id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
listlengths
0
5.42k
GHSA-23v8-p364-5gvm
The management interface in F5 BIG-IP 9.4.3 allows remote authenticated users with Resource Manager privileges to inject arbitrary Perl code via unspecified configuration settings related to Perl EP3 with templates, probably triggering static code injection.
[]
CVE-2017-9670
An uninitialized stack variable vulnerability in load_tic_series() in set.c in gnuplot 5.2.rc1 allows an attacker to cause Denial of Service (Segmentation fault and Memory Corruption) or possibly have unspecified other impact when a victim opens a specially crafted file.
[ "cpe:2.3:a:gnuplot_project:gnuplot:5.2:rc1:*:*:*:*:*:*" ]
CVE-2019-12483
An issue was discovered in GPAC 0.7.1. There is a heap-based buffer overflow in the function ReadGF_IPMPX_RemoveToolNotificationListener in odf/ipmpx_code.c in libgpac.a, as demonstrated by MP4Box.
[ "cpe:2.3:a:gpac:gpac:0.7.1:*:*:*:*:*:*:*" ]
GHSA-9xj2-222v-wxm9
The russkoe TB HD (aka com.videotelecom.russkoeHD) application 3.6 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
[]
CVE-2024-11601
Sky Addons for Elementor (Free Templates Library, Live Copy, Animations, Post Grid, Post Carousel, Particles, Sliders, Chart, Blogs) <= 2.6.1 - Cross-Site Request Forgery to Limited Arbitrary Options Update
The Sky Addons for Elementor (Free Templates Library, Live Copy, Animations, Post Grid, Post Carousel, Particles, Sliders, Chart, Blog, Video Gallery) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.1. This is due to missing or incorrect nonce validation on the save_options() function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Please note this is limited to option values that can be saved as arrays.
[]
CVE-2016-0861
General Electric (GE) Industrial Solutions UPS SNMP/Web Adapter devices with firmware before 4.8 allow remote authenticated users to execute arbitrary commands via unspecified vectors.
[ "cpe:2.3:a:ge:ups_snmp_web_adapter_firmware:*:*:*:*:*:*:*:*" ]
GHSA-gxp8-xpw4-2jg3
Multiple vulnerabilities in the web-based management interface of Cisco Common Services Platform Collector (CSPC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
[]
GHSA-4rf7-f6mv-mgf9
Adobe Illustrator versions 26.0.2 (and earlier) and 25.4.5 (and earlier) are affected by a Use-After-Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
[]
GHSA-38jf-hjrq-x3rc
modules/Users/ForgotPassword.php in vTiger 6.0 before Security Patch 2 allows remote attackers to reset the password for arbitrary users via a request containing the username, password, and confirmPassword parameters.
[]
CVE-2022-24249
A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.
[ "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*" ]
CVE-2011-5083
Unrestricted file upload vulnerability in inc/swf/swfupload.swf in Dotclear 2.3.1 and 2.4.2 allows remote attackers to execute arbitrary code by uploading a file with an executable PHP extension, then accessing it via a direct request to the file in an unspecified directory.
[ "cpe:2.3:a:dotclear:dotclear:2.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:dotclear:dotclear:2.4.2:*:*:*:*:*:*:*" ]
GHSA-9rhm-3vqw-78v4
Unauth. Plugin Settings Change vulnerability in Modula plugin <= 2.6.9 on WordPress.
[]
GHSA-8hrr-q2mr-mvpj
The Chative Live chat and Chatbot plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1. This is due to missing or incorrect nonce validation on the add_chative_widget_action() function. This makes it possible for unauthenticated attackers to change the channel ID or organization ID via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This could lead to redirecting the live chat widget to an attacker-controlled channel.
[]
GHSA-cxw5-5fq3-vwpx
Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Pdfcrowd Save as PDF plugin by Pdfcrowd allows Stored XSS.This issue affects Save as PDF plugin by Pdfcrowd: from n/a through 4.0.0.
[]
GHSA-w8q4-rx6h-6874
Multiple cross-site scripting (XSS) vulnerabilities in Virtual War (aka VWar) 1.6.1 R2 allow remote attackers to inject arbitrary web script or HTML via (1) the Additional Information field to challenge.php, the (2) Additional Information or (3) Contact information field to joinus.php, (4) the War Report field to admin/admin.php in a finishwar action, or (5) the Nick field to profile.php.
