denial of Service Vulnerability | []
| null | 6.5 | null | null |
|
GHSA-hvp9-xhr6-2xm4 | In 3S-Smart Software Solutions GmbH CODESYS Control V3 products prior to version 3.5.14.0, user access management and communication encryption is not enabled by default, which could allow an attacker access to the device and sensitive information, including user credentials. | []
| null | null | 9.8 | null |
|
GHSA-ggjg-gjpc-93cx | This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.7.3, macOS Sequoia 15.3, macOS Sonoma 14.7.3. Deleting a conversation in Messages may expose user contact information in system logging. | []
| null | 9.8 | null | null |
|
GHSA-phww-46gm-5fww | Memory leak in Secure Shell (SSH) in Cisco IOS 12.0 through 12.3, when authenticating against a TACACS+ server, allows remote attackers to cause a denial of service (memory consumption) via an incorrect username or password. | []
| null | null | null | null |
|
GHSA-5fph-w2jf-g27h | OleumTech Wireless Sensor Network devices allow remote attackers to obtain sensitive information about sensor nodes or spoof devices by reading cleartext protocol data. | []
| null | null | 5.9 | null |
|
CVE-2022-20152 | In the TitanM chip, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-202006198References: N/A | [
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
]
| null | 6.7 | null | 4.6 |
|
CVE-2025-3932 | It was possible to craft an email that showed a tracking link as an attachment. If the user attempted to open the attachment, Thunderbird automatically accessed the link. The configuration to block remote content did not prevent that. Thunderbird has been fixed to no longer allow access to web pages listed in the X-Mozilla-External-Attachment-URL header of an email. This vulnerability affects Thunderbird < 128.10.1 and Thunderbird < 138.0.1. | []
| null | 6.5 | null | null |
|
CVE-2007-0821 | Multiple directory traversal vulnerabilities in Cedric CLAIRE PortailPhp 2 allow remote attackers to read arbitrary files via a .. (dot dot) in the chemin parameter to (1) mod_news/index.php or (2) mod_news/goodies.php. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. | [
"cpe:2.3:a:cedric:claire_portailphp:2:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
GHSA-8j5g-48x9-r6p7 | CA SiteMinder allows remote attackers to bypass cross-site scripting (XSS) protections for J2EE applications via a request containing non-canonical, "overlong Unicode" in place of blacklisted characters. | []
| null | null | null | null |
|
GHSA-f73w-73w8-h7j9 | Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 through Update 11, 6 through Update 38, 5.0 through Update 38, and 1.4.2_40 and earlier, and OpenJDK 7, allows remote attackers to affect availability via vectors related to JSSE. NOTE: the previous information is from the February 2013 CPU. Oracle has not commented on claims from another vendor that this issue is related to CPU consumption in the SSL/TLS implementation via a large number of ClientHello packets that are not properly handled by (1) ClientHandshaker.java and (2) ServerHandshaker.java. | []
| null | null | null | null |
|
GHSA-h77w-mh3h-pv66 | The mintToken function of a smart contract implementation for ESTSToken, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | []
| null | null | 7.5 | null |
|
CVE-2022-43531 | Vulnerabilities in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below.
| [
"cpe:2.3:a:arubanetworks:clearpass_policy_manager:*:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
ICSA-21-161-01 | Rockwell Automation FactoryTalk Services Platform | FactoryTalk Services Platform contains a vulnerability that may allow a remote, authenticated attacker to bypass FactoryTalk Security policies based on the computer name. If successfully exploited, this may allow an attacker to have the same privileges as if they were logged on to the client machine.CVE-2021-32960 has been assigned to this vulnerability. A CVSS v3 base score of 8.5 has been calculated; the CVSS vector string is (AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H). | []
| null | null | 8.5 | null |
CVE-2021-33907 | The Zoom Client for Meetings for Windows in all versions before 5.3.0 fails to properly validate the certificate information used to sign .msi files when performing an update of the client. This could lead to remote code execution in an elevated privileged context. | [
"cpe:2.3:a:zoom:meetings:*:*:*:*:*:windows:*:*"
]
| null | 9.8 | null | 10 |
|
GHSA-8xrx-4ww5-fhx5 | contrib/pmdb2diag/pmdb2diag.c in Rsyslog v8.1908.0 allows out-of-bounds access because the level length is mishandled. | []
| null | 9.8 | null | null |
|
GHSA-frc2-4fxv-jmxx | The AnyWhere Elementor WordPress plugin before 1.2.8 discloses a Freemius Secret Key which could be used by an attacker to purchase the pro subscription using test credit card numbers without actually paying the amount. Such key has been revoked. | []
| null | 5.3 | null | null |
|
