id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-g2mr-jcjh-hmc7 | parisneo/lollms-webui is vulnerable to a denial of service (DoS) attack due to uncontrolled resource consumption. Attackers can exploit the `/open_code_in_vs_code` and similar endpoints without authentication by sending repeated HTTP POST requests, leading to the opening of Visual Studio Code or the default folder opener (e.g., File Explorer, xdg-open) multiple times. This can render the host machine unusable by exhausting system resources. The vulnerability is present in the latest version of the software. | [] |
|
CVE-2021-26951 | An issue was discovered in the calamine crate before 0.17.0 for Rust. It allows attackers to overwrite heap-memory locations because Vec::set_len is used without proper memory claiming, and this uninitialized memory is used for a user-provided Read operation, as demonstrated by Sectors::get. | [
"cpe:2.3:a:calamine_project:calamine:*:*:*:*:*:rust:*:*"
] |
|
GHSA-mxhv-mc3x-7jmr | Synology Router Manager (SRM) before 1.2.4-8081 does not set the Secure flag for the session cookie in an HTTPS session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an HTTP session. | [] |
|
GHSA-2r88-ww5g-vx3h | EGavilan Media Expense-Management-System 1.0 is vulnerable to SQL Injection via /expense_action.php. This allows a remote attacker to compromise Application SQL database. | [] |
|
GHSA-77mr-wc79-m8j3 | PHPMailer untrusted code may be run from an overridden address validator | If a function is defined that has the same name as the default built-in email address validation scheme (`php`), it will be called in default configuration as when no validation scheme is provided, the default scheme's callable `php` was being called. If an attacker is able to inject such a function into the application (a much bigger issue), it will be called whenever an email address is validated, such as when calling `validateAddress()`.ImpactLow impact – exploitation requires that an attacker can already inject code into an application, but it provides a trigger pathway.PatchesThis is patched in PHPMailer 6.5.0 by denying the use of simple strings as validator function names, which is a very minor BC break.WorkaroundsInject your own email validator function.ReferencesReported by [Vikrant Singh Chauhan](mailto:[email protected]) via [huntr.dev](https://www.huntr.dev/).
[CVE-2021-3603](https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3603)For more informationIf you have any questions or comments about this advisory:Open an issue in [the PHPMailer project](https://github.com/PHPMailer/PHPMailer)[Email us](mailto:[email protected]). | [] |
CVE-2020-3676 | Possible memory corruption in perfservice due to improper validation array length taken from user application. in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in APQ8096AU, APQ8098, Kamorta, MSM8917, MSM8920, MSM8937, MSM8940, MSM8953, MSM8998, Nicobar, QCM2150, QCS605, QM215, Rennell, Saipan, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SM6150, SM7150, SM8150, SM8250, SXR1130, SXR2130 | [
"cpe:2.3:o:qualcomm:apq8096au_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8096au:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:apq8098_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:apq8098:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:kamorta_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:kamorta:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8917_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8917:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8920_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8920:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8937_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8937:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8940_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8940:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8953_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8953:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:msm8998_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:msm8998:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:nicobar_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:nicobar:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcm2150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcm2150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qcs605_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qcs605:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:qm215_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:qm215:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:rennell_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:rennell:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:saipan_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:saipan:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm429_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm429:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm439_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm439:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm450_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm450:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm630_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm630:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm632:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm636_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm636:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm660_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm660:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm670_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm670:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sdm710_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sdm710:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm6150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm6150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm7150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm7150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8150_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8150:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sm8250_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sm8250:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr1130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr1130:-:*:*:*:*:*:*:*",
"cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-38295 | ALCASAR before 3.6.1 allows still_connected.php remote code execution. | [
"cpe:2.3:o:alcasar:alcasar:*:*:*:*:*:*:*:*",
"cpe:2.3:a:alcasar:alcasar:*:*:*:*:*:*:*:*"
] |
|
GHSA-cwgw-c4cg-47q9 | Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Klaviyo, Inc. Klaviyo plugin <= 3.0.7 versions. | [] |
|
GHSA-mcqw-w66r-84mp | In the Linux kernel, the following vulnerability has been resolved:mptcp: consolidate suboption statusMPTCP maintains the received sub-options status is the bitmask carrying
the received suboptions and in several bitfields carrying per suboption
additional info.Zeroing the bitmask before parsing is not enough to ensure a consistent
status, and the MPTCP code has to additionally clear some bitfiled
depending on the actually parsed suboption.The above schema is fragile, and syzbot managed to trigger a path where
a relevant bitfield is not cleared/initialized:BUG: KMSAN: uninit-value in __mptcp_expand_seq net/mptcp/options.c:1030 [inline]
BUG: KMSAN: uninit-value in mptcp_expand_seq net/mptcp/protocol.h:864 [inline]
BUG: KMSAN: uninit-value in ack_update_msk net/mptcp/options.c:1060 [inline]
BUG: KMSAN: uninit-value in mptcp_incoming_options+0x2036/0x3d30 net/mptcp/options.c:1209
__mptcp_expand_seq net/mptcp/options.c:1030 [inline]
mptcp_expand_seq net/mptcp/protocol.h:864 [inline]
ack_update_msk net/mptcp/options.c:1060 [inline]
mptcp_incoming_options+0x2036/0x3d30 net/mptcp/options.c:1209
tcp_data_queue+0xb4/0x7be0 net/ipv4/tcp_input.c:5233
tcp_rcv_established+0x1061/0x2510 net/ipv4/tcp_input.c:6264
tcp_v4_do_rcv+0x7f3/0x11a0 net/ipv4/tcp_ipv4.c:1916
tcp_v4_rcv+0x51df/0x5750 net/ipv4/tcp_ipv4.c:2351
ip_protocol_deliver_rcu+0x2a3/0x13d0 net/ipv4/ip_input.c:205
ip_local_deliver_finish+0x336/0x500 net/ipv4/ip_input.c:233
NF_HOOK include/linux/netfilter.h:314 [inline]
ip_local_deliver+0x21f/0x490 net/ipv4/ip_input.c:254
dst_input include/net/dst.h:460 [inline]
ip_rcv_finish+0x4a2/0x520 net/ipv4/ip_input.c:447
NF_HOOK include/linux/netfilter.h:314 [inline]
ip_rcv+0xcd/0x380 net/ipv4/ip_input.c:567
__netif_receive_skb_one_core net/core/dev.c:5704 [inline]
__netif_receive_skb+0x319/0xa00 net/core/dev.c:5817
process_backlog+0x4ad/0xa50 net/core/dev.c:6149
__napi_poll+0xe7/0x980 net/core/dev.c:6902
napi_poll net/core/dev.c:6971 [inline]
net_rx_action+0xa5a/0x19b0 net/core/dev.c:7093
handle_softirqs+0x1a0/0x7c0 kernel/softirq.c:561
__do_softirq+0x14/0x1a kernel/softirq.c:595
do_softirq+0x9a/0x100 kernel/softirq.c:462
__local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:389
local_bh_enable include/linux/bottom_half.h:33 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
__dev_queue_xmit+0x2758/0x57d0 net/core/dev.c:4493
dev_queue_xmit include/linux/netdevice.h:3168 [inline]
neigh_hh_output include/net/neighbour.h:523 [inline]
neigh_output include/net/neighbour.h:537 [inline]
ip_finish_output2+0x187c/0x1b70 net/ipv4/ip_output.c:236
__ip_finish_output+0x287/0x810
ip_finish_output+0x4b/0x600 net/ipv4/ip_output.c:324
NF_HOOK_COND include/linux/netfilter.h:303 [inline]
ip_output+0x15f/0x3f0 net/ipv4/ip_output.c:434
dst_output include/net/dst.h:450 [inline]
ip_local_out net/ipv4/ip_output.c:130 [inline]
__ip_queue_xmit+0x1f2a/0x20d0 net/ipv4/ip_output.c:536
ip_queue_xmit+0x60/0x80 net/ipv4/ip_output.c:550
__tcp_transmit_skb+0x3cea/0x4900 net/ipv4/tcp_output.c:1468
tcp_transmit_skb net/ipv4/tcp_output.c:1486 [inline]
tcp_write_xmit+0x3b90/0x9070 net/ipv4/tcp_output.c:2829
__tcp_push_pending_frames+0xc4/0x380 net/ipv4/tcp_output.c:3012
tcp_send_fin+0x9f6/0xf50 net/ipv4/tcp_output.c:3618
__tcp_close+0x140c/0x1550 net/ipv4/tcp.c:3130
__mptcp_close_ssk+0x74e/0x16f0 net/mptcp/protocol.c:2496
mptcp_close_ssk+0x26b/0x2c0 net/mptcp/protocol.c:2550
mptcp_pm_nl_rm_addr_or_subflow+0x635/0xd10 net/mptcp/pm_netlink.c:889
mptcp_pm_nl_rm_subflow_received net/mptcp/pm_netlink.c:924 [inline]
mptcp_pm_flush_addrs_and_subflows net/mptcp/pm_netlink.c:1688 [inline]
mptcp_nl_flush_addrs_list net/mptcp/pm_netlink.c:1709 [inline]
mptcp_pm_nl_flush_addrs_doit+0xe10/0x1630 net/mptcp/pm_netlink.c:1750
genl_family_rcv_msg_doit net/netlink/genetlink.c:1115 [inline]---truncated--- | [] |
|
GHSA-w9wj-cw36-pm6g | Cross-Site Request Forgery (CSRF) vulnerability in MagePeople Team WpTravelly.This issue affects WpTravelly: from n/a through 1.6.0. | [] |
|
GHSA-m585-h5rv-5jf5 | The WebLogic Authentication provider for BEA WebLogic Server and WebLogic Express 8.1 through SP2 and 7.0 through SP4 does not properly clear member relationships when a group is deleted, which can cause a new group with the same name to have the members of the old group, which allows group members to gain privileges. | [] |
|
CVE-2014-8910 | IBM DB2 9.7 through FP10, 9.8 through FP5, 10.1 before FP5, and 10.5 through FP5 on Linux, UNIX, and Windows allows remote authenticated users to read arbitrary text files via a crafted XML/XSLT function in a SELECT statement. | [
"cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:*:*:*:advanced_workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:db2:9.7:*:*:*:workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:advanced_workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:db2:9.8:*:*:*:workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:advanced_workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:db2:10.1:*:*:*:workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:advanced_workgroup:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:express:*:*:*",
"cpe:2.3:a:ibm:db2:10.5:*:*:*:workgroup:*:*:*"
] |
|
CVE-2022-45033 | A cross-site scripting (XSS) vulnerability in Expense Tracker 1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Chat text field. | [
"cpe:2.3:a:oretnom23:expense_tracker:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2023-32742 | WordPress WP SMS Plugin <= 6.1.4 is vulnerable to Cross Site Scripting (XSS) | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in VeronaLabs WP SMS plugin <= 6.1.4 versions. | [
"cpe:2.3:a:veronalabs:wp_sms:*:*:*:*:free:wordpress:*:*"
] |
CVE-2021-4298 | Hesburgh Libraries of Notre Dame Sipity search_criteria_for_works_parameter.rb SearchCriteriaForWorksParameter sql injection | A vulnerability classified as critical has been found in Hesburgh Libraries of Notre Dame Sipity. This affects the function SearchCriteriaForWorksParameter of the file app/parameters/sipity/parameters/search_criteria_for_works_parameter.rb. The manipulation leads to sql injection. Upgrading to version 2021.8 is able to address this issue. The patch is named d1704c7363b899ffce65be03a796a0ee5fdbfbdc. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217179. | [
"cpe:2.3:a:nd:sipity:*:*:*:*:*:*:*:*"
] |
CVE-2018-7937 | In Huawei HiRouter-CD20-10 with the versions before 1.9.6 and WS5200-10 with the versions before 1.9.6, there is a plug-in signature bypass vulnerability due to insufficient plug-in verification. An attacker may tamper with a legitimate plug-in to build a malicious plug-in and trick users into installing it. Successful exploit could allow the attacker to obtain the root permission of the device and take full control over the device. | [
"cpe:2.3:o:huawei:hirouter-cd20_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:hirouter-cd20:-:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:ws5200-10_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:ws5200-10:-:*:*:*:*:*:*:*"
] |
|
CVE-2023-26279 | IBM QRadar WinCollect Agent improper output encoding |
IBM QRadar WinCollect Agent 10.0 through 10.1.7 could allow a local user to perform unauthorized actions due to improper encoding. IBM X-Force ID: 248160.
| [
"cpe:2.3:a:ibm:qradar_wincollect:*:*:*:*:*:*:*:*"
] |
GHSA-8296-4xrf-2xw7 | taurusxin ncmdump v1.3.2 was discovered to contain a segmentation violation via the NeteaseCrypt::FixMetadata() function at /src/ncmcrypt.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted .ncm file. | [] |
|
CVE-2016-3976 | Directory traversal vulnerability in SAP NetWeaver AS Java 7.1 through 7.5 allows remote attackers to read arbitrary files via a ..\ (dot dot backslash) in the fileName parameter to CrashFileDownloadServlet, aka SAP Security Note 2234971. | [
"cpe:2.3:a:sap:netweaver_application_server_java:*:*:*:*:*:*:*:*"
] |
|
GHSA-57qv-m7j8-6h9p | member/index/register.html in YzmCMS 6.5 through 7.0 allows XSS via the Referer HTTP header. | [] |
|
CVE-2024-23945 | Apache Hive, Apache Spark, Apache Spark: CookieSigner exposes the correct signature when message verification fails | Signing cookies is an application security feature that adds a digital signature to cookie data to verify its authenticity and integrity. The signature helps prevent malicious actors from modifying the cookie value, which can lead to security vulnerabilities and exploitation. Apache Hive’s service component accidentally exposes the signed cookie to the end user when there is a mismatch in signature between the current and expected cookie. Exposing the correct cookie signature can lead to further exploitation.
The vulnerable CookieSigner logic was introduced in Apache Hive by HIVE-9710 (1.2.0) and in Apache Spark by SPARK-14987 (2.0.0). The affected components are the following:
* org.apache.hive:hive-service
* org.apache.spark:spark-hive-thriftserver_2.11
* org.apache.spark:spark-hive-thriftserver_2.12 | [] |
GHSA-hwhr-jcvf-mgf3 | zsh through version 5.4.2 is vulnerable to a stack-based buffer overflow in the utils.c:checkmailpath function. A local attacker could exploit this to execute arbitrary code in the context of another user. | [] |
|
CVE-2010-4394 | Heap-based buffer overflow in RealNetworks RealPlayer 11.0 through 11.1 and RealPlayer SP 1.0 through 1.1.5 allows remote web servers to execute arbitrary code via a long Server header in a response to an HTTP request that occurs during parsing of a RealPix file. | [
"cpe:2.3:a:realnetworks:realplayer:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer:11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:realnetworks:realplayer_sp:1.1.5:*:*:*:*:*:*:*"
] |
|
GHSA-7w9r-cjjc-pxw2 | D-Link DSL 2730-U IN_1.10 and IN_1.11 and DIR-600M 3.04 devices have the domain.name string in the DNS resolver search path by default, which allows remote attackers to provide valid DNS responses (and also offer Internet services such as HTTP) for names that otherwise would have had an NXDOMAIN error, by registering a subdomain of the domain.name domain name. | [] |
|
CVE-2024-28972 | Dell InsightIQ, Verion 5.0.0, contains a use of a broken or risky cryptographic algorithm vulnerability. An unauthenticated remote attacker could potentially exploit this vulnerability, leading to information disclosure. | [
"cpe:2.3:a:dell:insightiq:5.0.0:*:*:*:*:*:*:*"
] |
|
GHSA-978x-427c-qcqh | The plist_free_data function in plist.c in libplist allows attackers to cause a denial of service (crash) via vectors involving an integer node that is treated as a PLIST_KEY and then triggers an invalid free. | [] |
