id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-h8mw-3q4j-45hm
|
The account_save action in admin/userinfo.php in wPortfolio 0.3 and earlier does not require authentication and does not require knowledge of the original password, which allows remote attackers to change the admin account password via modified password and password_retype parameters.
|
[] | null | null | null | null | null |
|
CVE-2020-35509
|
A flaw was found in keycloak affecting versions 11.0.3 and 12.0.0. An expired certificate would be accepted by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.
|
[
"cpe:2.3:a:redhat:keycloak:11.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:redhat:keycloak:12.0.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-536f-268f-6gxc
|
Malicious Package in buffermxor
|
Version 2.0.2 contained malicious code. The package targeted the Ethereum cryptocurrency and performed transactions to wallets not controlled by the user.RecommendationRemove the package from your environment. Ensure no Ethereum funds were compromised.
|
[] | null | 9.8 | null | null | null |
RHSA-2005:405
|
Red Hat Security Advisory: PHP security update
|
security flaw security flaw security flaw security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:3::as",
"cpe:/o:redhat:enterprise_linux:3::desktop",
"cpe:/o:redhat:enterprise_linux:3::es",
"cpe:/o:redhat:enterprise_linux:3::ws"
] | null | null | null | null | null |
GHSA-f7f4-5w9j-23p2
|
festivaltts4r allows arbitrary command execution
|
The festivaltts4r gem for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the (1) `to_speech` or (2) `to_mp3` method in `lib/festivaltts4r/festival4r.rb`.
|
[] | null | null | 9.8 | null | null |
CVE-2002-1884
|
index.php in Py-Membres 3.1 allows remote attackers to log in as an administrator by setting the pymembs parameter to "admin".
|
[
"cpe:2.3:a:py-membres:py-membres:3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2021-24399
|
The Sorter <= 1.0 - Authenticated SQL Injection
|
The check_order function of The Sorter WordPress plugin through 1.0 uses an `area_id` parameter which is not sanitised, escaped or validated before inserting to a SQL statement, leading to SQL injection.
|
[
"cpe:2.3:a:ombu:the_sorter:*:*:*:*:*:wordpress:*:*"
] | null | 7.2 | null | 6.5 | null |
CVE-2023-23733
|
WordPress Lazy Social Comments Plugin <= 2.0.4 is vulnerable to Cross Site Scripting (XSS)
|
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Joel James Lazy Social Comments plugin <= 2.0.4 versions.
|
[
"cpe:2.3:a:lazy_social_comments_project:lazy_social_comments:*:*:*:*:*:wordpress:*:*"
] | null | 5.9 | null | null | null |
CVE-2018-5521
|
On F5 BIG-IP 12.1.0-12.1.3.1, 11.6.1-11.6.3.1, 11.5.1-11.5.5, or 11.2.1, carefully crafted URLs can be used to reflect arbitrary content into GeoIP lookup responses, potentially exposing clients to XSS.
|
[
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_analytics:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_access_policy_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_application_security_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_domain_name_system:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_edge_gateway:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_link_controller:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_webaccelerator:11.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*",
"cpe:2.3:a:f5:big-ip_websafe:11.2.1:*:*:*:*:*:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-cx83-mmj7-4ghv
|
The issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.7.1, macOS Sequoia 15, macOS Sonoma 14.7.1. An attacker with physical access may be able to share items from the lock screen.
|
[] | null | 4.6 | null | null | null |
|
GHSA-h9cp-3469-6f4v
|
NETGEAR R7800 devices before 1.0.2.62 are affected by command injection by an authenticated user.
|
[] | null | null | null | null | null |
|
CVE-2023-5547
|
Moodle: xss risk when previewing data in course upload tool
|
The course upload preview contained an XSS risk for users uploading unsafe data.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"
] | null | 3.3 | null | null | null |
CVE-2017-18533
|
The rimons-twitter-widget plugin before 1.3 for WordPress has XSS.
|
[
"cpe:2.3:a:rimons_twitter_widget_project:rimons_twitter_widget:*:*:*:*:*:wordpress:*:*"
] | null | null | 6.1 | 4.3 | null |
|
GHSA-xm25-5jmx-4mjc
|
Mitigation bypass in PAN-OS 7.1.24 and earlier, PAN-OS 8.0.19 and earlier, PAN-OS 8.1.9 and earlier, and PAN-OS 9.0.3 and earlier will allow a remote, unauthenticated user to execute arbitrary code by crafting a malicious message.
|
[] | null | null | null | null | null |
|
CVE-2024-43436
|
Moodle: site administration sql injection via xmldb editor
|
A SQL injection risk flaw was found in the XMLDB editor tool available to site administrators.
|
[
"cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
CVE-2010-4856
|
SQL injection vulnerability in arsiv.asp in xWeblog 2.2 allows remote attackers to execute arbitrary SQL commands via the tarih parameter.
|
[
"cpe:2.3:a:aspindir:xweblog:2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2025-37839
|
jbd2: remove wrong sb->s_sequence check
|
In the Linux kernel, the following vulnerability has been resolved:
jbd2: remove wrong sb->s_sequence check
Journal emptiness is not determined by sb->s_sequence == 0 but rather by
sb->s_start == 0 (which is set a few lines above). Furthermore 0 is a
valid transaction ID so the check can spuriously trigger. Remove the
invalid WARN_ON.
