id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-833m-37f7-jq55
|
Rancher API Server Cross-site Scripting Vulnerability
|
ImpactA vulnerability has been identified in which unauthenticated cross-site scripting (XSS) in the API Server's public API endpoint can be exploited. This can lead to an attacker exploiting the vulnerability to trigger JavaScript code and execute commands remotely.The attack vector was identified as a Reflected XSS.API Server propagates malicious payloads from user input to the UI, which renders the output. For example, a malicious URL gets rendered into a script that is executed on a page.The changes addressed by this fix are:Encode input that comes from the request URL before adding it to the response.The request input is escaped by changing the URL construction that is used for links to use `url.URL`.The request input is escaped by escaping the JavaScript and CSS variables with attribute encoding as defined by [OWASP](https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html#output-encoding-rules-summary).PatchesPatched versions include the following commits:| Branch | Commit |
| -------- | ------- |
| master | 4fd7d82 |
| release/v2.8 | 69b3c2b |
| release/v2.8.s3 | a3b9e37 |
| release/v2.7 | 4e102cf |
| release/v2.7.s3 | 97a10a3 |
| release/v2.6 | 4df268e |WorkaroundsThere is no direct mitigation besides updating API Server to a patched version.ReferencesIf you have any questions or comments about this advisory:Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security-related inquiries.Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
|
[] | null | 8.3 | null | null | null |
GHSA-6m5v-7jxx-qcf7
|
** DISPUTED ** NOTE: this issue has been disputed by the vendor. Cross-site scripting (XSS) vulnerability in calendar.pl in CalendarScript 3.20 allows remote attackers to inject arbitrary web script or HTML via the template parameter, a different vulnerability than CVE-2005-1146.
|
[] | null | null | null | null | null |
|
CVE-2022-28878
|
Denial-of-Service (DoS) Vulnerability
|
A Denial-of-Service vulnerability was discovered in the F-Secure Atlant and in certain WithSecure products while scanning fuzzed APK file it is possible that can crash the scanning engine.
|
[
"cpe:2.3:a:f-secure:elements_endpoint_protection:-:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:atlant:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:cloud_protection_for_salesforce:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:elements_collaboration_protection:-:*:*:*:*:*:*:*",
"cpe:2.3:a:f-secure:internet_gatekeeper:-:*:*:*:*:-:*:*",
"cpe:2.3:a:f-secure:linux_security:-:*:*:*:*:*:x86:*",
"cpe:2.3:a:f-secure:linux_security_64:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | null | null |
GHSA-jx87-v687-vhj7
|
Vulnerability in the Java Advanced Management Console component of Oracle Java SE (subcomponent: Server). The supported version that is affected is Java Advanced Management Console: 2.7. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java Advanced Management Console. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java Advanced Management Console accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | null | 3.7 | null | null |
|
CVE-2021-21286
|
Authorization Bypass in AVideo Platform
|
AVideo Platform is an open-source Audio and Video platform. It is similar to a self-hosted YouTube. In AVideo Platform before version 10.2 there is an authorization bypass vulnerability which enables an ordinary user to get admin control. This is fixed in version 10.2. All queries now remove the pass hash and the recoverPass hash.
|
[
"cpe:2.3:a:wwbn:avideo:*:*:*:*:*:*:*:*"
] | null | 7.7 | null | null | null |
CVE-2022-20435
|
There is a Unauthorized service in the system service, may cause the system reboot. Since the component does not have permission check and permission protection, resulting in EoP problem.Product: AndroidVersions: Android SoCAndroid ID: A-242248367
|
[
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
|
CVE-2015-2854
|
The WebUI component in Blue Coat SSL Visibility Appliance SV800, SV1800, SV2800, and SV3800 3.6.x through 3.8.x before 3.8.4 does not send a restrictive X-Frame-Options HTTP header, which allows remote attackers to conduct clickjacking attacks via vectors involving an IFRAME element.
|
[
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv1800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv1800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv2800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv2800:-:*:*:*:*:*:*:*",
"cpe:2.3:o:blue_coat:ssl_visibility_appliance_sv3800_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:blue_coat:ssl_visibility_appliance_sv3800:-:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2024-28040
|
Delta Electronics DIAEnergie SQL injection
|
SQL injection vulnerability exists in GetDIAE_astListParameters.
|
[
"cpe:2.3:a:deltaww:diaenergie:-:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
GHSA-gxxw-c8mr-4h43
|
Cross-Site Request Forgery (CSRF) vulnerability in wpWax Legal Pages – Privacy Policy, Terms & Conditions, GDPR, CCPA, and Cookie Notice Generator plugin <= 1.3.8 versions.