GHSA-w5c9-rfx7-37rh | Unspecified vulnerability in the pdf.xmd module in (1) BitDefender Free Edition 10 and Antivirus Standard 10, (2) BullGuard Internet Security 8.5, and (3) Software602 Groupware Server 6.0.08.1118 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted PDF file, possibly related to included compressed streams that were processed with the ASCIIHexDecode filter. NOTE: some of these details are obtained from third party information. | []
| null | null | null | null |
|
CVE-2024-8231 | Tenda O6 setPortForward fromVirtualSet stack-based overflow | A vulnerability classified as critical has been found in Tenda O6 1.0.0.7(2054). Affected is the function fromVirtualSet of the file /goform/setPortForward. The manipulation of the argument ip/localPort/publicPort/app leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. | [
"cpe:2.3:o:tenda:o6_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:tenda:o6_firmware:1.0.0.7\\(2054\\):*:*:*:*:*:*:*",
"cpe:2.3:h:tenda:o6:-:*:*:*:*:*:*:*"
]
| 8.7 | 8.8 | 8.8 | 9 |
CVE-2019-16959 | SolarWinds Web Help Desk 12.7.0 allows CSV Injection, also known as Formula Injection, via a file attached to a ticket. | [
"cpe:2.3:a:solarwinds:webhelpdesk:12.7.0:*:*:*:*:*:*:*"
]
| null | 6.5 | null | 4 |
|
GHSA-rrp5-xgfv-3935 | The C software implementation of RSA in wolfSSL (formerly CyaSSL) before 3.9.10 makes it easier for local users to discover RSA keys by leveraging cache-bank hit differences. | []
| null | null | 5.5 | null |
|
CVE-2022-22528 | SAP Adaptive Server Enterprise (ASE) - version 16.0, installation makes an entry in the system PATH environment variable in Windows platform which, under certain conditions, allows a Standard User to execute malicious Windows binaries which may lead to privilege escalation on the local system. The issue is with the ASE installer and does not impact other ASE binaries.
| [
"cpe:2.3:a:sap:adaptive_server_enterprise:16.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
]
| null | 7.8 | null | 4.4 |
|
CVE-2023-0547 | OCSP revocation status of recipient certificates was not checked when sending S/Mime encrypted email, and revoked certificates would be accepted. Thunderbird versions from 68 to 102.9.1 were affected by this bug. This vulnerability affects Thunderbird < 102.10. | [
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
GHSA-q6cp-7rm2-87gf | A denial of service vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2. Android ID: A-38239864. | []
| null | null | 5.5 | null |
|
CVE-2016-8410 | An information disclosure vulnerability in the Qualcomm sound driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31498403. References: QC-CR#987010. | [
"cpe:2.3:o:linux:linux_kernel:3.10:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:3.18:*:*:*:*:*:*:*"
]
| null | null | 4.7 | 2.6 |
|
GHSA-rr62-c94h-x6cq | HDF5 Library through 1.14.3 contains a heap-based buffer overflow in H5T__get_native_type in H5Tnative.c, resulting in the corruption of the instruction pointer. | []
| null | 7.4 | null | null |
|
CVE-2015-7424 | IBM InfoSphere Master Data Management (MDM) - Collaborative Edition 9.1, 10.1, 11.0, 11.3, 11.4, and 11.5 allow remote authenticated users to bypass intended access restrictions and obtain sensitive information by leveraging Catalogs access. IBM X-Force ID: 107780. | [
"cpe:2.3:a:ibm:infosphere_master_data_management:9.1:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:10.1:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.0:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.3:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.4:*:*:*:collaborative:*:*:*",
"cpe:2.3:a:ibm:infosphere_master_data_management:11.5:*:*:*:collaborative:*:*:*"
]
| null | null | 4.3 | 4 |
|
CVE-2022-35032 | OTFCC commit 617837b was discovered to contain a segmentation violation via /release-x64/otfccdump+0x6b6a8f. | [
"cpe:2.3:a:otfcc_project:otfcc:*:*:*:*:*:*:*:*"
]
| null | 6.5 | null | null |
|
CVE-2007-1459 | Multiple PHP remote file inclusion vulnerabilities in WebCreator 0.2.6-rc3 and earlier allow remote attackers to execute arbitrary PHP code via a URL in the moddir parameter to (1) content/load.inc.php, (2) config/load.inc.php, (3) http/load.inc.php, and unspecified other files. | [
"cpe:2.3:a:webcreator:webcreator:0.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:webcreator:webcreator:0.2.6_rc3:*:*:*:*:*:*:*"
]
| null | null | null | 6.8 |
|
RHSA-2020:5441 | Red Hat Security Advisory: kernel-rt security and bug fix update | kernel: The flow_dissector feature allows device tracking kernel: Buffer over-read in crypto_authenc_extractkeys() when a payload longer than 4 bytes is not aligned. kernel: buffer uses out of index in ext3/4 filesystem kernel: metadata validator in XFS may cause an inode with a valid, user-creatable extended attribute to be flagged as corrupt kernel: umask not applied on filesystem without ACL support kernel: TOCTOU mismatch in the NFS client code kernel: improper input validation in ppp_cp_parse_cr function leads to memory corruption and read overflow | [