|
CVE-2015-8964 | The tty_set_termios_ldisc function in drivers/tty/tty_ldisc.c in the Linux kernel before 4.5 allows local users to obtain sensitive information from kernel memory by reading a tty data structure. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
|
CVE-2001-1183 | PPTP implementation in Cisco IOS 12.1 and 12.2 allows remote attackers to cause a denial of service (crash) via a malformed packet. | [
"cpe:2.3:o:cisco:ios:12.1e:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ez:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1ya:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.1yd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2t:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xh:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.2xq:*:*:*:*:*:*:*"
] |
|
GHSA-3xm7-hgh9-chcw | An issue found in CrossX v.1.15.3 for Android allows a local attacker to cause an escalation of Privileges via the database files. | [] |
|
CVE-2024-45084 | IBM Cognos Controller CSV injection | IBM Cognos Controller 11.0.0 through 11.0.1 FP3 and IBM Controller 11.1.0
could allow an authenticated attacker to conduct formula injection. An attacker could execute arbitrary commands on the system, caused by improper validation of file contents. | [] |
GHSA-j5cv-h8xh-gwcp | Gibbon v22.0.00 suffers from a stored XSS vulnerability within the wall messages component. | [] |
|
GHSA-8qch-qwg3-vf6m | System Manager 9.x versions 9.7 and higher prior to 9.7P16, 9.8P7 and 9.9.1P2 are susceptible to a vulnerability which could allow a local attacker to discover plaintext iSCSI CHAP credentials. | [] |
|
CVE-2022-26329 | File existence disclosue vulnerability in IDM plugin | File existence disclosure vulnerability in NetIQ Identity Manager plugin prior to version 4.8.5 allows attacker to determine whether a file exists on the filesystem. This issue affects: Micro Focus NetIQ Identity Manager NetIQ Identity Manager versions prior to 4.8.5 on ALL. | [
"cpe:2.3:a:netiq:identity_manager:*:*:*:*:*:*:*:*"
] |
CVE-2024-41676 | Magento LTS vulnerable to stored Cross-site Scripting (XSS) in admin system configs | Magento-lts is a long-term support alternative to Magento Community Edition (CE). This XSS vulnerability affects the design/header/welcome, design/header/logo_src, design/header/logo_src_small, and design/header/logo_alt system configs.They are intended to enable admins to set a text in the two cases, and to define an image url for the other two cases.
But because of previously missing escaping allowed to input arbitrary html and as a consequence also arbitrary JavaScript. The problem is patched with Version 20.10.1 or higher. | [
"cpe:2.3:a:openmage:magento:*:*:*:*:lts:*:*:*"
] |
CVE-2021-20474 | IBM Guardium Data Encryption (GDE) 3.0.0.2 and 4.0.0.4 does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. | [
"cpe:2.3:a:ibm:guardium_data_encryption:3.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:guardium_data_encryption:4.0.0.4:*:*:*:*:*:*:*"
] |
|
GHSA-mm7x-gxc9-9wx5 | Integer overflow in the pv_import function in util/pv_import.c in Csound 5.16.6, when converting a file, allows remote attackers to execute arbitrary code via a crafted file, which triggers a heap-based buffer overflow. | [] |
|
CVE-2025-3591 | ZHENFENG13/code-projects My-Blog-layui edit cross site scripting | A vulnerability was found in ZHENFENG13/code-projects My-Blog-layui 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/v1/blog/edit. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected. The vendor was contacted early about this disclosure but did not respond in any way. | [] |
GHSA-rhwx-vcm4-v6hm | The Domain Check WordPress plugin before 1.0.17 does not sanitise and escape the domain parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting issue | [] |
|
CVE-2017-2229 | Untrusted search path vulnerability in Douroshisetu Kihon Data Sakusei System Ver1.0.2 and earlier allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. | [
"cpe:2.3:a:douroshisetu:kihon_data_sakusei_system:*:*:*:*:*:*:*:*"
] |
|
CVE-2022-31686 | VMware Workspace ONE Assist prior to 22.10 contains a Broken Authentication Method vulnerability. A malicious actor with network access to Workspace ONE Assist may be able to obtain administrative access without the need to authenticate to the application. | [
"cpe:2.3:a:vmware:workspace_one_assist:*:*:*:*:*:*:*:*"
] |
|
CVE-2006-2464 | stopWebLogic.sh in BEA WebLogic Server 8.1 before Service Pack 4 and 7.0 before Service Pack 6 displays the administrator password to stdout when executed, which allows local users to obtain the password by viewing a local display. | [
"cpe:2.3:a:bea:weblogic_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp3:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp4:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:7.0:sp5:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp2:*:*:*:*:*:*",
"cpe:2.3:a:bea:weblogic_server:8.1:sp3:*:*:*:*:*:*"
] |
|
CVE-2020-11983 | An issue was found in Apache Airflow versions 1.10.10 and below. It was discovered that many of the admin management screens in the new/RBAC UI handled escaping incorrectly, allowing authenticated users with appropriate permissions to create stored XSS attacks. | [
"cpe:2.3:a:apache:airflow:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-14146 | HelpDEZk 1.1.1 allows remote authenticated users to execute arbitrary PHP code by uploading a .php attachment and then requesting it in the helpdezk\app\uploads\helpdezk\attachments\ directory. | [
"cpe:2.3:a:helpdezk:helpdezk:1.1.1:*:*:*:*:*:*:*"
] |
|