[]
GHSA-hv4w-qf5w-5wqc
manage_proj_page.php in Mantis before 1.1.4 allows remote authenticated users to execute arbitrary code via a sort parameter containing PHP sequences, which are processed by create_function within the multi_sort function in core/utility_api.php.
[]
CVE-2023-6707
Use after free in CSS in Google Chrome prior to 120.0.6099.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
CVE-2025-21334
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability
[]
CVE-2014-1729
Multiple unspecified vulnerabilities in Google V8 before 3.24.35.22, as used in Google Chrome before 34.0.1847.116, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*" ]
GHSA-26mf-52p6-23pq
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Information Schema). Supported versions that are affected are 8.0.36 and prior and 8.3.0 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H).
[]
CVE-2024-51866
WordPress Social button plugin <= 1.3 - Stored Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mr. Riponshah Social button allows Stored XSS.This issue affects Social button: from n/a through 1.3.
[]
GHSA-259x-wgj2-g49m
Unspecified vulnerability in Sun Java System Application Server 7 2004Q2 before Update 6, Web Server 6.1 before SP8, and Web Server 7.0 before Update 1 allows remote attackers to obtain source code of JSP files via unknown vectors.
[]
CVE-2019-15052
The HTTP client in Gradle before 5.6 sends authentication credentials originally destined for the configured host. If that host returns a 30x redirect, Gradle also sends those credentials to all subsequent hosts that the request redirects to. This is similar to CVE-2018-1000007.
[ "cpe:2.3:a:gradle:gradle:*:*:*:*:*:*:*:*" ]
CVE-2023-36434
Windows IIS Server Elevation of Privilege Vulnerability
Windows IIS Server Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:x64:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:x86:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
GHSA-7fw6-6mfj-g3q2
ckb: Transaction header_deps validation issue (network forking)
Impactfn `HeaderChecker#check_valid` skipped main chain checking after this PR: https://github.com/nervosnetwork/ckb/pull/1646/files#diff-c4e017b67c1b3005ca0c446a9b0879571aa36a858b1f7ddd1b9328a884e3214bR171-R176It will cause network forking if one transaction is using a forked block header which is not exists in local node's storage.Patches0.101.1 and later versions
[]
CVE-2023-30533
SheetJS Community Edition before 0.19.3 allows Prototype Pollution via a crafted file. In other words. 0.19.2 and earlier are affected, whereas 0.19.3 and later are unaffected.
[ "cpe:2.3:a:sheetjs:sheetjs:*:*:*:*:*:node.js:*:*" ]
CVE-2022-46622
A cross-site scripting (XSS) vulnerability in Judging Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the firstname parameter.
[ "cpe:2.3:a:judging_management_system_project:judging_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-x33q-m927-7mq6
A vulnerability was found in MicroPython up to 1.21.0. It has been classified as critical. Affected is the function slice_indices of the file objslice.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.22.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-249180.
[]
GHSA-xw9h-x6h4-fc8r
The Badgearoo WordPress plugin through 1.0.14 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
[]
CVE-2021-3398
Stormshield Network Security (SNS) 3.x has an Integer Overflow in the high-availability component.
[ "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*" ]
GHSA-hjjx-mmjm-vp9r
A race during concurrent delazification could have led to a use-after-free. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135.
[]
CVE-2024-49677
WordPress Bootstrap Buttons plugin <= 1.2 - Reflected Cross Site Scripting (XSS) vulnerability
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in David Cramer Bootstrap Buttons allows Reflected XSS.This issue affects Bootstrap Buttons: from n/a through 1.2.
[]
CVE-2011-3601
Buffer overflow in the process_ra function in the router advertisement daemon (radvd) before 1.8.2 allows remote attackers to execute arbitrary code or cause a denial of service (crash) via a negative value in a label_len value.
[ "cpe:2.3:a:litech:router_advertisement_daemon:*:*:*:*:*:*:*:*" ]
GHSA-p5x6-4c84-ww2p
snews.php in sNews 1.5.30 and earlier does not properly exit when authentication fails, which allows remote attackers to perform unauthorized administrative actions, as demonstrated by changing an administrative password via the changeup task, and by uploading PHP code via the imagefile parameter.