|
[] | null | 5.4 | null | null | null |
|
GHSA-8936-44gw-7664
|
TripleO Heat templates might allow remote attackers to obtain sensitive information from private containers
|
The TripleO Heat templates (tripleo-heat-templates) do not properly order the Identity Service (keystone) before the OpenStack Object Storage (Swift) staticweb middleware in the swiftproxy pipeline when the staticweb middleware is enabled, which might allow remote attackers to obtain sensitive information from private containers via unspecified vectors.
|
[] | 8.7 | null | 7.5 | null | null |
GHSA-hpp7-x4c7-r2pf
|
The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions.
|
[] | null | null | null | null | null |
|
CVE-2005-2972
|
Multiple stack-based buffer overflows in the RTF import feature in AbiWord before 2.2.11 allow user-assisted attackers to execute arbitrary code via an RTF file with long identifiers, which are not properly handled in the (1) ParseLevelText, (2) getCharsInsideBrace, (3) HandleLists, (4) or (5) HandleAbiLists functions in ie_imp_RTF.cpp, a different vulnerability than CVE-2005-2964.
|
[
"cpe:2.3:a:abisource:community_abiword:*:*:*:*:*:*:*:*"
] | null | null | null | 5.1 | null |
|
CVE-2018-19748
|
app/plug/attachment/controller/admincontroller.php in SDCMS 1.6 allows reading arbitrary files via a /?m=plug&c=admin&a=index&p=attachment&root= directory traversal. The value of the root parameter must be base64 encoded (note that base64 encoding, instead of URL encoding, is very rare in a directory traversal attack vector).
|
[
"cpe:2.3:a:sdcms:sdcms:1.6:*:*:*:*:*:*:*"
] | null | null | 7.5 | 5 | null |
|
GHSA-rwmv-5cg5-mg3g
|
WebKit, as used in Apple iOS before 5.1 and iTunes before 10.6, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-03-07-1 and APPLE-SA-2012-03-07-2.
|
[] | null | null | null | null | null |
|
CVE-2023-25837
|
BUG-000133088 - ArcGIS Enterprise site builder is subject to stored XSS.
|
There is a Cross-site Scripting vulnerability in Esri ArcGIS Enterprise Sites versions 10.9 and below that may allow a remote, authenticated attacker to create a crafted link which when clicked by a victim could potentially execute arbitrary JavaScript code in the target's browser. The privileges required to execute this attack are high.
The impact to Confidentiality, Integrity and Availability are High.
|
[
"cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | null | null |
GHSA-wmv6-5m97-cfc8
|
VMware AirWatch Console (AWC) contains a Broken Access Control vulnerability. Successful exploitation of this issue could result in end-user device details being disclosed to an unauthorized administrator.
|
[] | null | 4.9 | null | null | null |
|
CVE-2020-5206
|
Authentication Bypass For Endpoints With Anonymous Access in OpenCast
|
In Opencast before 7.6 and 8.1, using a remember-me cookie with an arbitrary username can cause Opencast to assume proper authentication for that user even if the remember-me cookie was incorrect given that the attacked endpoint also allows anonymous access. This way, an attacker can, for example, fake a remember-me token, assume the identity of the global system administrator and request non-public content from the search service without ever providing any proper authentication. This problem is fixed in Opencast 7.6 and Opencast 8.1
|
[
"cpe:2.3:a:apereo:opencast:*:*:*:*:*:*:*:*",
"cpe:2.3:a:apereo:opencast:8.0:*:*:*:*:*:*:*"
] | null | 8.7 | null | null | null |
CVE-2017-16709
|
Crestron Airmedia AM-100 devices with firmware before 1.6.0 and AM-101 devices with firmware before 2.7.0 allows remote authenticated administrators to execute arbitrary code via unspecified vectors.
|
[
"cpe:2.3:o:crestron:airmedia_am-100_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:airmedia_am-100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:crestron:airmedia_am-101_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:crestron:airmedia_am-101:-:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
GHSA-cgh7-pqvh-vh2m
|
In network service, there is a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed
|
[] | null | 7.8 | null | null | null |
|
GHSA-v35j-8jpj-jph4
|
Adobe Experience Manager versions 6.5.22 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable field.