CVE-2014-2273 | The hx170dec device driver in Huawei P2-6011 before V100R001C00B043 allows local users to read and write to arbitrary memory locations via unspecified vectors. | [
"cpe:2.3:o:huawei:p2-6011_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:huawei:p2-6011:-:*:*:*:*:*:*:*"
] |
|
GHSA-q6ww-c56f-5fhw | In Apache SpamAssassin before 3.4.3, a message can be crafted in a way to use excessive resources. Upgrading to SA 3.4.3 as soon as possible is the recommended fix but details will not be shared publicly. | [] |
|
GHSA-pr54-qrpp-j9vj | An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in tvOS 16.1, iOS 16.1 and iPadOS 16, macOS Ventura 13, watchOS 9.1. A remote user may be able to cause kernel code execution. | [] |
|
GHSA-mpxp-95jp-3f78 | Cross-site scripting (XSS) vulnerability in search.asp in NetDirect ShopEngine allows remote attackers to inject arbitrary web script or HTML via the EXPS parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. | [] |
|
GHSA-6pf5-h6gw-hqjw | Cross-site request forgery (CSRF) vulnerability in Greenbone Security Assistant (GSA) before 2.0+rc3 allows remote attackers to hijack the authentication of users for requests that send email via an OMP request to OpenVAS Manager. NOTE: this issue can be leveraged to bypass authentication requirements for exploiting CVE-2011-0018. | [] |
|
CVE-2014-8081 | lib/execute/execSetResults.php in TestLink before 1.9.13 allows remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the filter_result_result parameter. | [
"cpe:2.3:a:testlink:testlink:*:*:*:*:*:*:*:*"
] |
|
GHSA-7fpw-xhjc-qc6p | uConfig agent in Compex NetPassage WPE54G router allows remote attackers to cause a denial of service (unresposiveness) via crafted datagrams to UDP port 7778. | [] |
|
GHSA-xw87-v2j3-vcw2 | A vulnerability classified as problematic has been found in FlatPress. This affects an unknown part of the file admin/panels/entry/admin.entry.list.php of the component Admin Area. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The name of the patch is 229752b51025e678370298284d42f8ebb231f67f. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-216999. | [] |
|
CVE-2023-46549 | TOTOLINK X2000R Gh v1.0.0-B20230221.0948.web was discovered to contain a stack overflow via the function formSetLg. | [
"cpe:2.3:o:totolink:x2000r_firmware:1.0.0-b20230221.0948:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:x2000r:-:*:*:*:*:*:*:*"
] |
|
GHSA-6x4p-xg8f-2h67 | Memory corruption may occur due to improper input validation in clock device. | [] |
|
CVE-2011-0072 | Unspecified vulnerability in the browser engine in Mozilla Firefox 3.5.x before 3.5.19 and 3.6.x before 3.6.17, Thunderbird before 3.1.10, and SeaMonkey before 2.0.14 allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors, a different vulnerability than CVE-2011-0074, CVE-2011-0075, CVE-2011-0077, and CVE-2011-0078. | [
"cpe:2.3:a:mozilla:firefox:3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.6.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:alpha:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1:beta:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:alpha_3:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:beta_2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:seamonkey:2.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.15:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:3.5.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5:beta2:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:1.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:2.0.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:3.1.8:*:*:*:*:*:*:*"
] |
|
GHSA-2crj-4cj6-f7cw | ZoneMinder before 1.32.3 has SQL Injection via the ajax/status.php filter[Query][terms][0][cnj] parameter. | [] |
|
CVE-2018-13112 | get_l2len in common/get.c in Tcpreplay 4.3.0 beta1 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via crafted packets, as demonstrated by tcpprep. | [
"cpe:2.3:a:broadcom:tcpreplay:4.3.0:beta1:*:*:*:*:*:*"
] |
|
CVE-2007-6627 | Integer overflow in the RTSP_remove_msg function in RTSP_lowlevel.c in LScube Feng 0.1.15 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via an RTP packet with a size value of 0xffff. | [
"cpe:2.3:a:feng:feng:*:*:*:*:*:*:*:*"
] |
|
GHSA-qjvv-485h-mp82 | Online Examination System v1.0 is vulnerable to multiple Open Redirect vulnerabilities. The 'q' parameter of the admin.php resource allows an attacker to redirect a victim user to an arbitrary web site using a crafted URL. | [] |
|
GHSA-7p7x-m4v3-7289 | TOTOLINK CA600-PoE V5.3c.6665_B20180820 was found to contain a command injection vulnerability in the msg_process function via the Url parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request. | [] |
|
GHSA-5v99-78fj-wc52 | In getMainActivityLaunchIntent of LauncherAppsService.java, there is a possible way to bypass the restrictions on starting activities from the background due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-229256049 | [] |
|
CVE-2018-3256 | Vulnerability in the Oracle Email Center component of Oracle E-Business Suite (subcomponent: Message Display). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5, 12.2.6 and 12.2.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Email Center. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Email Center, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Email Center accessible data. CVSS 3.0 Base Score 4.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N). | [
"cpe:2.3:a:oracle:email_center:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:email_center:12.2.7:*:*:*:*:*:*:*"
] |
|
GHSA-9344-p847-qm5c | Low severity (DoS) vulnerability in sequoia-openpgp | There is a denial-of-service vulnerability in sequoia-openpgp, our
crate providing a low-level interface to our OpenPGP implementation.