[]
CVE-2024-7813
SourceCodester Prison Management System Profile Image insufficiently protected credentials
A vulnerability, which was classified as problematic, has been found in SourceCodester Prison Management System 1.0. This issue affects some unknown processing of the file /uploadImage/Profile/ of the component Profile Image Handler. The manipulation leads to insufficiently protected credentials. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
[ "cpe:2.3:a:sourcecodester:prison_management_system:1.0:*:*:*:*:*:*:*", "cpe:2.3:a:prison_management_system_project:prison_management_system:1.0:*:*:*:*:*:*:*" ]
GHSA-rjj4-r4wr-cjq8
A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 16.1, macOS Ventura 13, watchOS 9.1, Safari 16.1, iOS 16.1 and iPadOS 16. Processing maliciously crafted web content may lead to arbitrary code execution.
[]
GHSA-4rpw-vhwc-m57p
An issue was discovered in fs/f2fs/super.c in the Linux kernel through 4.17.3. There is an out-of-bounds read or a divide-by-zero error for an incorrect user_block_count in a corrupted f2fs image, leading to a denial of service (BUG).
[]
CVE-2021-29518
Session operations in eager mode lead to null pointer dereferences
TensorFlow is an end-to-end open source platform for machine learning. In eager mode (default in TF 2.0 and later), session operations are invalid. However, users could still call the raw ops associated with them and trigger a null pointer dereference. The implementation(https://github.com/tensorflow/tensorflow/blob/eebb96c2830d48597d055d247c0e9aebaea94cd5/tensorflow/core/kernels/session_ops.cc#L104) dereferences the session state pointer without checking if it is valid. Thus, in eager mode, `ctx->session_state()` is nullptr and the call of the member function is undefined behavior. The fix will be included in TensorFlow 2.5.0. We will also cherrypick this commit on TensorFlow 2.4.2, TensorFlow 2.3.3, TensorFlow 2.2.3 and TensorFlow 2.1.4, as these are also affected and still in supported range.
[ "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*" ]
GHSA-rm82-8gf2-hpxx
MiniShare 1.3.2 allows remote attackers to cause a denial of service (crash) via a malformed HTTP GET or HEAD request without the proper number of trailing CRLF sequences.
[]
GHSA-4f55-7mx5-m3x8
Adobe Flash Player before 18.0.0.382 and 19.x through 23.x before 23.0.0.185 on Windows and OS X and before 11.2.202.637 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4273, CVE-2016-6982, CVE-2016-6984, CVE-2016-6985, CVE-2016-6986, CVE-2016-6989, and CVE-2016-6990.
[]
GHSA-8vjc-vph9-rg4j
VISAM VBASE version 11.6.0.6 does not neutralize or incorrectly neutralizes user-controllable input before the data is placed in output used as a public-facing webpage.
[]
GHSA-mwhw-p6ch-6frr
A vulnerability, which was classified as critical, has been found in SourceCodester Faculty Evaluation System 1.0. Affected by this issue is some unknown functionality of the file index.php?page=edit_user. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-230150 is the identifier assigned to this vulnerability.
[]
GHSA-qpwg-qxx8-4g59
Via the GUI of the "bestinformed Infoclient", a low-privileged user is by default able to change the server address of the "bestinformed Server" to which this client connects. This is dangerous as the "bestinformed Infoclient" runs with elevated permissions ("nt authority\system"). By changing the server address to a malicious server, or a script simulating a server, the user is able to escalate his privileges by abusing certain features of the "bestinformed Web" server. Those features include:Pushing of malicious update packagesArbitrary Registry Read as "nt authority\system"An attacker is able to escalate his privileges to "nt authority\system" on the Windows client running the "bestinformed Infoclient".This attack is not possible if a custom configuration ("Infoclient.ini") containing the flags "ShowOnTaskbar=false" or "DisabledItems=stPort,stAddress" is deployed.
[]
CVE-2023-35817
DevExpress before 23.1.3 allows AsyncDownloader SSRF.
[]
GHSA-f8x9-gxvg-7838
In all Qualcomm products with Android releases from CAF using the Linux kernel, a kernel fault can occur when doing certain operations on a read-only virtual address in userspace.
[]
CVE-2021-20653
Calsos CSDJ (CSDJ-B 01.08.00 and earlier, CSDJ-H 01.08.00 and earlier, CSDJ-D 01.08.00 and earlier, and CSDJ-A 03.08.00 and earlier) allows remote attackers to bypass access restriction and to obtain unauthorized historical data without access privileges via unspecified vectors.