|
[] | null | null | null | null | null |
CVE-2024-45827
|
Improper neutralization of special elements used in an OS command ('OS Command Injection') issue exists in Mesh Wi-Fi router RP562B firmware version v1.0.2 and earlier. If this vulnerability is exploited, a network-adjacent authenticated attacker may execute an arbitrary OS command.
|
[
"cpe:2.3:o:softbank:mesh_wi-fi_router_rp562b_firmware:*:*:*:*:*:*:*:*"
] | null | 8 | null | null | null |
|
CVE-2020-3792
|
Adobe Acrobat and Reader versions 2020.006.20034 and earlier, 2017.011.30158 and earlier, 2017.011.30158 and earlier, 2015.006.30510 and earlier, and 2015.006.30510 and earlier have a use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2008-6808
|
SQL injection vulnerability in links.php in Scripts for Sites (SFS) EZ Link Directory allows remote attackers to execute arbitrary SQL commands via the cat_id parameter in a list action.
|
[
"cpe:2.3:a:scripts-for-sites:ez_link_directory:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2013-4955
|
Open redirect vulnerability in the login page in Puppet Enterprise before 3.0.1 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the service parameter.
|
[
"cpe:2.3:a:puppet:puppet_enterprise:*:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:puppet:puppet_enterprise:2.8.3:*:*:*:*:*:*:*"
] | null | null | null | 5.8 | null |
|
CVE-2021-20311
|
A flaw was found in ImageMagick in versions before 7.0.11, where a division by zero in sRGBTransformImage() in the MagickCore/colorspace.c may trigger undefined behavior via a crafted image file that is submitted by an attacker processed by an application using ImageMagick. The highest threat from this vulnerability is to system availability.
|
[
"cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 7.8 | null |
|
GHSA-97p9-9xph-wfxf
|
webSPELL 4.0, and possibly later versions, allows remote attackers to bypass authentication via a ws_auth cookie, a different vulnerability than CVE-2006-4782.
|
[] | null | null | null | null | null |
|
GHSA-9wc2-4ch6-q6wv
|
Incorrect dialog box scoping in browser in Google Chrome on Android prior to 75.0.3770.80 allowed a remote attacker to display misleading security UI via a crafted HTML page.
|
[] | null | 4.3 | null | null | null |
|
GHSA-qm8m-7626-762h
|
Dolibarr SQL injection vulnerability in admin/menus/edit.php
|
SQL injection vulnerability in admin/menus/edit.php in Dolibarr ERP/CRM version 6.0.0 allows remote attackers to execute arbitrary SQL commands via the menuId parameter.
|
[] | null | null | 9.8 | null | null |
CVE-2019-8197
|
Adobe Acrobat and Reader versions , 2019.012.20040 and earlier, 2017.011.30148 and earlier, 2017.011.30148 and earlier, 2015.006.30503 and earlier, and 2015.006.30503 and earlier have a heap overflow vulnerability. Successful exploitation could lead to arbitrary code execution .
|
[
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2010-1796
|
The AutoFill feature in Apple Safari before 5.0.1 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1.1 on Mac OS X 10.4, allows remote attackers to obtain sensitive Address Book Card information via JavaScript code that forces keystroke events for input fields.
|
[
"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.0b:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:safari:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apple:webkit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.5.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_vista:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_xp:*:sp3:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x:10.4.11:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.4:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.5:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.6:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.8:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.9:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.10:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:mac_os_x_server:10.4.11:*:*:*:*:*:*:*"
] | null | null | null | 2.6 | null |
|
GHSA-rjcf-r46h-wpm6
|
The (1) IBM Tivoli Identity Manager Active Directory adapter before 5.1.24 and (2) IBM Security Identity Manager Active Directory adapter before 6.0.14 for IBM Security Identity Manager on Windows, when certain log and trace levels are configured, store the cleartext administrator password in a log file, which allows local users to obtain sensitive information by reading a file.
|
[] | null | null | null | null | null |
|
GHSA-48g7-m8g8-36x3
|
Alternate Pic View 2.600 has a Read Access Violation at the Instruction Pointer after a call from PicViewer!PerfgrapFinalize+0x00000000000a9a1b.
|
[] | null | null | 7.5 | null | null |
|
CVE-2023-46818
|
An issue was discovered in ISPConfig before 3.2.11p1. PHP code injection can be achieved in the language file editor by an admin if admin_allow_langedit is enabled.
|
[
"cpe:2.3:a:ispconfig:ispconfig:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ispconfig:ispconfig:3.2.11:-:*:*:*:*:*:*"
] | null | 7.2 | null | null | null |
|
CVE-2019-10247
|
In Eclipse Jetty version 7.x, 8.x, 9.2.27 and older, 9.3.26 and older, and 9.4.16 and older, the server running on any OS and Jetty version combination will reveal the configured fully qualified directory base resource location on the output of the 404 error for not finding a Context that matches the requested path. The default server behavior on jetty-distribution and jetty-home will include at the end of the Handler tree a DefaultHandler, which is responsible for reporting this 404 error, it presents the various configured contexts as HTML for users to click through to. This produced HTML includes output that contains the configured fully qualified directory base resource location for each context.
