id
stringlengths
12
47
title
stringlengths
0
256
description
stringlengths
3
189k
cpes
listlengths
0
5.42k
cvss_v4_0
float64
0
10
cvss_v3_1
float64
0
10
cvss_v3_0
float64
0
10
cvss_v2_0
float64
0
10
patch_commit_url
stringlengths
36
232
GHSA-h8mw-3q4j-45hm
The account_save action in admin/userinfo.php in wPortfolio 0.3 and earlier does not require authentication and does not require knowledge of the original password, which allows remote attackers to change the admin account password via modified password and password_retype parameters.
[]
null
null
null
null
null
CVE-2020-35509
A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.
[ "cpe:2.3:a:redhat:keycloak:11.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:keycloak:12.0.0:*:*:*:*:*:*:*" ]
null
5.4
null
null
null
GHSA-536f-268f-6gxc
Malicious Package in buffermxor
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised.
[]
null
9.8
null
null
null
RHSA-2005:405
Red Hat Security Advisory: PHP security update
security flaw security flaw security flaw security flaw security flaw
[ "cpe:/o:redhat:enterprise_linux:3::as", "cpe:/o:redhat:enterprise_linux:3::desktop", "cpe:/o:redhat:enterprise_linux:3::es", "cpe:/o:redhat:enterprise_linux:3::ws" ]
null
null
null
null
null
GHSA-f7f4-5w9j-23p2
festivaltts4r allows arbitrary command execution
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`.
[]
null
null
9.8
null
null
CVE-2002-1884
index.php in Py-Membres 3.1 allows remote attackers to log in as an administrator by setting the pymembs parameter to "admin".
[ "cpe:2.3:a:py-membres:py-membres:3.1:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2021-24399
The Sorter <= 1.0 - Authenticated SQL Injection
The check_order function of The Sorter WordPress plugin through 1.0 uses an `area_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
[ "cpe:2.3:a:ombu:the_sorter:*:*:*:*:*:wordpress:*:*" ]
null
7.2
null
6.5
null
CVE-2023-23733
WordPress Lazy Social Comments Plugin <= 2.0.4 is vulnerable to Cross Site Scripting (XSS)
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joel James Lazy Social Comments plugin <= 2.0.4 versions.
[ "cpe:2.3:a:lazy_social_comments_project:lazy_social_comments:*:*:*:*:*:wordpress:*:*" ]
null
5.9
null
null
null
CVE-2018-5521
On F5 BIG-IP 12.1.0-12.1.3.1, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, carefully crafted URLs can be used to reflect arbitrary content into GeoIP lookup responses, potentially exposing clients to XSS.
[ "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_websafe:11.2.1:*:*:*:*:*:*:*" ]
null
null
6.1
4.3
null
GHSA-cx83-mmj7-4ghv
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An attacker with physical access may be able to share items from the lock screen.
[]
null
4.6
null
null
null
GHSA-h9cp-3469-6f4v
NETGEAR R7800 devices before 1.0.2.62 are affected by command injection by an authenticated user.
[]
null
null
null
null
null
CVE-2023-5547
Moodle: xss risk when previewing data in course upload tool
The course upload preview contained an XSS risk for users uploading unsafe data.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*" ]
null
3.3
null
null
null
CVE-2017-18533
The rimons-twitter-widget plugin before 1.3 for WordPress has XSS.
[ "cpe:2.3:a:rimons_twitter_widget_project:rimons_twitter_widget:*:*:*:*:*:wordpress:*:*" ]
null
null
6.1
4.3
null
GHSA-xm25-5jmx-4mjc
Mitigation bypass in PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier will allow a remote, unauthenticated user to execute arbitrary code by crafting a malicious message.
[]
null
null
null
null
null
CVE-2024-43436
Moodle: site administration sql injection via xmldb editor
A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators.
[ "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2010-4856
SQL injection vulnerability in arsiv.asp in xWeblog 2.2 allows remote attackers to execute arbitrary SQL commands via the tarih parameter.