"cpe:/a:redhat:rhel_extras_rt:7"
]
| null | 7.2 | null | null |
GHSA-2g9w-mw43-7j8w | A vulnerability classified as critical was found in code-projects Online Book System 1.0. This vulnerability affects unknown code of the file /index.php. The manipulation of the argument username/password/login_username/login_password leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-258202 is the identifier assigned to this vulnerability. | []
| null | 7.3 | null | null |
|
GHSA-jq92-c2pr-fmph | An information disclosure in web interface in D-Link DIR-X1860 before 1.03 RevA1 allows a remote unauthenticated attacker to send a specially crafted HTTP request and gain knowledge of different absolute paths that are being used by the web application. | []
| null | 5.3 | null | null |
|
GHSA-7v3r-544j-x79h | A vulnerability has been identified in JT Utilities (All versions < V13.1.1.0), JTTK (All versions < V11.1.1.0). JTTK library in affected products is vulnerable to an out of bounds write past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process. (ZDI-CAN-14829) | []
| null | null | null | null |
|
CVE-2011-4361 | MediaWiki before 1.17.1 does not check for read permission before handling action=ajax requests, which allows remote attackers to obtain sensitive information by (1) leveraging the SpecialUpload::ajaxGetExistsWarning function, or by (2) leveraging an extension, as demonstrated by the CategoryTree, ExtTab, and InlineEditor extensions. | [
"cpe:2.3:a:mediawiki:mediawiki:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2007-6705 | The WebSphere MQ XA 5.3 before FP13 and 6.0.x before 6.0.2.1 client for Windows, when running in an MTS or a COM+ environment, grants the PROCESS_DUP_HANDLE privilege to the Everyone group upon connection to a queue manager, which allows local users to duplicate an arbitrary handle and possibly hijack an arbitrary process. | [
"cpe:2.3:a:ibm:websphere_mq:*:fp_13:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_mq:*:*:*:*:*:*:*:*"
]
| null | null | null | 3.3 |
|
GHSA-p6rw-52m8-833j | Vulnerability in the Oracle Communications Order and Service Management product of Oracle Communications Applications (component: Security). Supported versions that are affected are 7.4.0, 7.4.1 and 7.5.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Order and Service Management. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Order and Service Management, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Order and Service Management accessible data as well as unauthorized read access to a subset of Oracle Communications Order and Service Management accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N). | []
| null | 5.4 | null | null |
|
cisco-sa-epnm-info-disc-PjTZ5r6C | Cisco Evolved Programmable Network Manager Sensitive Information Disclosure Vulnerability | A vulnerability in the REST API of Cisco Evolved Programmable Network Manager (EPNM) could allow an authenticated, remote attacker to access sensitive data on an affected system.
This vulnerability exists because the application does not sufficiently protect sensitive data when responding to an API request. An attacker could exploit the vulnerability by sending a specific API request to the affected application. A successful exploit could allow the attacker to obtain sensitive information about the application.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
| []
| null | 6.5 | null | null |
GHSA-xg5x-xxvf-w5xp | SQL injection vulnerability in index.php in Bartels Schoene ConPresso before 4.0.5a allows remote attackers to execute arbitrary SQL commands via the nr parameter. | []
| null | null | null | null |
|
GHSA-w5rg-c6mg-5gqg | In RIOT-OS 2021.01, nonce reuse in 802.15.4 encryption in the ieee820154_security component allows attackers to break encryption by triggering reboots. | []
| null | 5.5 | null | null |
|
CVE-2022-32556 | An issue was discovered in Couchbase Server before 7.0.4. A private key is leaked to the log files with certain crashes. | [
"cpe:2.3:a:couchbase:couchbase_server:*:*:*:*:*:*:*:*"
]
| null | 7.5 | null | null |
|
GHSA-82m4-r6jp-v6cv | Dell PowerEdge Server BIOS and Dell Precision Rack BIOS contain an improper parameter initialization vulnerability. A local low privileged attacker could potentially exploit this vulnerability to read the contents of non-SMM stack memory. | []
| null | 3.8 | null | null |
|
GHSA-c63j-hm8q-jpfj | A vulnerability was found in PHPGurukul Hospital Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file view-medhistory.php. The manipulation of the argument viewid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | []
| 5.5 | 7.3 | null | null |
|
CVE-2023-29410 |
A CWE-20: Improper Input Validation vulnerability exists that could allow an authenticated
attacker to gain the same privilege as the application on the server when a malicious payload is
provided over HTTP for the server to execute.