|
[
"cpe:2.3:a:eclipse:jetty:7.0.0:20091005:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:maintenance_4:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.0:rc6:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.1:20091125:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.2:20100331:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.0.2:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.0:20100505:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.1:20100517:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.2:20100523:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.3:20100526:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.4:20100610:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.5:20100705:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.1.6:20100715:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.2.0:20101020:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.2.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.2.1:20101111:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.2.2:20101205:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.3.0:20110203:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.3.1:20110307:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.0:20110414:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.1:20110513:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.2:20110526:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.3:20110630:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.3:20110701:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.4:20110707:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.4.5:20110725:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.0:20110901:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.1:20110908:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.2:20111006:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.3:20111011:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.5.4:20111024:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:20120125:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:20120127:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.1:20120215:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.2:20120302:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.2:20120308:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.3:20120413:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.3:20120416:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.4:20120522:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.4:20120524:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.5:20120713:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.5:20120716:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.6:20120903:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.7:20120910:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.8:20121106:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.9:20130131:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.10:20130312:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.11:20130520:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.11:20130725:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.12:20130726:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.13:20130910:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.13:20130916:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.14:20131031:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.15:20140411:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.16:20140903:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.17:20150415:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.18:20150929:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.19:20160209:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.20:20160902:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:7.6.21:20160908:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.0:20110901:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.0:maintenance_3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.1:20110908:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.2:20111006:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.3:20111011:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.0.4:20111024:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.0:20120127:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.1:20120215:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.2:20120302:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.2:20120308:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.3:20120416:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.4:20120524:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.5:20120713:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.5:20120716:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.6:20120903:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.7:20120910:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.8:20121106:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.9:20130131:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.10:20130312:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.11:20130520:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.12:20130725:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.12:20130726:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.13:20130910:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.13:20130916:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.14:20131031:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.15:20140411:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.16:20140903:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.17:20150415:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.18:20150929:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.19:20160209:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.20:20160902:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.21:20160908:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.1.22:20160922:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:8.2.0:20160908:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:20130308:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:m5:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_4:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:maintenance_5:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.1:20130408:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.2:20130417:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.2:20140415:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.3:20130506:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.4:20130621:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.4:20130625:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.5:20130813:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.5:20130815:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.6:20130919:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.6:20130930:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.7:20131031:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.0.7:20131107:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.0:20131115:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.0:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.1:20140108:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.2:20140210:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.3:20140225:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.4:20140401:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.5:20140505:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.6:20151106:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.1.6:20160112:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.0:20140523:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.0:20140526:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.0:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.0:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.1:20140609:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.2:20140723:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.3:20140905:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.4:20141103:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.5:20141112:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.6:20141203:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.6:20141205:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.7:20150116:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.8:20150217:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.9:20150224:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.10:20150310:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.11:20150528:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.11:20150529:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.11:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.12:20150709:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.12:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.13:20150730:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.14:20151106:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.15:20160210:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.16:20160407:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.16:20160414:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.17:20160517:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.18:20160721:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.19:20160908:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.20:20161216:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.21:20170120:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.22:20170606:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.23:20171218:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.24:20180105:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.25:20180606:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.26:20180806:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.2.27:20190403:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:20150601:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:20150608:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:20150612:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:maintenance0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:maintenance1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:maintenance2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.1:20150714:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.2:20150730:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.3:20150825:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.3:20150827:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.4:20151005:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.4:20151007:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.4:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.5:20151012:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.6:20151106:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.7:20160115:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.7:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.7:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