[ "cpe:2.3:o:nec:csdj-b_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:csdj-b:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:csdj-h_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:csdj-h:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:csdj-d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:csdj-d:-:*:*:*:*:*:*:*", "cpe:2.3:o:nec:csdj-a_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:nec:csdj-a:-:*:*:*:*:*:*:*" ]
GHSA-q7fv-r5c8-cpcg
Buffer overflow in markup.c in the MXit protocol plugin in libpurple in Pidgin before 2.10.5 allows remote attackers to execute arbitrary code via a crafted inline image in a message.
[]
CVE-2022-48334
Widevine Trusted Application (TA) 5.0.0 through 5.1.1 has a drm_verify_keys total_len+file_name_len integer overflow and resultant buffer overflow.
[ "cpe:2.3:a:widevine:trusted_application:*:*:*:*:*:*:*:*" ]
GHSA-x276-chrj-7rcm
SQL injection vulnerability in blog.php in NetArt Media Vlog System 1.1 allows remote attackers to execute arbitrary SQL commands via the note parameter.
[]
CVE-2014-3187
Google Chrome before 37.0.2062.60 and 38.x before 38.0.2125.59 on iOS does not properly restrict processing of (1) facetime:// and (2) facetime-audio:// URLs, which allows remote attackers to obtain video and audio data from a device via a crafted web site.
[ "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.0:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.1:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.2:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.3:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.4:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.5:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.6:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.10:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.11:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.12:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.13:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.14:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.15:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.16:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.17:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.18:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.19:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.20:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.21:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.22:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.23:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.24:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.25:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.26:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.27:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.28:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.29:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.30:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.31:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.32:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.33:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.34:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.35:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.36:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.37:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.39:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.43:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.44:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.45:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.46:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.47:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.48:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.49:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.50:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.51:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.52:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.53:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.54:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.55:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.56:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.57:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:37.0.2062.58:*:*:*:*:*:*:*", "cpe:2.3:a:google:chrome:38.0.2125.7:*:*:*:*:*:*:*", "cpe:2.3:o:apple:iphone_os:-:*:*:*:*:*:*:*" ]
CVE-2023-25944
Uncontrolled search path element in some Intel(R) VCUST Tool software downloaded before February 3nd 2023 may allow an authenticated user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:intel:vcust_tool:*:*:*:*:*:*:*:*" ]
CVE-2012-3282
Unspecified vulnerability on the HP LeftHand Virtual SAN Appliance hydra with software before 10.0 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1468.
[ "cpe:2.3:a:hp:san\\/iq:*:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.1:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:8.5:*:*:*:*:*:*:*", "cpe:2.3:a:hp:san\\/iq:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:hp:lefthand_p4000_virtual_san_appliance:-:*:*:*:*:*:*:*" ]
GHSA-gf85-jmcw-8cmh
IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.19 Interim Fix 7 could allow a remote attacker to bypass security restrictions, caused by a reverse tabnabbing flaw. An attacker could exploit this vulnerability and redirect a vitcim to a phishing site. IBM X-Force ID: 190294.
[]
CVE-2015-4545
EMC Isilon OneFS 7.1 before 7.1.1.8, 7.2.0 before 7.2.0.4, and 7.2.1 before 7.2.1.1 allows remote authenticated administrators to bypass a SmartLock root-login restriction by creating a root account and establishing a login session.
[ "cpe:2.3:o:emc:isilon_onefs:*:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.0.3:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.0.4:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.0.5:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.1.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.2.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.2.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:emc:isilon_onefs:7.2.1.0:*:*:*:*:*:*:*" ]
CVE-2019-10363
Jenkins Configuration as Code Plugin 1.24 and earlier did not reliably identify sensitive values expected to be exported in their encrypted form.
[ "cpe:2.3:a:jenkins:configuration_as_code:*:*:*:*:*:jenkins:*:*" ]
GHSA-p543-jg43-9pm5
Apache Tomcat may be started without proper security settings
Apache Tomcat may be started without proper security settings if errors are encountered while reading the `web.xml` file, which could allow attackers to bypass intended restrictions.