When triggered, the process will enter an infinite loop.Many thanks to Andrew Gallagher for disclosing the issue to us.ImpactAny software directly or indirectly using the interface
`sequoia_openpgp::cert::raw::RawCertParser`. Notably, this includes all
software using the `sequoia_cert_store` crate.DetailsThe `RawCertParser` does not advance the input stream when
encountering unsupported cert (primary key) versions, resulting in an
infinite loop.The fix introduces a new raw-cert-specific
`cert::raw::Error::UnuspportedCert`.Affected softwaresequoia-openpgp 1.13.0sequoia-openpgp 1.14.0sequoia-openpgp 1.15.0sequoia-openpgp 1.16.0sequoia-openpgp 1.17.0sequoia-openpgp 1.18.0sequoia-openpgp 1.19.0sequoia-openpgp 1.20.0Any software built against a vulnerable version of sequoia-openpgp
which is directly or indirectly using the interface
sequoia_`openpgp::cert::raw::RawCertParser`. Notably, this includes
all software using the `sequoia_cert_store` crate. | [] |
GHSA-grmv-v937-8mm8 | Norton prior to 22.15; Symantec Endpoint Protection (SEP) prior to 12.1.7454.7000 & 14.2; Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to NIS-22.15.1.8 & SEP-12.1.7454.7000; and Symantec Endpoint Protection Cloud (SEP Cloud) prior to 22.15.1 may be susceptible to an AV bypass issue, which is a type of exploit that works to circumvent one of the virus detection engines to avoid a specific type of virus protection. One of the antivirus engines depends on a signature pattern from a database to identify malicious files and viruses; the antivirus bypass exploit looks to alter the file being scanned so it is not detected. | [] |
|
GHSA-8wp2-6325-3w3v | cairo through 1.15.14 has an out-of-bounds stack-memory write during processing of a crafted document by WebKitGTK+ because of the interaction between cairo-rectangular-scan-converter.c (the generate and render_rows functions) and cairo-image-compositor.c (the _cairo_image_spans_and_zero function). | [] |
|
CVE-2007-3621 | Multiple CRLF injection vulnerabilities in callboth.php in AsteriDex 3.0 and earlier allow remote attackers to inject arbitrary shell commands via the (1) IN and (2) OUT parameters. | [
"cpe:2.3:a:asteridex:asteridex:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-6094 | WP ULike < 4.7.1 - Admin+ Stored XSS | The WP ULike WordPress plugin before 4.7.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | [
"cpe:2.3:a:wp_ulike_project:wp_ulike:*:*:*:*:*:*:*:*",
"cpe:2.3:a:technowich:wp_ulike:*:*:*:*:*:wordpress:*:*"
] |
GHSA-rgvf-r288-6rqr | Unspecified vulnerability in the Listener component in Oracle Database 9.2.0.8, 9.2.0.8DV, 10.1.0.5, 10.2.0.4, and 11.1.0.7 allows remote attackers to affect availability via unknown vectors, a different vulnerability than CVE-2009-0991. | [] |
|
CVE-2009-2906 | smbd in Samba 3.0 before 3.0.37, 3.2 before 3.2.15, 3.3 before 3.3.8, and 3.4 before 3.4.2 allows remote authenticated users to cause a denial of service (infinite loop) via an unanticipated oplock break notification reply packet. | [
"cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:samba:samba:3.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*"
] |
|
CVE-2022-32143 | CODESYS runtime system prone to directory acces | In multiple CODESYS products, file download and upload function allows access to internal files in the working directory e.g. firmware files of the PLC. All requests are processed on the controller only if no level 1 password is configured on the controller or if remote attacker has previously successfully authenticated himself to the controller. A successful Attack may lead to a denial of service, change of local files, or drain of confidential Information. User interaction is not required | [
"cpe:2.3:a:codesys:plcwinnt:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:runtime_toolkit:*:*:*:*:*:*:x86:*"
] |
CVE-2008-5161 | Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors. | [
"cpe:2.3:a:openbsd:openssh:4.7p1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.1j:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.2j:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.8k:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.3.9k:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.0f:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.1f:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.2f:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.0.3f:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_client:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connector:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connectsecure:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connectsecure:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connectsecure:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connectsecure:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_connectsecure:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:4.4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.1.1:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.0:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.1:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.2:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.0:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.4.0:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.4.1:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.4.2:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.5.0:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:5.5.1:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.0:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.1:*:ibm_zos:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:tectia_server:6.0.4:*:linux_ibm_zos:*:*:*:*:*"
] |
|
CVE-2003-1503 | Buffer overflow in AOL Instant Messenger (AIM) 5.2.3292 allows remote attackers to execute arbitrary code via an aim:getfile URL with a long screen name. | [
"cpe:2.3:a:aol:instant_messenger:5.2.3292:*:*:*:*:*:*:*"
] |
|
GHSA-7x5f-2xxg-4jm6 | A remote code execution vulnerability in the project management of Wanxing Technology's Yitu project which allows an attacker to use the exp.adpx file as a zip compressed file to construct a special file name, which can be used to decompress the project file into the system startup folder, restart the system, and automatically execute the constructed attack script. | [] |
|
CVE-2021-27556 | The Cron job tab in EasyCorp ZenTao 12.5.3 allows remote attackers (who have admin access) to execute arbitrary code by setting the type parameter to System. | [
"cpe:2.3:a:easycorp:zentao:12.5.3:*:*:*:*:*:*:*"
] |
|
GHSA-3632-grrp-f8wr | Fossil 2.18 on Windows allows attackers to cause a denial of service (daemon crash) via an XSS payload in a ticket. This occurs because the ticket data is stored in a temporary file, and the product does not properly handle the absence of this file after Windows Defender has flagged it as malware. | [] |
|
CVE-2022-4627 | ShiftNav – Responsive Mobile Menu < 1.7.2 - Contributor+ Stored XSS in Shortcode | The ShiftNav WordPress plugin before 1.7.2 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admins. | [
"cpe:2.3:a:sevenspark:shiftnav:*:*:*:*:*:wordpress:*:*"
] |
CVE-2020-1509 | Local Security Authority Subsystem Service Elevation of Privilege Vulnerability | An elevation of privilege vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause an elevation of privilege on the target system's LSASS service.
The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.
| [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1803:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1903:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] |
GHSA-9569-fmxv-7gf9 | Human Resource Management System v1.0 was discovered to contain a SQL injection vulnerability via the password parameter at /hrm/controller/login.php. | [] |
|
GHSA-p423-gqg6-3r8v | Heap-based buffer overflow in Adobe Flash Player before 13.0.0.260 and 14.x through 16.x before 16.0.0.257 on Windows and OS X and before 11.2.202.429 on Linux, Adobe AIR before 16.0.0.245 on Windows and OS X and before 16.0.0.272 on Android, Adobe AIR SDK before 16.0.0.272, and Adobe AIR SDK & Compiler before 16.0.0.272 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0304. | [] |