.8:20160311:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.8:20160314:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.8:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.9:20160517:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.9:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.9:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.10:20160621:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.10:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.11:20160721:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.11:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.12:20160915:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.13:20161014:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.13:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.14:20161028:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.15:20161220:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.16:20170119:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.16:20170120:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.17:20170317:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.17:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.18:20170406:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.19:20170502:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.20:20170531:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.21:20170918:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.21:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.21:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.22:20171030:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.23:20180228:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.24:20180605:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.25:20180904:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.3.26:20190403:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:20161207:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:20161208:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:maintenance_0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:maintenance_1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.1:20170120:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.1:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.2:20170220:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.2:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.3:20170317:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.3:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.4:20170410:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.4:20170414:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.4:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.5:20170502:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.5:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.6:20170531:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.6:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.7:20170914:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.7:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.7:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.8:20171121:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.8:20180619:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.9:20180320:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.10:20180503:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.10:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.10:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.11:20180605:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.12:20180830:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.12:rc0:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.12:rc1:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.12:rc2:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.13:20181111:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.14:20181114:*:*:*:*:*:*",
"cpe:2.3:a:eclipse:jetty:9.4.15:20190215:*:*:*:*:*:*",
"cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapcenter:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:oracle:*:*",
"cpe:2.3:a:netapp:snapmanager:-:-:*:*:*:sap:*:*",
"cpe:2.3:a:netapp:storage_replication_adapter_for_clustered_data_ontap:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:a:netapp:storage_services_connector:-:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:vasa_provider_for_clustered_data_ontap:*:*:*:*:*:*:*:*",
"cpe:2.3:a:netapp:virtual_storage_console:*:*:*:*:*:vmware_vsphere:*:*",
"cpe:2.3:o:netapp:element:-:*:*:*:*:vcenter_server:*:*",
"cpe:2.3:a:oracle:autovue:21.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_analytics:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_services_gatekeeper:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_services_gatekeeper:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_services_gatekeeper:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:data_integrator:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:data_integrator:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:endeca_information_discovery_integrator:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.2:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:enterprise_manager_base_platform:13.3:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_core_banking:*:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_core_banking:5.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fmw_platform:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fmw_platform:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:retail_xstore_point_of_service:17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:unified_directory:12.2.1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:unified_directory:12.2.1.4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] | null | 5.3 | null | 5 | null |
|
GHSA-6524-6266-mqf2
|
A vulnerability in the report scripting component of TIBCO Software Inc.'s TIBCO JasperReports Server, TIBCO JasperReports Server Community Edition, TIBCO JasperReports Server for ActiveMatrix BPM, TIBCO JasperReports Library, TIBCO JasperReports Library Community Edition, TIBCO JasperReports Library for ActiveMatrix BPM, TIBCO Jaspersoft for AWS with Multi-Tenancy, TIBCO Jaspersoft Reporting and Analytics for AWS, TIBCO Jaspersoft Studio, TIBCO Jaspersoft Studio Community Edition, and TIBCO Jaspersoft Studio for ActiveMatrix BPM may allow analytic reports that contain scripting to perform arbitrary code execution. Affected releases include TIBCO Software Inc.'s TIBCO JasperReports Server: versions up to and including 6.2.4; 6.3.0; 6.3.2;6.3.3; 6.4.0; 6.4.2, TIBCO JasperReports Server Community Edition: versions up to and including 6.4.2, TIBCO JasperReports Server for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO JasperReports Library: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.1; 6.4.2, TIBCO JasperReports Library Community Edition: versions up to and including 6.4.3, TIBCO JasperReports Library for ActiveMatrix BPM: versions up to and including 6.4.2, TIBCO Jaspersoft for AWS with Multi-Tenancy: versions up to and including 6.4.2, TIBCO Jaspersoft Reporting and Analytics for AWS: versions up to and including 6.4.2, TIBCO Jaspersoft Studio: versions up to and including 6.2.4; 6.3.0; 6.3.2; 6.3.3; 6.4.0; 6.4.2, TIBCO Jaspersoft Studio Community Edition: versions up to and including 6.4.3, TIBCO Jaspersoft Studio for ActiveMatrix BPM: versions up to and including 6.4.2.
|
[] | null | null | 8.8 | null | null |
|
GHSA-c5rj-rh78-4hrx
|
Invensys Wonderware InTouch HMI 2012 R2 and earlier allows remote attackers to read arbitrary files, send HTTP requests to intranet servers, or cause a denial of service (CPU and memory consumption) via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
|
[] | null | null | null | null | null |
|
CVE-2022-28776
|
Improper access control vulnerability in Galaxy Store prior to version 4.5.36.4 allows attacker to install applications from Galaxy Store without user interactions.
|
[
"cpe:2.3:a:samsung:galaxy_store:*:*:*:*:*:*:*:*"
] | null | 5.9 | null | null | null |
|
GHSA-4c45-725m-4wqx
|
The Master Elements WordPress plugin through 8.0 does not validate and escape the meta_ids parameter of its remove_post_meta_condition AJAX action (available to both unauthenticated and authenticated users) before using it in a SQL statement, leading to an unauthenticated SQL Injection
|
[] | null | 9.8 | null | null | null |
|
GHSA-ph99-jr94-mp8m
|
Directory traversal vulnerability in wordtube-button.php in the wordTube 1.43 and earlier plugin for WordPress, when register_globals is enabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the wpPATH parameter.
|
[] | null | null | null | null | null |
|
cisco-sa-catc-insec-acc-mtt8EhEb
|
Cisco Catalyst Center Insufficient Access Control Vulnerability
|
A vulnerability in Cisco Catalyst Center, formerly Cisco DNA Center, could allow an authenticated, remote attacker to read and modify data in a repository that belongs to an internal service of an affected device.
This vulnerability is due to insufficient enforcement of access control on HTTP requests. An attacker could exploit this vulnerability by submitting a crafted HTTP request to an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
|
[] | null | 4.7 | null | null | null |
GHSA-365h-hvh8-45g8
|
A Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Routing Protocol Daemon (rpd) of Juniper Networks Junos OS, Junos OS Evolved allows a network-based unauthenticated attacker to cause a Denial of Service (DoS). When a BGP flow route with redirect IP extended community is received, and the reachability to the next-hop of the corresponding redirect IP is flapping, the rpd process might crash. Whether the crash occurs depends on the timing of the internally processing of these two events and is outside the attackers control. Please note that this issue also affects Route-Reflectors unless 'routing-options flow firewall-install-disable' is configured. This issue affects: Juniper Networks Junos OS: 18.4 versions prior to 18.4R2-S10, 18.4R3-S10; 19.1 versions prior to 19.1R3-S7; 19.2 versions prior to 19.2R1-S8, 19.2R3-S4; 19.4 versions prior to 19.4R3-S8; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S2; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R2. Juniper Networks Junos OS Evolved: All versions prior to 20.4R2-EVO; 21.1-EVO versions prior to 21.1R2-EVO. This issue does not affect Juniper Networks Junos OS versions prior to 18.4R1.
|
[] | null | 5.9 | null | null | null |
|
CVE-2003-0059
|
Unknown vulnerability in the chk_trans.c of the libkrb5 library for MIT Kerberos V5 before 1.2.5 allows users from one realm to impersonate users in other realms that have the same inter-realm keys.
|
[
"cpe:2.3:a:mit:kerberos_5:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mit:kerberos_5:1.2.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-28778
|
IBM Cognos Controller information disclosure
|
IBM Cognos Controller 11.0.0 through 11.0.1 and IBM Controller 11.1.0 is vulnerable to exposure of Artifactory API keys. This vulnerability allows users to publish code to private packages or repositories under the name of the organization.