[ "cpe:2.3:a:aspindir:xweblog:2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2025-37839
jbd2: remove wrong sb->s_sequence check
In the Linux kernel, the following vulnerability has been resolved: jbd2: remove wrong sb->s_sequence check Journal emptiness is not determined by sb->s_sequence == 0 but rather by sb->s_start == 0 (which is set a few lines above). Furthermore 0 is a valid transaction ID so the check can spuriously trigger. Remove the invalid WARN_ON.
[]
null
null
null
null
null
CVE-2024-45827
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may execute an arbitrary OS command.
[ "cpe:2.3:o:softbank:mesh_wi-fi_router_rp562b_firmware:*:*:*:*:*:*:*:*" ]
null
8
null
null
null
CVE-2020-3792
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2008-6808
SQL injection vulnerability in links.php in Scripts for Sites (SFS) EZ Link Directory allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a list action.
[ "cpe:2.3:a:scripts-for-sites:ez_link_directory:*:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2013-4955
Open redirect vulnerability in the login page in Puppet Enterprise before 3.0.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the service parameter.
[ "cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*", "cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*" ]
null
null
null
5.8
null
CVE-2021-20311
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.
[ "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*" ]
null
7.5
null
7.8
null
GHSA-97p9-9xph-wfxf
webSPELL 4.0, and possibly later versions, allows remote attackers to bypass authentication via a ws_auth cookie, a different vulnerability than CVE-2006-4782.
[]
null
null
null
null
null
GHSA-9wc2-4ch6-q6wv
Incorrect dialog box scoping in browser in Google Chrome on Android prior to 75.0.3770.80 allowed a remote attacker to display misleading security UI via a crafted HTML page.
[]
null
4.3
null
null
null
GHSA-qm8m-7626-762h
Dolibarr SQL injection vulnerability in admin/menus/edit.php
SQL injection vulnerability in admin/menus/edit.php in Dolibarr ERP/CRM version 6.0.0 allows remote attackers to execute arbitrary SQL commands via the menuId parameter.
[]
null
null
9.8
null
null
CVE-2019-8197
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution .
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
null
9.8
null
7.5
null
CVE-2010-1796
The AutoFill feature in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to obtain sensitive Address Book Card information via JavaScript code that forces keystroke events for input fields.
[ "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*", "cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*" ]
null
null
null
2.6
null
GHSA-rjcf-r46h-wpm6
The (1) IBM Tivoli Identity Manager Active Directory adapter before 5.1.24 and (2) IBM Security Identity Manager Active Directory adapter before 6.0.14 for IBM Security Identity Manager on Windows, when certain log and trace levels are configured, store the cleartext administrator password in a log file, which allows local users to obtain sensitive information by reading a file.
[]
null
null
null
null
null
GHSA-48g7-m8g8-36x3
Alternate Pic View 2.600 has a Read Access Violation at the Instruction Pointer after a call from PicViewer!PerfgrapFinalize+0x00000000000a9a1b.
[]
null
null
7.5
null
null
CVE-2023-46818
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.