|
[] | null | 5.4 | null | null | null |
|
RHSA-2025:11352
|
Red Hat Security Advisory: OpenShift Container Platform 4.15.55 packages and security update
|
net/http: Request smuggling due to acceptance of invalid chunked data in net/http
|
[
"cpe:/a:redhat:openshift:4.15::el8",
"cpe:/a:redhat:openshift:4.15::el9"
] | null | 5.4 | null | null | null |
CVE-2019-10632
|
A directory traversal vulnerability in the file browser component on the Zyxel NAS 326 version 5.21 and below allows a lower privileged user to change the location of any other user's files.
|
[
"cpe:2.3:o:zyxel:nas326_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:zyxel:nas326:-:*:*:*:*:*:*:*"
] | null | null | 6.5 | 4 | null |
|
CVE-2017-2908
|
An exploitable integer overflow exists in the thumbnail functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted .blend file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to render the thumbnail for the file while in the File->Open dialog.
|
[
"cpe:2.3:a:blender:blender:2.78c:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | null | 7.5 | null | null |
|
CVE-2021-37348
|
Nagios XI before version 5.8.5 is vulnerable to local file inclusion through improper limitation of a pathname in index.php.
|
[
"cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
GHSA-hqfr-fqq8-v557
|
Integer overflow may occur if atom size is less than atom offset as there is improper validation of atom size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8053, APQ8096AU, APQ8098, Kamorta, MDM9206, MDM9207C, MDM9607, MSM8905, MSM8909W, MSM8917, MSM8953, MSM8996AU, MSM8998, QCA6574AU, QCM2150, QCS405, QCS605, QM215, Rennell, SA6155P, Saipan, SDA660, SDM429, SDM429W, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM845, SDX20, SM6150, SM7150, SM8150, SM8250, SXR2130
|
[] | null | null | null | null | null |
|
GHSA-w6mg-vrx4-r5j4
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Scott Reilly Post-to-Post Links allows Stored XSS.This issue affects Post-to-Post Links: from n/a through 4.2.
|
[] | null | 5.9 | null | null | null |
|
GHSA-6pch-hq5w-rg79
|
An issue was discovered in Bento4 1.5.1-627. There is a memory leak in AP4_StdcFileByteStream::Create in System/StdC/Ap4StdCFileByteStream.cpp, as demonstrated by mp42hls.
|
[] | null | null | 6.5 | null | null |
|
GHSA-cm43-gx9p-f86r
|
Insufficient password protection in the attestation database for Open CIT may allow an authenticated user to potentially enable information disclosure via local access.
|
[] | null | 4.4 | null | null | null |
|
GHSA-fr2r-x4wp-q45h
|
Cross-Site Request Forgery (CSRF) vulnerability in Ali2Woo Ali2Woo Lite.This issue affects Ali2Woo Lite: from n/a through 3.3.5.
|
[] | null | 8.3 | null | null | null |
|
GHSA-h33p-8rhr-9j7h
|
Directory traversal vulnerability in down.php in netForo! 0.1g allows remote attackers to read arbitrary files via a .. (dot dot) in the file_to_download parameter.
|
[] | null | null | null | null | null |
|
CVE-2020-2291
|
Jenkins couchdb-statistics Plugin 0.3 and earlier stores its server password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
|
[
"cpe:2.3:a:jenkins:couchdb-statistics:*:*:*:*:*:jenkins:*:*"
] | null | 3.3 | null | 2.1 | null |
|
CVE-2014-4493
|
The app-installation functionality in MobileInstallation in Apple iOS before 8.1.3 allows attackers to obtain control of the local app container by leveraging access to an enterprise distribution certificate for signing a crafted app.
|
[
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-fgmg-5gqp-9428
|
The Akuvox E11 web server backend library allows command injection in the device phone-book contacts functionality. This could allow an attacker to upload files with executable command instructions.
|
[] | null | 8.8 | null | null | null |
|
CVE-2020-7045
|
In Wireshark 3.0.x before 3.0.8, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by validating opcodes.
|
[
"cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] | null | 6.5 | null | 3.3 | null |
|
GHSA-m7rv-xwhq-qx85
|
In the Linux kernel, the following vulnerability has been resolved:s390/ism: add release function for struct deviceAccording to device_release() in /drivers/base/core.c,
a device without a release function is a broken device
and must be fixed.The current code directly frees the device after calling device_add()
without waiting for other kernel parts to release their references.