|
[
"cpe:2.3:a:ibm:controller:11.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:11.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:cognos_controller:11.0.1:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
RHSA-2025:8060
|
Red Hat Security Advisory: firefox security update
|
firefox: thunderbird: Out-of-bounds access when resolving Promise objects firefox: thunderbird: Out-of-bounds access when optimizing linear sums
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream"
] | null | 8.8 | null | null | null |
GHSA-qprx-58vg-chx6
|
Incorrect security UI in media in Google Chrome prior to 84.0.4147.125 allowed a remote attacker to potentially obtain sensitive information via a crafted HTML page.
|
[] | null | null | null | null | null |
|
CVE-2013-1529
|
Unspecified vulnerability in the Oracle WebCenter Interaction component in Oracle Fusion Middleware 6.5.1 and 10.3.3.0 allows remote attackers to affect integrity via unknown vectors related to Image Service.
|
[
"cpe:2.3:a:oracle:fusion_middleware:6.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:fusion_middleware:10.3.3.0:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-qg4g-qvgv-f8q2
|
The DMSDP module of the distributed hardware has a vulnerability that may cause imposter control connections.Successful exploitation of this vulnerability may disconnect normal service connections.
|
[] | null | 7.5 | null | null | null |
|
RHSA-2025:13100
|
Red Hat Security Advisory: python-cryptography security update
|
python-cryptography: NULL-dereference when loading PKCS7 certificates
|
[
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos"
] | null | 7.5 | null | null | null |
CVE-2015-2639
|
Unspecified vulnerability in Oracle MySQL Server 5.6.24 and earlier allows remote authenticated users to affect integrity via unknown vectors related to Server : Security : Firewall.
|
[
"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:15.04:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:mysql:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
ICSA-25-203-05
|
Schneider Electric System Monitor Application
|
Schneider Electric is aware of a vulnerability in its System Monitor application of Harmony Industrial PC and
Pro-face PS5000 trusted Legacy industrial PC series products.
The Harmony Industrial PC Series and Pro-face PS5000 legacy industrial PC Series are iPCs which
incorporate slim, flexible and durable design allowing each customer to configure their iPC based on their
individual application needs. These products offer flexible connectivity to a range of devices and designs.
Failure to apply the remediations provided below may risk untrusted code execution which could result in
operational failures.
|
[] | null | 6.9 | null | null | null |
CVE-2023-40719
|
A use of hard-coded credentials vulnerability in Fortinet FortiAnalyzer and FortiManager 7.0.0 - 7.0.8, 7.2.0 - 7.2.3 and 7.4.0 allows an attacker to access Fortinet private testing data via the use of static credentials.
|
[
"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*"
] | null | 4.1 | null | null | null |
|
CVE-2024-45877
|
baltic-it TOPqw Webportal v1.35.283.2 is vulnerable to Incorrect Access Control in the User Management function in /Apps/TOPqw/BenutzerManagement.aspx. This allows a low privileged user to access all modules in the web portal, view and manipulate information and permissions of other users, lock other user or unlock the own account, change the password of other users, create new users or delete existing users and view, manipulate and delete reference data.
|
[] | null | 6.5 | null | null | null |
|
GHSA-97qc-h8j3-mgv9
|
Design documents with matching document IDs, from databases on the same cluster, may share a mutable Javascript environment when using these design document functions:validate_doc_updatelistfilterfilter views (using view functions as filters)rewriteupdateThis doesn't affect map/reduce or search (Dreyfus) index functions.Users are recommended to upgrade to a version that is no longer affected by this issue (Apache CouchDB 3.3.2 or 3.2.3).Workaround: Avoid using design documents from untrusted sources which may attempt to cache or store data in the Javascript environment.
|
[] | null | 4.4 | null | null | null |
|
CVE-2025-25925
|
A stored cross-scripting (XSS) vulnerability in Openmrs v2.4.3 Build 0ff0ed allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the personName.middleName parameter at /openmrs/admin/patients/shortPatientForm.form.
|
[] | null | 4.8 | null | null | null |
|
CVE-2013-5379
|
Cross-site scripting (XSS) vulnerability in IBM WebSphere Portal 7.x before 7.0.0.2 CF25 and 8.x before 8.0.0.1 CF8 allows remote authenticated users to inject arbitrary web script or HTML by leveraging improper tagging functionality.
|
[
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
GHSA-x2jg-9c23-q285
|
Vulnerability in the Oracle Fusion Middleware MapViewer product of Oracle Fusion Middleware (component: Tile Server). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Fusion Middleware MapViewer. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Fusion Middleware MapViewer accessible data as well as unauthorized read access to a subset of Oracle Fusion Middleware MapViewer accessible data. CVSS 3.1 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N).
|
[] | null | null | null | null | null |
|
CVE-2025-1367
|
MicroWord eScan Antivirus USB Password sprintf buffer overflow
|
A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been classified as critical. This affects the function sprintf of the component USB Password Handler. The manipulation leads to buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way.
|
[] | 4.8 | 5.3 | 5.3 | 4.3 | null |
GHSA-5hw4-855x-57vm
|
IBM DataPower Gateway 2018.4.1.0 through 2018.4.1.8 could potentially disclose highly sensitive information to a privileged user due to improper access controls. IBM X-Force ID: 174956.
|
[] | null | null | null | null | null |
|
GHSA-pjfr-qf3p-3q25
|
When running Apache Tomcat on Windows with HTTP PUTs enabled it was possible to upload a JSP file to the server
|
When running Apache Tomcat 7.0.0 to 7.0.79 on Windows with HTTP PUTs enabled (e.g. via setting the readonly initialisation parameter of the Default to false) it was possible to upload a JSP file to the server via a specially crafted request. This JSP could then be requested and any code it contained would be executed by the server.