[ "cpe:2.3:a:ispconfig:ispconfig:*:*:*:*:*:*:*:*", "cpe:2.3:a:ispconfig:ispconfig:3.2.11:-:*:*:*:*:*:*" ]
null
7.2
null
null
null
CVE-2019-10247
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
[ "cpe:2.3:a:eclipse:jetty:7.0.0:20091005:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_4:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.0:rc6:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.1:20091125:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.2:20100331:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.0.2:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.0:20100505:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.1:20100517:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.2:20100523:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.3:20100526:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.4:20100610:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.5:20100705:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.1.6:20100715:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.2.0:20101020:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.2.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.2.1:20101111:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.2.2:20101205:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.3.0:20110203:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.3.1:20110307:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.0:20110414:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.1:20110513:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.2:20110526:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.3:20110630:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.3:20110701:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.4:20110707:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.4.5:20110725:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.0:20110901:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.1:20110908:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.2:20111006:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.3:20111011:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.5.4:20111024:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:20120125:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:20120127:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.1:20120215:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.2:20120302:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.2:20120308:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.3:20120413:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.3:20120416:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.4:20120522:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.4:20120524:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.5:20120713:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.5:20120716:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.6:20120903:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.7:20120910:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.8:20121106:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.9:20130131:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.10:20130312:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.11:20130520:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.11:20130725:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.12:20130726:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.13:20130910:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.13:20130916:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.14:20131031:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.15:20140411:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.16:20140903:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.17:20150415:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.18:20150929:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.19:20160209:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.20:20160902:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:7.6.21:20160908:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.0:20110901:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.1:20110908:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.2:20111006:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.3:20111011:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.0.4:20111024:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.0:20120127:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.0:rc4:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.1:20120215:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.2:20120302:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.2:20120308:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.3:20120416:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.4:20120524:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.5:20120713:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.5:20120716:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.6:20120903:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.7:20120910:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.8:20121106:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.9:20130131:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.10:20130312:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.11:20130520:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.12:20130725:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.12:20130726:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.13:20130910:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.13:20130916:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.14:20131031:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.15:20140411:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.16:20140903:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.17:20150415:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.18:20150929:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.19:20160209:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.20:20160902:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.21:20160908:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.1.22:20160922:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:8.2.0:20160908:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:20130308:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:m5:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_4:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_5:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.1:20130408:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.2:20130417:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.2:20140415:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.3:20130506:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.4:20130621:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.4:20130625:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.5:20130813:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.5:20130815:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.6:20130919:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.6:20130930:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.7:20131031:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.0.7:20131107:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.0:20131115:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.0:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.1:20140108:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.2:20140210:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.3:20140225:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.4:20140401:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.5:20140505:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.6:20151106:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.1.6:20160112:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.0:20140523:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.0:20140526:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.0:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.0:maintenance_1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.1:20140609:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.2:20140723:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.3:20140905:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.4:20141103:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.5:20141112:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.6:20141203:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.6:20141205:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.7:20150116:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.8:20150217:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.9:20150224:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.10:20150310:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.11:20150528:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.11:20150529:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.11:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.12:20150709:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.12:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.13:20150730:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.14:20151106:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.15:20160210:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.16:20160407:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.16:20160414:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.17:20160517:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.18:20160721:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.19:20160908:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.20:20161216:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.21:20170120:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.22:20170606:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.23:20171218:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.24:20180105:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.25:20180606:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.26:20180806:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.2.27:20190403:