Thus, a reference could still be held to a struct device,
e.g., by sysfs, leading to potential use-after-free
issues if a proper release function is not set.
|
[] | null | 7.8 | null | null | null |
|
GHSA-mx8c-2rv5-gr54
|
SQL injection vulnerability in index.php in Gerrit van Aaken Loudblog 0.5 and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
|
[] | null | null | null | null | null |
|
GHSA-qp75-7qjq-q8m4
|
In PackageManager, there is a missing permission check. This could lead to local information disclosure across users with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-153996872
|
[] | null | null | null | null | null |
|
GHSA-qcm9-87fm-rgpf
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Roles). Supported versions that are affected are 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | 2.7 | null | null | null |
|
GHSA-jpxf-7694-4wcf
|
ELECOM LAN routers (WRC-2533GST2 firmware versions prior to v1.14, WRC-1900GST2 firmware versions prior to v1.14, WRC-1750GST2 firmware versions prior to v1.14, and WRC-1167GST2 firmware versions prior to v1.10) allow an attacker on the same network segment to execute arbitrary OS commands with a root privilege via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2025-8467
|
code-projects Wazifa System regcontrol.php sql injection
|
A vulnerability was found in code-projects Wazifa System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /controllers/regcontrol.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
CVE-2018-17856
|
An issue was discovered in Joomla! before 3.8.13. com_joomlaupdate allows the execution of arbitrary code. The default ACL config enabled the ability of Administrator-level users to access com_joomlaupdate and trigger code execution.
|
[
"cpe:2.3:a:joomla:joomla\\!:*:*:*:*:*:*:*:*"
] | null | null | 7.2 | 6.5 | null |
|
CVE-2024-54253
|
WordPress Xpro Addons For Elementor plugin <= 1.4.6.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xpro Xpro Elementor Addons allows Stored XSS.This issue affects Xpro Elementor Addons: from n/a through 1.4.6.1.
|
[] | null | 6.5 | null | null | null |
CVE-2023-5217
|
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[
"cpe:2.3:a:webmproject:libvpx:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:116.0.1938.98:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge:117.0.2045.47:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:116.0.5845.229:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:edge_chromium:117.0.5938.132:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:android:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:ipad_os:16.7:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:16.7:*:*:*:*:*:*:*",
"cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"
] | null | 8.8 | null | null | null |
|
CVE-2023-38399
|
WordPress Phlox Portfolio plugin <= 2.3.1 - Unauthenticated Local File Inclusion vulnerability
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Averta Phlox Portfolio allows PHP Local File Inclusion.This issue affects Phlox Portfolio: from n/a through 2.3.1.
|
[] | null | 8.6 | null | null | null |
GHSA-j4j6-xqv7-cqrg
|
Cross-Site Request Forgery (CSRF) vulnerability in Manish Kumar Agarwal Change Table Prefix.This issue affects Change Table Prefix: from n/a through 2.0.
|
[] | null | 4.3 | null | null | null |
|
CVE-2010-3040
|
Multiple stack-based buffer overflows in agent.exe in Setup Manager in Cisco Intelligent Contact Manager (ICM) before 7.0 allow remote attackers to execute arbitrary code via a long parameter in a (1) HandleUpgradeAll, (2) AgentUpgrade, (3) HandleQueryNodeInfoReq, or (4) HandleUpgradeTrace TCP packet, aka Bug IDs CSCti45698, CSCti45715, CSCti45726, and CSCti46164.
|
[
"cpe:2.3:a:cisco:intelligent_contact_manager:*:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr11:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr12:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)_sr13:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:5.0\\(0\\)a:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\):*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr1:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr2:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr3:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr4:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr5:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr6:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr7:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr8:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr9:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)_sr10:*:*:*:*:*:*:*",
"cpe:2.3:a:cisco:intelligent_contact_manager:6.0\\(0\\)a:*:*:*:*:*:*:*"
] | null | null | null | 10 | null |
|
GHSA-7659-433m-4fhx
|
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
|
[] | null | 9.8 | null | null | null |
|
GHSA-rrj7-vm9h-37rx
|
SQL injection vulnerability in forum.asp in AliveSites Forums 2.0 allows remote attackers to execute arbitrary SQL commands via the forum_id parameter.
|
[] | null | null | null | null | null |
|
GHSA-jcj8-v5jp-chf6
|
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority because it is Unused
|
[] | null | null | null | null | null |
|
RHSA-2020:4649
|
Red Hat Security Advisory: evolution security and bug fix update
|
evolution-data-server: Response injection via STARTTLS in SMTP and POP3
|
[
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/a:redhat:enterprise_linux:8::crb"
] | null | 5.3 | null | null | null |
ICSA-22-349-11
|
Siemens SIPROTEC 5 Devices
|
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address to overflow four attacker-controlled bytes on the stack. This buffer overflow could result in a crash (causing a denial of service) or potentially remote code execution. Many platforms implement stack overflow protections which would mitigate against the risk of remote code execution. The risk may be further mitigated based on stack layout for any given platform/compiler. Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH. Users are still encouraged to upgrade to a new version as soon as possible. In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6). A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).