[]
CVE-2018-0612
Cross-site scripting vulnerability in 5000 trillion yen converter v1.0.6 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
[ "cpe:2.3:a:5000_trillion_yen_converter_project:5000_trillion_yen_converter:1.0.6:*:*:*:*:chrome:*:*" ]
CVE-2009-0618
Unspecified vulnerability in the Java agent in Cisco Application Networking Manager (ANM) before 2.0 Update A allows remote attackers to gain privileges, and cause a denial of service (service outage) by stopping processes, or obtain sensitive information by reading configuration files.
[ "cpe:2.3:a:cisco:application_networking_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_networking_manager:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:application_networking_manager:1.2:*:*:*:*:*:*:*" ]
CVE-2016-4316
Multiple cross-site scripting (XSS) vulnerabilities in WSO2 Carbon 4.4.5 allow remote attackers to inject arbitrary web script or HTML via the (1) setName parameter to identity-mgt/challenges-mgt.jsp; the (2) webappType or (3) httpPort parameter to webapp-list/webapp_info.jsp; the (4) dsName or (5) description parameter to ndatasource/newdatasource.jsp; the (6) phase parameter to viewflows/handlers.jsp; or the (7) url parameter to ndatasource/validateconnection-ajaxprocessor.jsp.
[ "cpe:2.3:a:wso2:carbon:4.4.5:*:*:*:*:*:*:*" ]
CVE-2017-16607
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Netgain Enterprise Manager. Authentication is not required to exploit this vulnerability. The specific flaw exists within heapdumps.jsp. The issue results from the lack of proper validation of a user-supplied string before using it to download heap memory dump. An attacker can leverage this in conjunction with other vulnerabilities to disclose sensitive information in the context of the current process. Was ZDI-CAN-4718.
[ "cpe:2.3:a:netgain-systems:enterprise_manager:*:*:*:*:*:*:*:*" ]
GHSA-mm82-783m-xjph
Multiple cross-site scripting (XSS) vulnerabilities in PhpForums.net mcGallery 1.1 allow remote attackers to inject arbitrary web script or HTML via the lang parameter to (1) admin.php, (2) index.php, (3) sess.php, (4) stats.php, (5) detail.php, (6) resize.php, and (7) show.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
[]
CVE-2021-40015
There is a race condition vulnerability in the binder driver subsystem in the kernel.Successful exploitation of this vulnerability may affect kernel stability.
[ "cpe:2.3:o:huawei:emui:10.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:10.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:11.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:*:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:magic_ui:4.0.0:*:*:*:*:*:*:*" ]
GHSA-w4rc-rx25-8m86
Improper Input Validation in Symfony
An issue was discovered in Symfony before 4.2.12 and 4.3.x before 4.3.8. The VarExport component incorrectly escapes strings, allowing some specially crafted ones to escalate to execution of arbitrary PHP code. This is related to symfony/var-exporter.
[]
CVE-2025-49888
WordPress PW WooCommerce On Sale! plugin <= 1.39 - Broken Access Control Vulnerability
Missing Authorization vulnerability in pimwick PW WooCommerce On Sale! allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects PW WooCommerce On Sale!: from n/a through 1.39.
[]
CVE-2024-40989
KVM: arm64: Disassociate vcpus from redistributor region on teardown
In the Linux kernel, the following vulnerability has been resolved: KVM: arm64: Disassociate vcpus from redistributor region on teardown When tearing down a redistributor region, make sure we don't have any dangling pointer to that region stored in a vcpu.
[]
GHSA-w6xp-35mr-rf98
Buffer overflow in uucp in Compaq Tru64/OSF1 3.x allows local users to execute arbitrary code via a long source (-s) command line parameter.
[]
GHSA-4mw2-9w62-mvpx
Cross-site scripting (XSS) vulnerability in the duplicate-detection functionality in Bugzilla 3.7.1, 3.7.2, 3.7.3, and 4.0rc1 allows remote attackers to inject arbitrary web script or HTML via the summary field, related to the DataTable widget in YUI.
[]
GHSA-5jgf-vj7m-2fjg
Insecure Storage of Sensitive Information in GitHub repository chatwoot/chatwoot prior to 2.6.0.
[]
CVE-2024-48787
An issue in Revic Optics Revic Ops (us.revic.revicops) 1.12.5 allows a remote attacker to obtain sensitive information via the firmware update process.