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:20150601:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:20150608:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:20150612:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:maintenance0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:maintenance1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:maintenance2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.1:20150714:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.2:20150730:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.3:20150825:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.3:20150827:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.4:20151005:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.4:20151007:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.4:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.4:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.5:20151012:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.6:20151106:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.7:20160115:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.7:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.7:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.8:20160311:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.8:20160314:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.8:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.9:20160517:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.9:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.9:maintenance_1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.10:20160621:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.10:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.11:20160721:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.11:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.12:20160915:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.13:20161014:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.13:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.14:20161028:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.15:20161220:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.16:20170119:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.16:20170120:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.17:20170317:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.17:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.18:20170406:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.19:20170502:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.20:20170531:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.21:20170918:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.21:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.21:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.22:20171030:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.23:20180228:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.24:20180605:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.25:20180904:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.3.26:20190403:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:20161207:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:20161208:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:maintenance_0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:maintenance_1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.0:rc3:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.1:20170120:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.1:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.2:20170220:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.2:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.3:20170317:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.3:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.4:20170410:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.4:20170414:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.4:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.5:20170502:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.5:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.6:20170531:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.6:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.7:20170914:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.7:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.7:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.8:20171121:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.8:20180619:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.9:20180320:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.10:20180503:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.10:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.10:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.11:20180605:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.12:20180830:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.12:rc0:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.12:rc1:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.12:rc2:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.13:20181111:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.14:20181114:*:*:*:*:*:*", "cpe:2.3:a:eclipse:jetty:9.4.15:20190215:*:*:*:*:*:*", "cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*", "cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*", "cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:a:netapp:storage_services_connector:-:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*", "cpe:2.3:o:netapp:element:-:*:*:*:*:vcenter_server:*:*", "cpe:2.3:a:oracle:autovue:21.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_services_gatekeeper:6.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_services_gatekeeper:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_core_banking:*:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_core_banking:5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fmw_platform:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fmw_platform:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:unified_directory:12.2.1.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:unified_directory:12.2.1.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ]
null
5.3
null
5
null
GHSA-6524-6266-mqf2
A vulnerability in the report scripting component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, TIBCO Jaspersoft Reporting and Analytics for AWS, TIBCO Jaspersoft Studio, TIBCO Jaspersoft Studio Community Edition, and TIBCO Jaspersoft Studio for ActiveMatrix BPM may allow analytic reports that contain scripting to perform arbitrary code execution. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2;6.3.3; 6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO JasperReports Library: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.1; 6.4.2, TIBCO JasperReports Library Community Edition: versions up to and including 6.4.3, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2, TIBCO Jaspersoft Studio: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.2, TIBCO Jaspersoft Studio Community Edition: versions up to and including 6.4.3, TIBCO Jaspersoft Studio for ActiveMatrix BPM: versions up to and including 6.4.2.
[]
null
null
8.8
null
null
GHSA-c5rj-rh78-4hrx
Invensys Wonderware InTouch HMI 2012 R2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
[]
null
null
null
null
null
CVE-2022-28776
Improper access control vulnerability in Galaxy Store prior to version 4.5.36.4 allows attacker to install applications from Galaxy Store without user interactions.
[ "cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*" ]
null
5.9
null
null
null
GHSA-4c45-725m-4wqx
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
[]
null
9.8
null
null
null
GHSA-ph99-jr94-mp8m
Directory traversal vulnerability in wordtube-button.php in the wordTube 1.43 and earlier plugin for WordPress, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the wpPATH parameter.
[]
null
null
null
null
null
cisco-sa-catc-insec-acc-mtt8EhEb
Cisco Catalyst Center Insufficient Access Control Vulnerability
A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device. This vulnerability is due to insufficient enforcement of access control on HTTP requests. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
[]
null
4.7
null
null
null
GHSA-365h-hvh8-45g8
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, Junos OS Evolved allows a network-based unauthenticated attacker to cause a Denial of Service (DoS). When a BGP flow route with redirect IP extended community is received, and the reachability to the next-hop of the corresponding redirect IP is flapping, the rpd process might crash. Whether the crash occurs depends on the timing of the internally processing of these two events and is outside the attackers control. Please note that this issue also affects Route-Reflectors unless 'routing-options flow firewall-install-disable' is configured. This issue affects: Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.4 versions prior to 19.4R3-S8; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1-EVO versions prior to 21.1R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.
[]
null
5.9
null
null
null
CVE-2003-0059
Unknown vulnerability in the chk_trans.c of the libkrb5 library for MIT Kerberos V5 before 1.2.5 allows users from one realm to impersonate users in other realms that have the same inter-realm keys.
[ "cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
CVE-2024-28778
IBM Cognos Controller information disclosure
IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 is vulnerable to exposure of Artifactory API keys. This vulnerability allows users to publish code to private packages or repositories under the name of the organization.
[ "cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:*" ]
null
6.5
null
null
null
RHSA-2025:8060
Red Hat Security Advisory: firefox security update
firefox: thunderbird: Out-of-bounds access when resolving Promise objects firefox: thunderbird: Out-of-bounds access when optimizing linear sums
[ "cpe:/a:redhat:enterprise_linux:8::appstream" ]
null
8.8
null
null
null
GHSA-qprx-58vg-chx6
Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.