| [
"cpe:2.3:o:schneider-electric:insighthome_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insighthome_firmware:1.16:-:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insighthome_firmware:1.16:build_004:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:insighthome:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insightfacility_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insightfacility_firmware:1.16:-:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:insightfacility_firmware:1.16:build_004:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:insightfacility:-:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:conext_gateway_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:conext_gateway_firmware:1.16:-:*:*:*:*:*:*",
"cpe:2.3:o:schneider-electric:conext_gateway_firmware:1.16:build_004:*:*:*:*:*:*",
"cpe:2.3:h:schneider-electric:conext_gateway:-:*:*:*:*:*:*:*"
]
| null | 7.2 | null | null |
|
GHSA-7crc-mm89-h2v3 | The ARForms - Premium WordPress Form Builder Plugin WordPress plugin before 6.4.1 does not properly escape user-controlled input when it is reflected in some of its AJAX actions. | []
| null | 6.3 | null | null |
|
GHSA-3gff-7mjm-8jv9 | TX9 Automatic Food Dispenser v3.2.57 devices allow access to a shell as root/superuser, a related issue to CVE-2019-16734. To connect, the telnet service is used on port 23 with the default password of 059AnkJ for the root account. The user can then download the filesystem through preinstalled BusyBox utilities (e.g., tar and nc). | []
| null | 9.8 | null | null |
|
GHSA-8345-xq88-32v3 | Use-after-free vulnerability in Google Chrome before 17.0.963.65 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving an SVG document. | []
| null | null | null | null |
|
GHSA-g34f-5f7w-8hw9 | Unspecified vulnerability in the GTP dissector for Ethereal 0.9.1 to 0.10.13 allows remote attackers to cause a denial of service (infinite loop) via unknown attack vectors. | []
| null | null | null | null |
|
CVE-2021-32289 | An issue was discovered in heif through through v3.6.2. A NULL pointer dereference exists in the function convertByteStreamToRBSP() located in nalutil.cpp. It allows an attacker to cause Denial of Service. | [
"cpe:2.3:a:nokia:heif:*:*:*:*:*:*:*:*"
]
| null | 5.5 | null | 4.3 |
|
GHSA-rgp8-pm28-3759 | langchain vulnerable to path traversal | langchain-ai/langchain is vulnerable to path traversal due to improper limitation of a pathname to a restricted directory ('Path Traversal') in its LocalFileStore functionality. An attacker can leverage this vulnerability to read or write files anywhere on the filesystem, potentially leading to information disclosure or remote code execution. The issue lies in the handling of file paths in the mset and mget methods, where user-supplied input is not adequately sanitized, allowing directory traversal sequences to reach unintended directories. | []
| null | null | 6.5 | null |
CVE-2005-0625 | reportbug 3.2 includes settings from .reportbugrc in bug reports, which exposes sensitive information such as smtpuser and smtppasswd. | [
"cpe:2.3:a:debian:reportbug:2.60:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:reportbug:2.61:*:*:*:*:*:*:*",
"cpe:2.3:a:debian:reportbug:3.2:*:*:*:*:*:*:*"
]
| null | null | null | 2.1 |
|
GHSA-84p5-g8gp-7gjx | Cross-site scripting (XSS) vulnerability in index.php in Monster Top List (MTL) 1.4 allows remote attackers to inject arbitrary web script or HTML via the user_error_message parameter. | []
| null | null | null | null |
|
CVE-2022-31362 | Docebo Community Edition v4.0.5 and below was discovered to contain an arbitrary file upload vulnerability. NOTE: This vulnerability only affects products that are no longer supported by the maintainer | [
"cpe:2.3:a:docebo:docebo:*:*:*:*:community:*:*:*"
]
| null | 8.8 | null | 6.5 |
|
GHSA-97hx-wf9g-76mq | NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the DirectX11 user mode driver (nvwgf2um/x.dll), in which a specially crafted shader can cause an out of bounds access, which may lead to denial of service or code execution. | []
| null | null | null | null |
|