|
GHSA-qvh7-wf2p-5vp8 | Cross-Site Request Forgery (CSRF) vulnerability in BRANDbrilliance Post State Tags plugin <= 2.0.6 versions. | [] |
|
GHSA-r7jg-rv4q-6j69 | Cross-site scripting (XSS) vulnerability in view_mag.php in Vastal I-Tech DVD Zone allows remote attackers to inject arbitrary web script or HTML via the mag_id parameter. | [] |
|
GHSA-mwvj-rh8m-297x | Directory traversal in the Drobo Pix web application on Drobo 5N2 NAS version 4.0.5-13.28.96115 allows unauthenticated attackers to upload files to arbitrary locations. | [] |
|
CVE-2021-25525 | Improper check or handling of exception conditions vulnerability in Samsung Pay (US only) prior to version 4.0.65 allows attacker to use NFC without user recognition. | [
"cpe:2.3:a:samsung:pay:*:*:*:*:*:*:*:*"
] |
|
CVE-2017-20139 | Itech Movie Portal Script show_news.php Error sql injection | A vulnerability was found in Itech Movie Portal Script 7.36. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /show_news.php. The manipulation of the argument id with the input AND (SELECT 1222 FROM(SELECT COUNT(*),CONCAT(0x71786b7a71,(SELECT (ELT(1222=1222,1))),0x717a627871,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a) leads to sql injection (Error). The attack can be launched remotely. The exploit has been disclosed to the public and may be used. | [
"cpe:2.3:a:ambit:movie_portal_script:7.36:*:*:*:*:*:*:*"
] |
CVE-2003-1548 | MyABraCaDaWeb 1.0.2 and earlier allows remote attackers to obtain sensitive information via an invalid IDAdmin or other parameter, which reveals the installation path in an error message. | [
"cpe:2.3:a:myabracadaweb:myabracadaweb:*:*:*:*:*:*:*:*"
] |
|
CVE-2021-21565 | Dell PowerScale OneFS versions 9.1.0.3 and earlier contain a denial of service vulnerability. SmartConnect had an error condition that may be triggered to loop, using CPU and potentially preventing other SmartConnect DNS responses. | [
"cpe:2.3:a:dell:powerscale_onefs:*:*:*:*:*:*:*:*"
] |
|
CVE-2020-12901 | Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure. | [
"cpe:2.3:a:amd:radeon_software:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
] |
|
GHSA-j24x-6m7r-h4gp | The issue was addressed by adding additional logic. This issue is fixed in tvOS 17.5, iOS 16.7.8 and iPadOS 16.7.8, visionOS 1.2, Safari 17.5, iOS 17.5 and iPadOS 17.5, watchOS 10.5, macOS Sonoma 14.5. A maliciously crafted webpage may be able to fingerprint the user. | [] |
|
GHSA-r556-vcf9-958h | SQL injection vulnerability in BTGrup Admin WebController Script allows remote attackers to execute SQL commands via the (1) Username and (2) Password fields. | [] |
|
GHSA-4cc8-gf3c-3mrc | The forgotten mail interface in WordPress and WordPress MU before 2.8.1 exhibits different behavior for a password request depending on whether the user account exists, which allows remote attackers to enumerate valid usernames. NOTE: the vendor reportedly disputes the significance of this issue, indicating that the behavior exists for "user convenience." | [] |
|
CVE-2016-6362 | Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.110.0, 8.2.12x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug ID CSCuz24725. | [
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(15.14\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(112.3\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(112.4\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.1\\(131.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.2\\(100.0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.2\\(102.43\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:aironet_access_point_software:8.3.0:*:*:*:*:*:*:*"
] |
|
CVE-2020-6534 | Heap buffer overflow in WebRTC in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] |
|
CVE-2021-36958 | Windows Print Spooler Remote Code Execution Vulnerability | <p>A remote code execution vulnerability exists when the Windows Print Spooler service improperly performs privileged file operations. An attacker who successfully exploited this vulnerability could run arbitrary code with SYSTEM privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p>
| [
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.2183:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.2183:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1801:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1237:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1237:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1237:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.19060:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4651:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4651:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25712:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20120:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20120:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21218:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25712:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23462:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20120:*:*:*:*:*:x64:*"
] |
GHSA-8c7r-23x6-924q | IBM i2 Enterprise Insight Analysis 2.1.7 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques. IBM X-Force ID: 142117. | [] |
|
CVE-2021-41075 | The NetFlow Analyzer in Zoho ManageEngine OpManger before 125455 is vulnerable to SQL Injection in the Attacks Module API. | [
"cpe:2.3:a:zohocorp:manageengine_opmanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:-:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125000:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125002:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125100:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125101:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125102:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125108:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125110:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125111:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125112:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125113:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125114:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125116:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125117:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125118:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125120:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125121:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125123:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125124:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125125:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125136:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125137:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125139:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125140:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125143:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125144:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125145:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125156:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125157:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125158:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125159:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125161:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125163:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125174:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125175:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125176:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125177:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125178:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125180:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125181:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125192:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125193:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125194:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125195:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