[]
null
null
null
null
null
CVE-2013-1529
Unspecified vulnerability in the Oracle WebCenter Interaction component in Oracle Fusion Middleware 6.5.1 and 10.3.3.0 allows remote attackers to affect integrity via unknown vectors related to Image Service.
[ "cpe:2.3:a:oracle:fusion_middleware:6.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:fusion_middleware:10.3.3.0:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-qg4g-qvgv-f8q2
The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections.
[]
null
7.5
null
null
null
RHSA-2025:13100
Red Hat Security Advisory: python-cryptography security update
python-cryptography: NULL-dereference when loading PKCS7 certificates
[ "cpe:/o:redhat:rhel_e4s:8.8::baseos", "cpe:/o:redhat:rhel_tus:8.8::baseos" ]
null
7.5
null
null
null
CVE-2015-2639
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Firewall.
[ "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
ICSA-25-203-05
Schneider Electric System Monitor Application
Schneider Electric is aware of a vulnerability in its System Monitor application of Harmony Industrial PC and Pro-face PS5000 trusted Legacy industrial PC series products. The Harmony Industrial PC Series and Pro-face PS5000 legacy industrial PC Series are iPCs which incorporate slim, flexible and durable design allowing each customer to configure their iPC based on their individual application needs. These products offer flexible connectivity to a range of devices and designs. Failure to apply the remediations provided below may risk untrusted code execution which could result in operational failures.
[]
null
6.9
null
null
null
CVE-2023-40719
A use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0 allows an attacker to access Fortinet private testing data via the use of static credentials.
[ "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*", "cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*" ]
null
4.1
null
null
null
CVE-2024-45877
baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Access Control in the User Management function in /Apps/TOPqw/BenutzerManagement.aspx. This allows a low privileged user to access all modules in the web portal, view and manipulate information and permissions of other users, lock other user or unlock the own account, change the password of other users, create new users or delete existing users and view, manipulate and delete reference data.
[]
null
6.5
null
null
null
GHSA-97qc-h8j3-mgv9
Design documents with matching document IDs, from databases on the same cluster, may share a mutable Javascript environment when using these design document functions:validate_doc_updatelistfilterfilter views (using view functions as filters)rewriteupdateThis doesn't affect map/reduce or search (Dreyfus) index functions.Users are recommended to upgrade to a version that is no longer affected by this issue (Apache CouchDB 3.3.2 or 3.2.3).Workaround: Avoid using design documents from untrusted sources which may attempt to cache or store data in the Javascript environment.
[]
null
4.4
null
null
null
CVE-2025-25925
A stored cross-scripting (XSS) vulnerability in Openmrs v2.4.3 Build 0ff0ed allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the personName.middleName parameter at /openmrs/admin/patients/shortPatientForm.form.
[]
null
4.8
null
null
null
CVE-2013-5379
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.x before 7.0.0.2 CF25 and 8.x before 8.0.0.1 CF8 allows remote authenticated users to inject arbitrary web script or HTML by leveraging improper tagging functionality.
[ "cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*" ]
null
null
null
3.5
null
GHSA-x2jg-9c23-q285
Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Fusion Middleware MapViewer accessible data as well as unauthorized read access to a subset of Oracle Fusion Middleware MapViewer accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).
[]
null
null
null
null
null
CVE-2025-1367
MicroWord eScan Antivirus USB Password sprintf buffer overflow
A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been classified as critical. This affects the function sprintf of the component USB Password Handler. The manipulation leads to buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.
[]
4.8
5.3
5.3
4.3
null
GHSA-5hw4-855x-57vm
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.8 could potentially disclose highly sensitive information to a privileged user due to improper access controls. IBM X-Force ID: 174956.
[]
null
null
null
null
null
GHSA-pjfr-qf3p-3q25
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
[]
null
null
8.1
null
null
GHSA-c5fx-j8fg-j8qw
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
null
7.8
null
null
null
GHSA-693p-74cq-565g
Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.