|
[] | null | null | 8.1 | null | null |
GHSA-c5fx-j8fg-j8qw
|
Adobe Bridge versions 12.0.3 (and earlier) and 13.0.1 (and earlier) are affected by an Improper Input Validation vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 7.8 | null | null | null |
|
GHSA-693p-74cq-565g
|
Improper access control in the installer for some Intel(R) Iris(R) Xe MAX Dedicated Graphics Drivers for Windows 10 before version 27.20.100.9466 may allow authenticated user to potentially enable escalation of privilege via local access.
|
[] | null | 7.8 | null | null | null |
|
CVE-2025-27219
|
In the CGI gem before 0.4.2 for Ruby, the CGI::Cookie.parse method in the CGI library contains a potential Denial of Service (DoS) vulnerability. The method does not impose any limit on the length of the raw cookie value it processes. This oversight can lead to excessive resource consumption when parsing extremely large cookies.
|
[] | null | 5.8 | null | null | null |
|
CVE-2025-54464
|
Cleartext Storage Vulnerability in ZKTeco WL20
|
This vulnerability exists in ZKTeco WL20 due to storage of admin and user credentials without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted credentials stored in the firmware of targeted device.
|
[] | 7 | null | null | null | null |
GHSA-jcv7-6v4q-4m7x
|
By design, the DHCP protocol does not authenticate messages, including for example the classless static route option (121). An attacker with the ability to send DHCP messages can manipulate routes to redirect VPN traffic, allowing the attacker to read, disrupt, or possibly modify network traffic that was expected to be protected by the VPN. Many, if not most VPN systems based on IP routing are susceptible to such attacks.
|
[] | null | 8.8 | null | null | null |
|
GHSA-3578-p22m-362p
|
Linux kernel, and possibly other operating systems, allows remote attackers to read portions of memory via a series of fragmented ICMP packets that generate an ICMP TTL Exceeded response, which includes portions of the memory in the response packet.
|
[] | null | null | null | null | null |
|
GHSA-rrqc-c2jx-6jgv
|
Django allows enumeration of user e-mail addresses
|
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
|
[] | 6.3 | 3.7 | null | null | null |
GHSA-6fx5-48vv-pv9j
|
drivers/connector/connector.c in the Linux kernel before 2.6.32.8 allows local users to cause a denial of service (memory consumption and system crash) by sending the kernel many NETLINK_CONNECTOR messages.
|
[] | null | null | null | null | null |
|
GHSA-wxfp-rxcm-7h6v
|
TOTOLINK CA300-PoE V6.2c.884 was discovered to contain a command injection vulnerability via the host_time parameter in the NTPSyncWithHost function.
|
[] | null | 9.8 | null | null | null |
|
CVE-2008-0139
|
Eval injection vulnerability in loudblog/inc/parse_old.php in Loudblog 0.8.0 and earlier allows remote attackers to execute arbitrary PHP code via the template parameter.
|
[
"cpe:2.3:a:loudblog:loudblog:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 | null |
|
CVE-2020-9918
|
An out-of-bounds read was addressed with improved input validation. This issue is fixed in macOS Catalina 10.15.6, tvOS 13.4.8, watchOS 6.2.8. A remote attacker may be able to cause unexpected system termination or corrupt kernel memory.
|
[
"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-g4x2-4f64-9pmw
|
PunBB 1.2.12 does not properly handle an avatar directory pathname ending in %00, which allows remote authenticated administrative users to upload arbitrary files and execute code, as demonstrated by a query to admin_options.php with an avatars_dir parameter ending in %00. NOTE: this issue was originally disputed by the vendor, but the dispute was withdrawn on 20060926.
|
[] | null | null | null | null | null |
|
GHSA-mhpr-v3hf-gcxg
|
In the Linux kernel, the following vulnerability has been resolved:usb: dwc3: core: remove lock of otg mode during gadget suspend/resume to avoid deadlockWhen config CONFIG_USB_DWC3_DUAL_ROLE is selected, and trigger system
to enter suspend status with below command:
echo mem > /sys/power/state
There will be a deadlock issue occurring. Detailed invoking path as
below:
dwc3_suspend_common()
spin_lock_irqsave(&dwc->lock, flags); <-- 1st
dwc3_gadget_suspend(dwc);
dwc3_gadget_soft_disconnect(dwc);
spin_lock_irqsave(&dwc->lock, flags); <-- 2nd
This issue is exposed by commit c7ebd8149ee5 ("usb: dwc3: gadget: Fix
NULL pointer dereference in dwc3_gadget_suspend") that removes the code
of checking whether dwc->gadget_driver is NULL or not. It causes the
following code is executed and deadlock occurs when trying to get the
spinlock. In fact, the root cause is the commit 5265397f9442("usb: dwc3:
Remove DWC3 locking during gadget suspend/resume") that forgot to remove
the lock of otg mode. So, remove the redundant lock of otg mode during
gadget suspend/resume.
|
[] | null | 5.5 | null | null | null |
|
CVE-1999-0006
|
Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command.
|
[
"cpe:2.3:a:qualcomm:qpopper:2.4:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 | null |
|
GHSA-mj48-h3vq-rr5x
|
The unite-gallery-lite plugin before 1.5 for WordPress has CSRF and SQL injection via wp-admin/admin-ajax.php in a unitegallery_ajax_action operation.