125196:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125197:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125198:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125201:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125204:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125212:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125213:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125214:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125215:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125216:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125228:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125229:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125230:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125231:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125232:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125233:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125312:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125323:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125324:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125326:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125328:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125329:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125340:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125341:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125342:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125343:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125344:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125346:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125358:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125359:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125360:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125361:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125362:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125364:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125366:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125367:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125375:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125376:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125377:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125378:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125379:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125380:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125381:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125382:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125386:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125392:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125393:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125394:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125397:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125398:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125399:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125405:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125410:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125411:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125413:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125414:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125415:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125416:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125417:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125420:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125428:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125430:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125431:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125432:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125433:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125434:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125437:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125446:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125448:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125450:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125451:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125452:*:*:*:*:*:*",
"cpe:2.3:a:zohocorp:manageengine_opmanager:12.5:build125453:*:*:*:*:*:*"
] |
|
GHSA-8rqw-rwvr-r288 | Unknown vulnerability in phpGroupWare before 0.9.14.002 has unknown attack vectors and impact, related to a "security hole" in the Setup/Config functionality. | [] |
|
GHSA-5mgx-r2w8-pf82 | Multiple SQL injection vulnerabilities in index.php in FamilyProject 2.0 allow remote attackers to execute arbitrary SQL commands via (1) the logmbr parameter (aka login field) or (2) the mdpmbr parameter (aka pass or "Mot de passe" field). NOTE: some of these details are obtained from third party information. | [] |
|
CVE-2023-48540 | Adobe Experience Manager | Cross-site Scripting (Stored XSS) (CWE-79) | Adobe Experience Manager versions 6.5.18 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field. | [
"cpe:2.3:a:adobe:experience_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:experience_manager_cloud_service:*:*:*:*:*:*:*:*"
] |
CVE-2020-15906 | tiki-login.php in Tiki before 21.2 sets the admin password to a blank value after 50 invalid login attempts. | [
"cpe:2.3:a:tiki:tiki:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-6954 | systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on. | [
"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:42.3:*:*:*:*:*:*:*"
] |
|
CVE-2009-1180 | The JBIG2 decoder in Xpdf 3.02pl2 and earlier, CUPS 1.3.9 and earlier, Poppler before 0.10.6, and other products allows remote attackers to execute arbitrary code via a crafted PDF file that triggers a free of invalid data. | [
"cpe:2.3:a:foolabs:xpdf:0.5a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.7a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.91a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.91b:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.91c:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92b:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92c:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92d:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.92e:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.93a:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.93b:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:0.93c:*:*:*:*:*:*:*",
"cpe:2.3:a:foolabs:xpdf:1.00a:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:*:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.90:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.91:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.92:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:0.93:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:1.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.02:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.00:*:*:*:*:*:*:*",
"cpe:2.3:a:glyphandcog:xpdfreader:3.01:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:*:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.90:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.5.91:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.2:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.3:*:*:*:*:*:*:*",
"cpe:2.3:a:poppler:poppler:0.10.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.5-2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.6-3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.9-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.10-1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.19:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc3:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc4:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc5:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.20:rc6:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.21:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.22:rc2:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.1.23:rc1:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:cups:1.3.11:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.