[]
null
7.8
null
null
null
CVE-2025-27219
In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.
[]
null
5.8
null
null
null
CVE-2025-54464
Cleartext Storage Vulnerability in ZKTeco WL20
This vulnerability exists in ZKTeco WL20 due to storage of admin and user credentials without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted credentials stored in the firmware of targeted device.
[]
7
null
null
null
null
GHSA-jcv7-6v4q-4m7x
By design, the DHCP protocol does not authenticate messages, including for example the classless static route option (121). An attacker with the ability to send DHCP messages can manipulate routes to redirect VPN traffic, allowing the attacker to read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN. Many, if not most VPN systems based on IP routing are susceptible to such attacks.
[]
null
8.8
null
null
null
GHSA-3578-p22m-362p
Linux kernel, and possibly other operating systems, allows remote attackers to read portions of memory via a series of fragmented ICMP packets that generate an ICMP TTL Exceeded response, which includes portions of the memory in the response packet.
[]
null
null
null
null
null
GHSA-rrqc-c2jx-6jgv
Django allows enumeration of user e-mail addresses
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
[]
6.3
3.7
null
null
null
GHSA-6fx5-48vv-pv9j
drivers/connector/connector.c in the Linux kernel before 2.6.32.8 allows local users to cause a denial of service (memory consumption and system crash) by sending the kernel many NETLINK_CONNECTOR messages.
[]
null
null
null
null
null
GHSA-wxfp-rxcm-7h6v
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the host_time parameter in the NTPSyncWithHost function.
[]
null
9.8
null
null
null
CVE-2008-0139
Eval injection vulnerability in loudblog/inc/parse_old.php in Loudblog 0.8.0 and earlier allows remote attackers to execute arbitrary PHP code via the template parameter.
[ "cpe:2.3:a:loudblog:loudblog:*:*:*:*:*:*:*:*" ]
null
null
null
6.8
null
CVE-2020-9918
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
[ "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-g4x2-4f64-9pmw
PunBB 1.2.12 does not properly handle an avatar directory pathname ending in %00, which allows remote authenticated administrative users to upload arbitrary files and execute code, as demonstrated by a query to admin_options.php with an avatars_dir parameter ending in %00. NOTE: this issue was originally disputed by the vendor, but the dispute was withdrawn on 20060926.
[]
null
null
null
null
null
GHSA-mhpr-v3hf-gcxg
In the Linux kernel, the following vulnerability has been resolved:usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlockWhen config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system to enter suspend status with below command: echo mem > /sys/power/state There will be a deadlock issue occurring. Detailed invoking path as below: dwc3_suspend_common() spin_lock_irqsave(&dwc->lock, flags); <-- 1st dwc3_gadget_suspend(dwc); dwc3_gadget_soft_disconnect(dwc); spin_lock_irqsave(&dwc->lock, flags); <-- 2nd This issue is exposed by commit c7ebd8149ee5 ("usb: dwc3: gadget: Fix NULL pointer dereference in dwc3_gadget_suspend") that removes the code of checking whether dwc->gadget_driver is NULL or not. It causes the following code is executed and deadlock occurs when trying to get the spinlock. In fact, the root cause is the commit 5265397f9442("usb: dwc3: Remove DWC3 locking during gadget suspend/resume") that forgot to remove the lock of otg mode. So, remove the redundant lock of otg mode during gadget suspend/resume.
[]
null
5.5
null
null
null
CVE-1999-0006
Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command.
[ "cpe:2.3:a:qualcomm:qpopper:2.4:*:*:*:*:*:*:*" ]
null
9.8
null
10
null
GHSA-mj48-h3vq-rr5x
The unite-gallery-lite plugin before 1.5 for WordPress has CSRF and SQL injection via wp-admin/admin-ajax.php in a unitegallery_ajax_action operation.