|
[] | null | null | null | null | null |
|
CVE-2016-2875
|
IBM Security QRadar SIEM 7.1.x and 7.2.x before 7.2.7 allows remote authenticated users to execute arbitrary OS commands as root via unspecified vectors.
|
[
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:*:*:*:*:*:*:*"
] | null | null | 8.8 | 9 | null |
|
GHSA-x8wj-cqmp-3wmm
|
Cross-site Scripting in Zenario CMS
|
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
|
[] | null | 4.8 | null | null | null |
GHSA-qrmf-fv3g-9879
|
An exploitable heap overflow vulnerability exists in the JPEG2000 parsing functionality of LEADTOOLS 20.0.2019.3.15. A specially crafted J2K image file can cause an out of bounds write of a null byte in a heap buffer, potentially resulting in code execution. An attack can specially craft a J2K image to trigger this vulnerability.
|
[] | null | 8.8 | null | null | null |
|
ICSA-21-350-07
|
Siemens POWER METER SICAM Q100
|
The affected firmware contains a buffer overflow vulnerability in the web application that could allow a remote attacker with engineer or admin priviliges to potentially perform remote code execution.
|
[] | null | 9.1 | null | null | null |
CVE-2006-1216
|
Cross-site scripting (XSS) vulnerability in bigshow.php in Runcms 1.x allows remote attackers to inject arbitrary web script or HTML via the id parameter.
|
[
"cpe:2.3:a:runcms:runcms:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.1a:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.3a:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.3a2:*:*:*:*:*:*:*",
"cpe:2.3:a:runcms:runcms:1.3a5:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-vqj2-jf89-h87v
|
The focus handling for the onkeydown event in Mozilla Firefox 1.5.0.12, 2.0.0.4 and other versions before 2.0.0.8, and SeaMonkey before 1.1.5 allows remote attackers to change field focus and copy keystrokes via the "for" attribute in a label, which bypasses the focus prevention, as demonstrated by changing focus from a textarea to a file upload field.
|
[] | null | null | null | null | null |
|
GHSA-q9w5-96vr-6gqq
|
A vulnerability has been discovered in the Citrix Secure Access client for Ubuntu which, if exploited, could allow an attacker to remotely execute code if a victim user opens an attacker-crafted link and accepts further prompts.
|
[] | null | 9.6 | null | null | null |
|
CVE-2019-10715
|
There is Stored XSS in Verodin Director 3.5.3.0 and earlier via input fields of certain tooltips, and on the Tags, Sequences, and Actors pages.
|
[
"cpe:2.3:a:verodin:director:*:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
CVE-2021-1086
|
NVIDIA vGPU driver contains a vulnerability in the Virtual GPU Manager (vGPU plugin) where it allows guests to control unauthorized resources, which may lead to integrity and confidentiality loss or information disclosure. This affects vGPU version 12.x (prior to 12.2), version 11.x (prior to 11.4) and version 8.x (prior to 8.7).
|
[
"cpe:2.3:a:nvidia:virtual_gpu_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:o:citrix:hypervisor:-:*:*:*:*:*:*:*",
"cpe:2.3:o:nutanix:ahv:-:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux_kernel-based_virtual_machine:-:*:*:*:*:*:*:*",
"cpe:2.3:o:vmware:vsphere:-:*:*:*:*:*:*:*"
] | null | 7.1 | null | null | null |
|
CVE-2006-1075
|
Format string vulnerability in the visualization function in Jason Boettcher Liero Xtreme 0.62b and earlier allows remote attackers to execute arbitrary code via format string specifiers in (1) a nickname, (2) a dedicated server name, or (3) a mapname in a level (aka .lxl) file.
|
[
"cpe:2.3:a:jason_boettcher:liero_xtreme:0.56b_pack_1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:jason_boettcher:liero_xtreme:0.62b:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
RHSA-2011:0176
|
Red Hat Security Advisory: java-1.6.0-openjdk security update
|
IcedTea System property information leak via public static IcedTea jnlp security manager bypass
|
[
"cpe:/o:redhat:enterprise_linux:5::server"
] | null | null | null | null | null |
GHSA-pwqg-3r7w-w9hw
|
The seadroid (aka Seafile Android Client) application through 2.2.13 for Android always uses the same Initialization Vector (IV) with Cipher Block Chaining (CBC) Mode to encrypt private data, making it easier to conduct chosen-plaintext attacks or dictionary attacks.
|
[] | null | null | 7.5 | null | null |
|
CVE-2023-32220
|
Milesight NCR/Camera Authentication Bypass
|
Milesight NCR/camera version 71.8.0.6-r5 allows authentication bypass through an unspecified method.
|
[
"cpe:2.3:o:milesight:ncr\\/camera_firmware:71.8.0.6-r5:*:*:*:*:*:*:*",
"cpe:2.3:h:milesight:ncr\\/camera:-:*:*:*:*:*:*:*"
] | null | 8.2 | null | null | null |
CVE-2005-4598
|
Cross-site scripting (XSS) vulnerability in home.php in OoApp Guestbook 2.1 allows remote attackers to inject arbitrary web script or HTML via the page parameter.