CVE-2025-26350 | A CWE-434 "Unrestricted Upload of File with Dangerous Type" in the template file uploads in Q-Free MaxTime less than or equal to version 2.11.0 allows an authenticated remote attacker to upload malicious files via crafted HTTP requests. | []
| null | 4.9 | null | null |
|
GHSA-33h2-c39r-888q | A vulnerability was found in SourceCodester Doctors Appointment System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /edoc/doctor/patient.php. The manipulation of the argument search12 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-221821 was assigned to this vulnerability. | []
| null | 8.8 | null | null |
|
GHSA-wwhv-gwq6-6j6p | Cross-site scripting (XSS) vulnerability in search.php in Siteframe 5.0.1 allows remote attackers to inject arbitrary web script or HTML via the q parameter. | []
| null | null | null | null |
|
CVE-2022-30243 | Honeywell Alerton Visual Logic through 2022-05-04 allows unauthenticated programming writes from remote users. This enables code to be stored on the controller and then run without verification. A user with malicious intent can send a crafted packet to change and/or stop the program without the knowledge of other users, altering the controller's function. After the programming change, the program needs to be overwritten in order for the controller to restore its original operational function. | [
"cpe:2.3:o:honeywell:alterton_visual_logic_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:honeywell:alterton_visual_logic:-:*:*:*:*:*:*:*"
]
| null | 8.8 | null | null |
|
GHSA-829j-v57j-p8jf | Improper Check for Unusual or Exceptional Conditions vulnerability in Phoenix SecureCore Technology 4 allows Input Data Manipulation.This issue affects SecureCore Technology 4: from 4.0.1.0 before 4.0.1.1018, from 4.1.0.1 before 4.1.0.573, from 4.2.0.1 before 4.2.0.338, from 4.2.1.1 before 4.2.1.300, from 4.3.0.1 before 4.3.0.244, from 4.3.1.1 before 4.3.1.187, from 4.4.0.1 before 4.4.0.299, from 4.5.0.1 before 4.5.0.231, from 4.5.1.1 before 4.5.1.103, from 4.5.5.1 before 4.5.5.36, from 4.6.0.1 before 4.6.0.67. | []
| null | 3.3 | null | null |
|
CVE-2006-5526 | Multiple PHP remote file inclusion vulnerabilities in Teake Nutma Foing, as modified in Fully Modded phpBB (phpbbfm) 2021.4.40 and earlier, allow remote attackers to execute arbitrary PHP code via a URL in the foing_root_path parameter in (a) faq.php, (b) index.php, (c) list.php, (d) login.php, (e) playlist.php, (f) song.php, (g) gen_m3u.php, (h) view_artist.php, (i) view_song.php, (j) flash/set_na.php, (k) flash/initialise.php, (l) flash/get_song.php, (m) includes/common.php, (n) admin/nav.php, (o) admin/main.php, (p) admin/list_artists.php, (q) admin/index.php, (r) admin/genres.php, (s) admin/edit_artist.php, (t) admin/edit_album.php, (u) admin/config.php, and (v) admin/admin_status.php in player/, different vectors than CVE-2006-3045. NOTE: CVE analysis as of 20061026 indicates that files in the admin/ and flash/ directories define foing_root_path before use. | [
"cpe:2.3:a:fully_modded_phpbb:fully_modded_phpbb:*:*:*:*:*:*:*:*"
]
| null | null | null | 7.5 |
|
GHSA-vc25-73wc-75pv | An SQL Injection vulnerability exists in the ID parameter in Online TV Database 2011. | []
| null | null | null | null |
|
CVE-2014-4341 | MIT Kerberos 5 (aka krb5) before 1.12.2 allows remote attackers to cause a denial of service (buffer over-read and application crash) by injecting invalid tokens into a GSSAPI application session. | [
"cpe:2.3:a:mit:kerberos_5:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_tus:7.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_tus:7.6:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_tus:7.7:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
]
| null | null | null | 5 |
|
CVE-2016-1627 | The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js. | [
"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*"
]
| null | null | 8.8 | 6.8 |
|
CVE-2024-26047 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.19 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by an attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:-:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*"
]
| null | 5.4 | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.