|
[] | null | 7.5 | null | null | null |
CVE-2024-12450
|
RCE, Full Read SSRF, and Arbitrary File Read in infiniflow/ragflow
|
In infiniflow/ragflow versions 0.12.0, the `web_crawl` function in `document_app.py` contains multiple vulnerabilities. The function does not filter URL parameters, allowing attackers to exploit Full Read SSRF by accessing internal network addresses and viewing their content through the generated PDF files. Additionally, the lack of restrictions on the file protocol enables Arbitrary File Read, allowing attackers to read server files. Furthermore, the use of an outdated Chromium headless version with --no-sandbox mode enabled makes the application susceptible to Remote Code Execution (RCE) via known Chromium v8 vulnerabilities. These issues are resolved in version 0.14.0.
|
[] | null | null | 6.5 | null | null |
ICSA-22-284-03
|
Sensormatic Electronics C-CURE 9000
|
Sensormatic Electronics C•CURE 9000, version 2.90 and prior, provides responses to incoming requests that could reveal internal state information to an unauthorized user.CVE-2021-36201 has been assigned to this vulnerability. A CVSS v3 base score of 4.3 has been calculated; the CVSS vector string is (AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[] | null | null | 4.3 | null | null |
GHSA-r8rv-w7g7-rvh2
|
Certain NETGEAR devices are affected by a stack-based buffer overflow by an authenticated user. This affects R6400 before 1.0.1.70, R7000 before 1.0.11.126, R7900 before 1.0.4.46, R7900P before 1.4.2.84, R7960P before 1.4.2.84, R8000 before 1.0.4.74, R8000P before 1.4.2.84, RAX200 before 1.0.4.120, RS400 before 1.5.1.80, R6400v2 before 1.0.4.118, R7000P before 1.3.3.140, RAX80 before 1.0.4.120, R6700v3 before 1.0.4.118, R6900P before 1.3.3.140, and RAX75 before 1.0.4.120.
|
[] | null | null | null | null | null |
|
GHSA-56w8-jpp8-hv9x
|
In camera driver, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05862973; Issue ID: ALPS05862973.
|
[] | null | null | null | null | null |
|
CVE-2019-3951
|
Advantech WebAccess before 8.4.3 allows unauthenticated remote attackers to execute arbitrary code or cause a denial of service (memory corruption) due to a stack-based buffer overflow when handling IOCTL 70533 RPC messages.
|
[
"cpe:2.3:a:advantech:webaccess:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
CVE-2022-43497
|
Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script. The developer also provides new patched releases for all versions since 3.7.
|
[
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-9hhv-465g-qx73
|
An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.
|
[] | null | 6.5 | null | null | null |
|
CVE-2007-0290
|
Multiple unspecified vulnerabilities in Oracle E-Business Suite and Applications 11.5.10CU2 have unknown impact and attack vectors related to (1) Application Object Library (APPS01), (2) Human Resources (APPS03), (3) Payables (APPS04), (4) Trading Community Architecture (APPS05), and (5) Web Applications Desktop Integrator (APPS06).
|
[
"cpe:2.3:a:oracle:e-business_suite:11.5.10.2:*:*:*:*:*:*:*"
] | null | null | null | 5.5 | null |
|
CVE-2012-5872
|
ARC (aka ARC2) through 2011-12-01 allows blind SQL Injection in getTriplePatternSQL in ARC2_StoreSelectQueryHandler.php via comments in a SPARQL WHERE clause.
|
[
"cpe:2.3:a:arc2_project:arc2:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
CVE-2006-4026
|
PHP remote file inclusion vulnerability in SAPID CMS 123 rc3 allows remote attackers to execute arbitrary PHP code via a URL in the (1) root_path parameter in usr/extensions/get_infochannel.inc.php and the (2) GLOBALS["root_path"] parameter in usr/extensions/get_tree.inc.php.
|
[
"cpe:2.3:a:redgraphic:sapid_cms:1.2.3:rc3:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-64q7-7v79-hm2j
|
InDesign Desktop versions ID19.5, ID18.5.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
|
[] | null | 5.5 | null | null | null |
|
GHSA-75fp-8ppm-52m2
|
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a security bypass vulnerability. Successful exploitation could lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2016-3023
|
IBM Security Access Manager for Web could allow an unauthenticated user to gain access to sensitive information by entering invalid file names.