[]
null
null
null
null
null
CVE-2016-2875
IBM Security QRadar SIEM 7.1.x and 7.2.x before 7.2.7 allows remote authenticated users to execute arbitrary OS commands as root via unspecified vectors.
[ "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:*:*:*:*:*:*:*" ]
null
null
8.8
9
null
GHSA-x8wj-cqmp-3wmm
Cross-site Scripting in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
[]
null
4.8
null
null
null
GHSA-qrmf-fv3g-9879
An exploitable heap overflow vulnerability exists in the JPEG2000 parsing functionality of LEADTOOLS 20.0.2019.3.15. A specially crafted J2K image file can cause an out of bounds write of a null byte in a heap buffer, potentially resulting in code execution. An attack can specially craft a J2K image to trigger this vulnerability.
[]
null
8.8
null
null
null
ICSA-21-350-07
Siemens POWER METER SICAM Q100
The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution.
[]
null
9.1
null
null
null
CVE-2006-1216
Cross-site scripting (XSS) vulnerability in bigshow.php in Runcms 1.x allows remote attackers to inject arbitrary web script or HTML via the id parameter.
[ "cpe:2.3:a:runcms:runcms:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.1a:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.2:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.3a:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.3a2:*:*:*:*:*:*:*", "cpe:2.3:a:runcms:runcms:1.3a5:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-vqj2-jf89-h87v
The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
[]
null
null
null
null
null
GHSA-q9w5-96vr-6gqq
A vulnerability has been discovered in the Citrix Secure Access client for Ubuntu which, if exploited, could allow an attacker to remotely execute code if a victim user opens an attacker-crafted link and accepts further prompts.
[]
null
9.6
null
null
null
CVE-2019-10715
There is Stored XSS in Verodin Director 3.5.3.0 and earlier via input fields of certain tooltips, and on the Tags, Sequences, and Actors pages.
[ "cpe:2.3:a:verodin:director:*:*:*:*:*:*:*:*" ]
null
5.4
null
3.5
null
CVE-2021-1086
NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin) where it allows guests to control unauthorized resources, which may lead to integrity and confidentiality loss or information disclosure. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7).
[ "cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*", "cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*", "cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*", "cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*" ]
null
7.1
null
null
null
CVE-2006-1075
Format string vulnerability in the visualization function in Jason Boettcher Liero Xtreme 0.62b and earlier allows remote attackers to execute arbitrary code via format string specifiers in (1) a nickname, (2) a dedicated server name, or (3) a mapname in a level (aka .lxl) file.
[ "cpe:2.3:a:jason_boettcher:liero_xtreme:0.56b_pack_1.7:*:*:*:*:*:*:*", "cpe:2.3:a:jason_boettcher:liero_xtreme:0.62b:*:*:*:*:*:*:*" ]
null
null
null
7.5
null
RHSA-2011:0176
Red Hat Security Advisory: java-1.6.0-openjdk security update
IcedTea System property information leak via public static IcedTea jnlp security manager bypass
[ "cpe:/o:redhat:enterprise_linux:5::server" ]
null
null
null
null
null
GHSA-pwqg-3r7w-w9hw
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
[]
null
null
7.5
null
null
CVE-2023-32220
Milesight NCR/Camera Authentication Bypass
Milesight NCR/camera version 71.8.0.6-r5 allows authentication bypass through an unspecified method.
[ "cpe:2.3:o:milesight:ncr\\/camera_firmware:71.8.0.6-r5:*:*:*:*:*:*:*", "cpe:2.3:h:milesight:ncr\\/camera:-:*:*:*:*:*:*:*" ]
null
8.2
null
null
null
CVE-2005-4598
Cross-site scripting (XSS) vulnerability in home.php in OoApp Guestbook 2.1 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
[ "cpe:2.3:a:ooapp:ooapp_guestbook:2.1:*:*:*:*:*:*:*" ]
null
null
null
4.3
null
GHSA-27x2-77hh-wh7h
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.This issue affects Junos OS Evolved:All versions prior to 21.2R3-S8-EVO,21.4 versions prior to  21.4R3-S6-EVO,22.1 versions prior to 22.1R3-S5-EVO,22.2 versions prior to 22.2R3-S3-EVO,22.3 versions prior to 22.3R3-S3-EVO,22.4 versions prior to 22.4R3-EVO,23.2 versions prior to 23.2R2-EVO.