[ "cpe:2.3:o:revic_optics:revic_ops_firmware:1.12.5:*:*:*:*:*:*:*" ]
GHSA-rgw8-cw3p-qv66
In the Linux kernel, the following vulnerability has been resolved:x86/CPU/AMD: Clear virtualized VMLOAD/VMSAVE on Zen4 clientA number of Zen4 client SoCs advertise the ability to use virtualized VMLOAD/VMSAVE, but using these instructions is reported to be a cause of a random host reboot.These instructions aren't intended to be advertised on Zen4 client so clear the capability.
[]
CVE-2017-2680
Specially crafted PROFINET DCP broadcast packets could cause a denial of service condition of affected products on a local Ethernet segment (Layer 2). Human interaction is required to recover the systems. PROFIBUS interfaces are not affected.
[ "cpe:2.3:o:siemens:simatic_cp_343-1_std_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_343-1_std:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_343-1_lean_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_343-1_lean:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_343-1_adv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_343-1_adv:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_443-1_std_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_443-1_std:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_443-1_adv_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_443-1_adv:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_443-1_opc-ua_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_443-1_opc-ua:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cm_1542-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cm_1542-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1542sp-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1542sp-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1542sp-1_irc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1542sp-1_irc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1543sp-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1543sp-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1543-1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1543-1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_rf650r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_rf650r:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_rf680r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_rf680r:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_rf685r_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_rf685r:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1616_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1616:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1604_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1604:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_dk-1616_pn_io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_dk-1616_pn_io:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x200:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x200_irt_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x200_irt:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x300_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x300:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x408_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x408:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_x414_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_x414:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xm400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xm400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_xr500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_xr500:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_w700_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_w700:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_m-800_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_m-800:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:scalance_s615_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:scalance_s615:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:softnet_profinet_io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:softnet_profinet_io_firmware:14:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:softnet_profinet_io:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ie\\/pb-link_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ie\\/pb-link:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ie\\/as-i_link_pn_io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ie\\/as-i_link_pn_io:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_teleservice_adapter_ie_standard_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_teleservice_adapter_ie_standard:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_teleservice_adapter_ie_basic_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_teleservice_adapter_ie_basic:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_teleservice_adapter_ie_advanced_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_teleservice_adapter_ie_advanced_modem:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sitop_psu8600_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sitop_psu8600:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ups1600_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:ups1600_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200al_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200al:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200ecopn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200ecopn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200m:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200mp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200mp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200pro_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200pro:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200s_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200s:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_et_200sp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_et_200sp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:pn\\/pn_coupler_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:pn\\/pn_coupler:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:dk_standard_ethernet_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:dk_standard_ethernet_controller_firmware:4.1.1:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:dk_standard_ethernet_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ek-ertec_200p_pn_io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ek-ertec_200p_pn_io_firmware:4.4.0:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:ek-ertec_200p_pn_io:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ek-ertec_200_pn_io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:ek-ertec_200_pn_io_firmware:4.2.1:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:ek-ertec_200_pn_io:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-200_smart_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-200_smart:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-300_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-300:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-400_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-400:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1200_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1200:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_s7-1500_software_controller_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_s7-1500_software_controller:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_winac_rtx_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_winac_rtx_firmware:2010:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_winac_rtx:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sirius_act_3su1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sirius_act_3su1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sirius_soft_starter_3rw44_pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sirius_soft_starter_3rw44_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sirius_motor_starter_m200d_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sirius_motor_starter_m200d_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simocode_pro_v_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simocode_pro_v_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_dcm_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_dcm_firmware:1.4:-:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