|
[
"cpe:2.3:o:ibm:security_access_manager_9.0_firmware:9.0.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_9.0_firmware:9.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_9.0_firmware:9.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.10:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.12:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.16:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_mobile_appliance:8.0:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_web_appliance:7.0:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:security_access_manager_for_web_appliance:8.0:*:*:*:*:*:*:*"
] | null | null | 5.3 | 5 | null |
|
CVE-2023-37558
|
CODESYS Improper Validation of Consistency within Input in multiple products
|
After successful authentication as a user in multiple Codesys products in multiple versions, specific crafted network communication requests with inconsistent content can cause the CmpAppForce component to read internally from an invalid address, potentially leading to a denial-of-service condition. This vulnerability is different to CVE-2023-37559
|
[
"cpe:2.3:a:codesys:control_for_beaglebone_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_empc-a\\/imx6_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_iot2000_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_linux_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc100_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc200_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_plcnext_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_raspberry_pi_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_wago_touch_panels_600_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte_sl_\\(for_beckhoff_cx\\):*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_win_sl:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:development_system:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:safety_sil2:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | null | null |
GHSA-h2f7-g9rh-rr7g
|
When an authenticated password change request takes place, this vulnerability could allow the attacker to intercept the message that includes the legitimate, new password hash and replace it with an illegitimate hash. The user would no longer be able to authenticate to the controller (Micro800: All versions, MicroLogix 1400: Version 21 and later) causing a denial-of-service condition
|
[] | null | 7.5 | null | null | null |
|
GHSA-qgg8-h57v-vvhp
|
Cross-Site Request Forgery (CSRF) vulnerability in kornelly Translator allows Stored XSS. This issue affects Translator: from n/a through 0.3.
|
[] | null | 7.1 | null | null | null |
|
CVE-2014-0914
|
Cross-site scripting (XSS) vulnerability in IBM Maximo Asset Management 6.2 through 6.2.8 and 6.x and 7.x through 7.5.0.6, Maximo Asset Management 7.5 through 7.5.0.3 and 7.5.1 through 7.5.1.2 for SmartCloud Control Desk, and Maximo Asset Management 6.2 through 6.2.8 for Tivoli IT Asset Management for IT and Maximo Service Desk allows remote authenticated users to inject arbitrary web script or HTML via the Query Description Field.
|
[
"cpe:2.3:a:ibm:maximo_asset_management:6.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:6.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management:7.5.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:6.2.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_asset_management_essentials:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_government:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_life_sciences:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_nuclear_power:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_oil_and_gas:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_transportation:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_for_utilities:7.5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:maximo_service_desk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:smartcloud_control_desk:7.5.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:tivoli_it_asset_management_for_it:*:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2020-26802
|
forma.lms 2.3.0.2 is affected by Cross Site Request Forgery (CSRF) in formalms/appCore/index.php?r=lms/profile/show&ap=saveinfo via a GET request to change the admin email address in order to accomplish an account takeover.
|
[
"cpe:2.3:a:formalms:formalms:2.3.0.2:*:*:*:*:*:*:*"
] | null | 8.8 | null | 6.8 | null |
|
GHSA-fq59-5j2w-fw9q
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 13, iTunes for Windows 12.10.1, iCloud for Windows 10.7, iCloud for Windows 7.14. Processing maliciously crafted web content may lead to arbitrary code execution.
|
[] | null | null | null | null | null |
|
CVE-2021-25376
|
An improper synchronization logic in Samsung Email prior to version 6.1.41.0 can leak messages in certain mailbox in plain text when STARTTLS negotiation is failed.
|
[
"cpe:2.3:a:samsung:email:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
|
CVE-2022-35762
|
Storage Spaces Direct Elevation of Privilege Vulnerability
|
Storage Spaces Direct Elevation of Privilege Vulnerability
|
[
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:20h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h1:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:21h2:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | null | null |
RHSA-2022:7185
|
Red Hat Security Advisory: device-mapper-multipath security update
|
device-mapper-multipath: Authorization bypass, multipathd daemon listens for client connections on an abstract Unix socket
|
[
"cpe:/a:redhat:enterprise_linux:9::crb",
"cpe:/o:redhat:enterprise_linux:9::baseos"
] | null | 7.8 | null | null | null |
CVE-2024-7269
|
Stored XSS in ConnX ESP HR Management
|
Improper Neutralization of Input During Web Page Generation vulnerability in "Update of Personal Details" form in ConnX ESP HR Management allows Stored XSS attack. An attacker might inject a script to be run in user's browser. After multiple attempts to contact the vendor we did not receive any answer. The finder provided the information that this issue affects ESP HR Management versions before 6.6.