|
[
"cpe:2.3:a:ooapp:ooapp_guestbook:2.1:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
GHSA-27x2-77hh-wh7h
|
A Missing Authorization vulnerability in the Socket Intercept (SI) command file interface of Juniper Networks Junos OS Evolved allows an authenticated, low-privilege local attacker to modify certain files, allowing the attacker to cause any command to execute with root privileges leading to privilege escalation ultimately compromising the system.This issue affects Junos OS Evolved:All versions prior to 21.2R3-S8-EVO,21.4 versions prior to 21.4R3-S6-EVO,22.1 versions prior to 22.1R3-S5-EVO,22.2 versions prior to 22.2R3-S3-EVO,22.3 versions prior to 22.3R3-S3-EVO,22.4 versions prior to 22.4R3-EVO,23.2 versions prior to 23.2R2-EVO.
|
[] | 7 | 7.3 | null | null | null |
|
GHSA-6gqm-f29f-4p3p
|
Multiple directory traversal vulnerabilities in 1024 CMS 1.3.1 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in (1) the lang parameter to pages/print/default/ops/news.php or (2) the theme_dir parameter to pages/download/default/ops/search.php; or the admin_theme_dir parameter to (3) download.php, (4) forum.php, or (5) news.php in admin/ops/reports/ops/. NOTE: it was later reported that 1.4.2 beta and earlier are also affected for vector 1.
|
[] | null | null | null | null | null |
|
CVE-2021-39519
|
An issue was discovered in libjpeg through 2020021. A NULL pointer dereference exists in the function BlockBitmapRequester::PullQData() located in blockbitmaprequester.cpp It allows an attacker to cause Denial of Service.
|
[
"cpe:2.3:a:jpeg:libjpeg:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
CVE-2021-39285
|
A XSS vulnerability exists in Versa Director Release: 16.1R2 Build: S8. An attacker can use the administration web interface URL to create a XSS based attack.
|
[
"cpe:2.3:a:versa-networks:versa_director:16.1r2:build_s8:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2019-1705
|
Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability
|
A vulnerability in the remote access VPN session manager of Cisco Adaptive Security Appliance (ASA) Software could allow a unauthenticated, remote attacker to cause a denial of service (DoS) condition on the remote access VPN services. The vulnerability is due to an issue with the remote access VPN session manager. An attacker could exploit this vulnerability by requesting an excessive number of remote access VPN sessions. An exploit could allow the attacker to cause a DoS condition.
|
[
"cpe:2.3:o:cisco:adaptive_security_appliance_software:*:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506h-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5506w-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5508-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5516-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5525-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5545-x:-:*:*:*:*:*:*:*",
"cpe:2.3:h:cisco:asa_5555-x:-:*:*:*:*:*:*:*"
] | null | null | 5.3 | null | null |
CVE-2021-21216
|
Inappropriate implementation in Autofill in Google Chrome prior to 90.0.4430.72 allowed a remote attacker to spoof security UI via a crafted HTML page.
|
[
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-878w-8w5v-4v3j
|
wu-ftpd 2.6.2 and earlier, with the restricted-gid option enabled, allows local users to bypass access restrictions by changing the permissions to prevent access to their home directory, which causes wu-ftpd to use the root directory instead.
|
[] | null | null | null | null | null |
|
GHSA-pgcq-55gj-r266
|
index2.php in ACGVannu 1.3 and earlier allows remote attackers to change the password or profile of a user via a modified id parameter, related to templates/modif.html. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
GHSA-85p6-fxpj-g69h
|
FreeType before 2.4.9, as used in Mozilla Firefox Mobile before 10.0.4 and other products, allows remote attackers to cause a denial of service (divide-by-zero error) via a crafted font.
|
[] | null | null | null | null | null |
|
CVE-2020-12841
|
ismartgate PRO 1.5.9 is vulnerable to CSRF that allows remote attackers to upload imae files via /index.php
|
[
"cpe:2.3:o:gogogate:ismartgate_pro_firmware:1.5.9:*:*:*:*:*:*:*",
"cpe:2.3:h:gogogate:ismartgate_pro:-:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-q29c-3w39-gpj6
|
Unspecified vulnerability in the chunk_split function in PHP before 5.2.4 has unknown impact and attack vectors, related to an incorrect size calculation.
|
[] | null | null | null | null | null |
|
RHSA-2023:7577
|
Red Hat Security Advisory: firefox security update
|
Mozilla: Out-of-bound memory access in WebGL2 blitFramebuffer Mozilla: Use-after-free in MessagePort::Entangled Mozilla: Clickjacking permission prompts using the fullscreen transition Mozilla: Use-after-free in ReadableByteStreamQueueEntry::Buffer Mozilla: Using Selection API would copy contents into X11 primary selection. Mozilla: Incorrect parsing of relative URLs starting with "///" Mozilla: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5
|
[
"cpe:/a:redhat:rhel_eus:9.2::appstream"
] | null | 8.8 | null | null | null |
GHSA-662q-8mxr-6pg5
|
An unspecified module in Huawei eSpace U1910, U1911, U1930, U1960, U1980, and U1981 unified gateways with software before V200R003C00SPC300 does not properly initialize memory when processing timeout messages, which allows remote attackers to cause a denial of service (out-of-bounds memory access and device restart) via unknown vectors.
|
[] | null | null | null | null | null |
|
CVE-2017-11010
|
In Android before 2018-01-05 on Qualcomm Snapdragon IoT, Snapdragon Mobile MDM9206, MDM9650, SD 210/SD 212/SD 205, SD 625, SD 650/52, SD 835, access control left a configuration space unprotected.
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | null | 9.8 | 10 | null |
|
GHSA-4hwc-qxww-8xr8
|
The WooCommerce Multi Currency plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wmc_bulk_fixed_price function in versions up to, and including, 2.1.17. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to make changes to product prices.
|
[] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.