_dcm_firmware:1.4:sp1:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_dcm:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_dcp_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_dcp_firmware:1.2:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_dcp:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g110m_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g110m_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_g110m:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g120\\(c\\/p\\/d\\)_w._pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g120\\(c\\/p\\/d\\)_w._pn_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_g120\\(c\\/p\\/d\\)_w._pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g130_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g130_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_g130:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_g150_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_g150:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics__s110_pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics__s110_pn_firmware:4.4:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:_s110_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_s120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_s120_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_s120:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_s150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_s150_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_s150:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_v90_pn_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_v90_pn:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simotion_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simotion_firmware:4.5:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:simotion:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_828d_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_828d_firmware:4.5:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_828d:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_840d_sl_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinumerik_840d_sl_firmware:4.5:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinumerik_840d_sl:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_hmi_comfort_panels:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_hmi_comfort_panels:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_hmi_multi_panels:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_hmi_multi_panels:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_hmi_mobile_panels:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_hmi_mobile_panels:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-1_irc_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-1_irc:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-1_iec_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-1_iec:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-1_dnp3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-1_dnp3:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_dk-1604_pn_io_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_dk-1604_pn_io:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_tdc_cpu555_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_tdc_cpu555:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_tdc_cp51m1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_tdc_cp51m1:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_gh150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_gh150_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_gh150:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_gl150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_gl150_firmware:4.8:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_gl150:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_gm150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_gm150_firmware:4.7:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_gm150:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_sl150_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_sl150_firmware:4.8:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_sl150:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_sm120_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:sinamics_sm120_firmware:4.8:-:*:*:*:*:*:*", "cpe:2.3:h:siemens:sinamics_sm120:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:extension_unit_12_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:extension_unit_12_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:extension_unit_15_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:extension_unit_15_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:extension_unit_19_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:extension_unit_19_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:extension_unit_22_profinet_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:extension_unit_22_profinet:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1242-7_gprs_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1242-7_gprs:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-7_lte\\/us_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-7_lte\\/us:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1243-8_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1243-8:-:*:*:*:*:*:*:*", "cpe:2.3:o:siemens:simatic_cp_1626_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:siemens:simatic_cp_1626:-:*:*:*:*:*:*:*" ]
CVE-2024-28956
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
[]
CVE-2024-10121
wfh45678 Radar Interface authorization
A vulnerability was found in wfh45678 Radar up to 1.0.8 and classified as critical. This issue affects some unknown processing of the component Interface Handler. The manipulation with the input /../ leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This appears not to be a path traversal weakness. The vendor was contacted early about this disclosure but did not respond in any way.
[ "cpe:2.3:a:radar:radar:*:*:*:*:*:*:*:*", "cpe:2.3:a:riskengine:radar:*:*:*:*:*:*:*:*" ]
CVE-2023-32105
WordPress WPPizza Plugin <= 3.17.1 is vulnerable to Cross Site Scripting (XSS)
Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in ollybach WPPizza – A Restaurant Plugin plugin <= 3.17.1 versions.
[ "cpe:2.3:a:wp-pizza:wppizza:*:*:*:*:*:wordpress:*:*" ]
GHSA-g5qj-4p4v-2jhc
Chamilo LMS version 11.x contains an Unserialization vulnerability in the "hash" GET parameter for the api endpoint located at /webservices/api/v2.php that can result in Unauthenticated remote code execution. This attack appear to be exploitable via a simple GET request to the api endpoint. This vulnerability appears to have been fixed in After commit 0de84700648f098c1fbf6b807dee28ec640efe62.
[]
CVE-2022-48293
The Bluetooth module has an OOM vulnerability. Successful exploitation of this vulnerability may affect data confidentiality.
[ "cpe:2.3:o:huawei:emui:11.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:emui:12.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*" ]
CVE-2024-51995
Logic bug in ajax.render.php allows for bypass of 'backOffice' access control in Combodo iTop
Combodo iTop is a web based IT Service Management tool. An attacker can request any `route` we want as long as we specify an `operation` that is allowed. This issue has been addressed in version 3.2.0 by applying the same access control pattern as in `UI.php` to the `ajax.render.php` page which does not allow arbitrary `routes` to be dispatched. All users are advised to upgrade. There are no known workarounds for this vulnerability.
[]
GHSA-mm3v-rh75-phcp
Yearning versions 2.3.1 and 2.3.2 Interstellar GA and 2.3.4 - 2.3.6 Neptune is vulnerable to Directory Traversal.
[]
GHSA-x8v2-5v8v-8ppg
Adobe Flash Player before 18.0.0.366 and 19.x through 22.x before 22.0.0.209 on Windows and OS X and before 11.2.202.632 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4172, CVE-2016-4175, CVE-2016-4179, CVE-2016-4180, CVE-2016-4181, CVE-2016-4182, CVE-2016-4183, CVE-2016-4184, CVE-2016-4185, CVE-2016-4186, CVE-2016-4187, CVE-2016-4188, CVE-2016-4189, CVE-2016-4190, CVE-2016-4217, CVE-2016-4218, CVE-2016-4219, CVE-2016-4220, CVE-2016-4221, CVE-2016-4233, CVE-2016-4234, CVE-2016-4235, CVE-2016-4236, CVE-2016-4237, CVE-2016-4238, CVE-2016-4239, CVE-2016-4240, CVE-2016-4242, CVE-2016-4243, CVE-2016-4244, CVE-2016-4245, and CVE-2016-4246.