|
[
"cpe:2.3:a:connx:esp_hr_management:*:*:*:*:*:*:*:*"
] | 8.7 | null | null | null | null |
CVE-2016-10272
|
LibTIFF 4.0.7 allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted TIFF image, related to "WRITE of size 2048" and libtiff/tif_next.c:64:9.
|
[
"cpe:2.3:a:libtiff:libtiff:4.0.7:*:*:*:*:*:*:*"
] | null | null | 7.8 | 6.8 | null |
|
CVE-2022-0249
|
A vulnerability was discovered in GitLab starting with version 12. GitLab was vulnerable to a blind SSRF attack since requests to shared address space were not blocked.
|
[
"cpe:2.3:a:gitlab:gitlab:*:*:*:*:*:*:*:*"
] | null | 3.1 | null | null | null |
|
GHSA-7v94-mgqj-cj58
|
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
|
[] | null | 6.5 | null | null | null |
|
GHSA-xcmv-jv24-jp7p
|
The video functionality in Google Chrome before 10.0.648.127 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger use of a malformed "out-of-bounds structure."
|
[] | null | null | null | null | null |
|
CVE-2023-41163
|
A Reflected Cross-site scripting (XSS) vulnerability in the file manager tab in Usermin 2.000 allows remote attackers to inject arbitrary web script or HTML via the replace in results field while replacing the results under the tools drop down.
|
[
"cpe:2.3:a:webmin:webmin:2.000:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
CVE-2021-38151
|
index.php/appointment/todos in Chikitsa Patient Management System 2.0.0 allows XSS.
|
[
"cpe:2.3:a:chikitsa:patient_management_system:2.0.0:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
GHSA-cqpc-c229-h8hr
|
An insufficient entropy vulnerability caused by the improper use of randomness sources with low entropy for RSA key pair generation was found in Zyxel GS1900 series firmware versions prior to V2.70. This vulnerability could allow an unauthenticated attacker to retrieve a private key by factoring the RSA modulus N in the certificate of the web administration interface.
|
[] | null | 5.9 | null | null | null |
|
CVE-2023-2323
|
Cross-site Scripting (XSS) - Stored in pimcore/pimcore
|
Cross-site Scripting (XSS) - Stored in GitHub repository pimcore/pimcore prior to 10.5.21.
|
[
"cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*"
] | null | null | 6.8 | null | null |
CVE-2023-33798
|
A stored cross-site scripting (XSS) vulnerability in the Create Rack (/dcim/rack/) function of Netbox v3.5.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field.
|
[
"cpe:2.3:a:netbox:netbox:3.5.1:*:*:*:*:*:*:*"
] | null | 5.4 | null | null | null |
|
GHSA-m39x-pwc9-4whq
|
SAP BusinessObjects Business Intelligence Platform (Crystal Reports) - versions 420, 430, allows an unauthenticated attacker to exploit missing XML validations at endpoints to read sensitive data. These endpoints are normally exposed over the network and successful exploitation can enable the attacker to retrieve arbitrary files from the server.
|
[] | null | null | null | null | null |
|
CVE-2020-15651
|
A unicode RTL order character in the downloaded file name can be used to change the file's name during the download UI flow to change the file extension. This vulnerability affects Firefox for iOS < 28.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*"
] | null | 4.3 | null | 4.3 | null |
|
CVE-2009-4807
|
Multiple SQL injection vulnerabilities in Graugon PHP Article Publisher 1.0 allow remote attackers to execute arbitrary SQL commands via the (1) c parameter to index.php and the (2) id parameter to view.php.
|
[
"cpe:2.3:a:graugon:php_article_publisher:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
CVE-2024-32418
|
An issue in flusity CMS v2.33 allows a remote attacker to execute arbitrary code via the add_addon.php component.
|
[
"cpe:2.3:a:flusity:flusity:2.33:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
|
GHSA-3xrc-gcq8-ccw2
|
Blue Coat ProxySG before SGOS 4.3.4.1, 5.x before SGOS 5.4.5.1, 5.5 before SGOS 5.5.4.1, and 6.x before SGOS 6.1.1.1 allows remote authenticated users to execute arbitrary CLI commands by leveraging read-only administrator privileges and establishing an HTTPS session.