[]
7
7.3
null
null
null
GHSA-6gqm-f29f-4p3p
Multiple directory traversal vulnerabilities in 1024 CMS 1.3.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the lang parameter to pages/print/default/ops/news.php or (2) the theme_dir parameter to pages/download/default/ops/search.php; or the admin_theme_dir parameter to (3) download.php, (4) forum.php, or (5) news.php in admin/ops/reports/ops/. NOTE: it was later reported that 1.4.2 beta and earlier are also affected for vector 1.
[]
null
null
null
null
null
CVE-2021-39519
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PullQData() located in blockbitmaprequester.cpp It allows an attacker to cause Denial of Service.
[ "cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
CVE-2021-39285
A XSS vulnerability exists in Versa Director Release: 16.1R2 Build: S8. An attacker can use the administration web interface URL to create a XSS based attack.
[ "cpe:2.3:a:versa-networks:versa_director:16.1r2:build_s8:*:*:*:*:*:*" ]
null
6.1
null
4.3
null
CVE-2019-1705
Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability
A vulnerability in the remote access VPN session manager of Cisco Adaptive Security Appliance (ASA) Software could allow a unauthenticated, remote attacker to cause a denial of service (DoS) condition on the remote access VPN services. The vulnerability is due to an issue with the remote access VPN session manager. An attacker could exploit this vulnerability by requesting an excessive number of remote access VPN sessions. An exploit could allow the attacker to cause a DoS condition.
[ "cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*" ]
null
null
5.3
null
null
CVE-2021-21216
Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*", "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-878w-8w5v-4v3j
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
[]
null
null
null
null
null
GHSA-pgcq-55gj-r266
index2.php in ACGVannu 1.3 and earlier allows remote attackers to change the password or profile of a user via a modified id parameter, related to templates/modif.html. NOTE: some of these details are obtained from third party information.
[]
null
null
null
null
null
GHSA-85p6-fxpj-g69h
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
[]
null
null
null
null
null
CVE-2020-12841
ismartgate PRO 1.5.9 is vulnerable to CSRF that allows remote attackers to upload imae files via /index.php
[ "cpe:2.3:o:gogogate:ismartgate_pro_firmware:1.5.9:*:*:*:*:*:*:*", "cpe:2.3:h:gogogate:ismartgate_pro:-:*:*:*:*:*:*:*" ]
null
6.5
null
4.3
null
GHSA-q29c-3w39-gpj6
Unspecified vulnerability in the chunk_split function in PHP before 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation.
[]
null
null
null
null
null
RHSA-2023:7577
Red Hat Security Advisory: firefox security update
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
[ "cpe:/a:redhat:rhel_eus:9.2::appstream" ]
null
8.8
null
null
null
GHSA-662q-8mxr-6pg5
An unspecified module in Huawei eSpace U1910, U1911, U1930, U1960, U1980, and U1981 unified gateways with software before V200R003C00SPC300 does not properly initialize memory when processing timeout messages, which allows remote attackers to cause a denial of service (out-of-bounds memory access and device restart) via unknown vectors.
[]
null
null
null
null
null
CVE-2017-11010
In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 625, SD 650/52, SD 835, access control left a configuration space unprotected.
[ "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*" ]
null
null
9.8
10
null
GHSA-4hwc-qxww-8xr8
The WooCommerce Multi Currency plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wmc_bulk_fixed_price function in versions up to, and including, 2.1.17. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to make changes to product prices.
[]
null
6.5
null
null
null