|
[] | null | null | null | null | null |
|
GHSA-mvf6-9crp-c4ff
|
The Edit Limit module 7.x-1.x before 7.x-1.3 for Drupal does not properly restrict access to comments, which allows remote authenticated users with the "edit comments" permission to edit arbitrary comments of other users via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-4vqv-557v-3cwq
|
Cross-site scripting (XSS) vulnerability in ISpeakAdapter in the Integration Repository in the SAP Exchange Infrastructure (BC-XI) component 3.0, 7.00 through 7.02, and 7.10 through 7.11 for SAP NetWeaver allows remote attackers to inject arbitrary web script or HTML via vectors related to PIP.
|
[] | null | null | null | null | null |
|
RHSA-2021:0833
|
Red Hat Security Advisory: OpenShift Container Platform 3.11.404 security and bug fix update
|
golang-github-gorilla-websocket: integer overflow leads to denial of service
|
[
"cpe:/a:redhat:openshift:3.11::el7"
] | null | 7.5 | null | null | null |
GHSA-p2c3-w8wg-6jfm
|
Untrusted search path vulnerability in QtWeb Browser 3.3 build 043 allows local users to gain privileges via a Trojan horse wintab32.dll file in the current working directory, as demonstrated by a directory that contains a .html, .htm, or .mhtml file. NOTE: some of these details are obtained from third party information.
|
[] | null | null | null | null | null |
|
CVE-2025-9468
|
itsourcecode Apartment Management System add_bill.php sql injection
|
A security vulnerability has been detected in itsourcecode Apartment Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /bill/add_bill.php. Such manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.
|
[] | 6.9 | 7.3 | 7.3 | 7.5 | null |
GHSA-8hm9-jrgc-pmmv
|
This issue was addressed with improved entitlements. This issue is fixed in macOS Big Sur 11.3, Security Update 2021-002 Catalina. A malicious application with root privileges may be able to access private information.
|
[] | null | 4.4 | null | null | null |
|
CVE-2023-48254
|
The vulnerability allows a remote attacker to inject and execute arbitrary client-side script code inside a victim’s session via a crafted URL or HTTP request.
|
[
"cpe:2.3:o:bosch:nexo-os:*:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v-b_\\(0608842012\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa011s-36v_\\(0608842011\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v-b_\\(0608842006\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa015s-36v_\\(0608842001\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v-b_\\(0608842007\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa030s-36v_\\(0608842002\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v-b_\\(0608842008\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa050s-36v_\\(0608842003\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v-b_\\(0608842014\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxa065s-36v_\\(0608842013\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v-b_\\(0608842010\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxp012qd-36v_\\(0608842005\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v-b_\\(0608842016\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_cordless_nutrunner_nxv012t-36v_\\(0608842015\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2272\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2301\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2514\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2515\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2666\\):-:*:*:*:*:*:*:*",
"cpe:2.3:h:bosch:nexo_special_cordless_nutrunner_\\(0608pe2673\\):-:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
CVE-2022-32249
|
Under special integration scenario of SAP Business one and SAP HANA - version 10.0, an attacker can exploit HANA cockpit�s data volume to gain access to highly sensitive information (e.g., high privileged account credentials)
|
[
"cpe:2.3:a:sap:business_one:10.0:*:*:*:*:*:*:*"
] | null | 7.5 | null | 5 | null |
|
CVE-2025-32709
|
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
|
Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally.
|
[] | null | 7.8 | null | null | null |
CVE-2012-4349
|
Unquoted Windows search path vulnerability in Symantec Network Access Control (SNAC) 12.1 before RU2 allows local users to gain privileges via unspecified vectors.
|
[
"cpe:2.3:a:symantec:network_access_control:12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:12.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:network_access_control:12.1.1.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 | null |
|
CVE-2014-4751
|
Cross-site scripting (XSS) vulnerability in IBM Security Access Manager for Mobile 8.0.0.0, 8.0.0.1, and 8.0.0.3 allows remote attackers to inject arbitrary web script or HTML via a crafted URL.
|
[
"cpe:2.3:a:ibm:security_access_manager_for_mobile:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_mobile:8.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_access_manager_for_mobile:8.0.0.3:*:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
RHSA-2024:0154
|
Red Hat Security Advisory: openssl security update
|
openssl: Excessive time spent checking DH keys and parameters OpenSSL: Excessive time spent checking DH q parameter value openssl: Generating excessively long X9.42 DH keys or checking excessively long X9.42 DH keys or parameters may be very slow
|
[
"cpe:/o:redhat:rhel_eus:8.8::baseos"
] | null | 5.3 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.