[]
GHSA-997j-37h7-mhg9
CSRF vulnerability in Jenkins AWS CodeCommit Trigger Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins AWS CodeCommit Trigger Plugin 3.0.12 and earlier allows attackers to clear the SQS queue.
[]
GHSA-7mr4-xp7p-pcmc
The dsgvoaio_write_log AJAX action of the DSGVO All in one for WP WordPress plugin before 4.0 did not sanitise or escape some POST parameter submitted before outputting them in the Log page in the administrator dashboard (wp-admin/admin.php?page=dsgvoaiofree-show-log). This could allow unauthenticated attackers to gain unauthorised access by using an XSS payload to create a rogue administrator account, which will be trigged when an administrator will view the logs.
[]
GHSA-c757-x88v-x9h6
In libAACdec, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-112662995
[]
CVE-2025-26665
Windows upnphost.dll Elevation of Privilege Vulnerability
Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally.
[]
GHSA-48h3-fm9c-m4p8
Unrestricted file upload vulnerability in the UpLoad feature (lib/plugin/UpLoad.php) in PhpWiki 1.3.11p1 allows remote attackers to upload arbitrary PHP files with a double extension, as demonstrated by .php.3, which is interpreted by Apache as being a valid PHP file.
[]
CVE-2020-15652
By observing the stack trace for JavaScript errors in web workers, it was possible to leak the result of a cross-origin redirect. This applied only to content that can be parsed as script. This vulnerability affects Firefox < 79, Firefox ESR < 68.11, Firefox ESR < 78.1, Thunderbird < 68.11, and Thunderbird < 78.1.
[ "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*", "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*" ]
GHSA-7f94-q32g-r8m7
In the Linux kernel, the following vulnerability has been resolved:f2fs: compress: fix reserve_cblocks counting error when out of spaceWhen a file only needs one direct_node, performing the following operations will cause the file to be unrepairable:unisoc # ./f2fs_io compress test.apk unisoc #df -h | grep dm-48 /dev/block/dm-48 112G 112G 1.2M 100% /dataunisoc # ./f2fs_io release_cblocks test.apk 924 unisoc # df -h | grep dm-48 /dev/block/dm-48 112G 112G 4.8M 100% /dataunisoc # dd if=/dev/random of=file4 bs=1M count=3 3145728 bytes (3.0 M) copied, 0.025 s, 120 M/s unisoc # df -h | grep dm-48 /dev/block/dm-48 112G 112G 1.8M 100% /dataunisoc # ./f2fs_io reserve_cblocks test.apk F2FS_IOC_RESERVE_COMPRESS_BLOCKS failed: No space left on deviceadb reboot unisoc # df -h | grep dm-48 /dev/block/dm-48 112G 112G 11M 100% /data unisoc # ./f2fs_io reserve_cblocks test.apk 0This is because the file has only one direct_node. After returning to -ENOSPC, reserved_blocks += ret will not be executed. As a result, the reserved_blocks at this time is still 0, which is not the real number of reserved blocks. Therefore, fsck cannot be set to repair the file.After this patch, the fsck flag will be set to fix this problem.unisoc # df -h | grep dm-48 /dev/block/dm-48 112G 112G 1.8M 100% /data unisoc # ./f2fs_io reserve_cblocks test.apk F2FS_IOC_RESERVE_COMPRESS_BLOCKS failed: No space left on deviceadb reboot then fsck will be executed unisoc # df -h | grep dm-48 /dev/block/dm-48 112G 112G 11M 100% /data unisoc # ./f2fs_io reserve_cblocks test.apk 924
[]
CVE-2021-31426
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop 16.1.2-49151. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Parallels Tools component. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the kernel on the target guest system. Was ZDI-CAN-12791.
[ "cpe:2.3:a:parallels:parallels_desktop:16.1.2-49151:*:*:*:*:*:*:*" ]
CVE-2017-3346
Vulnerability in the Oracle Marketing component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Marketing. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Marketing, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Marketing accessible data as well as unauthorized update, insert or delete access to some of Oracle Marketing accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts).
[ "cpe:2.3:a:oracle:marketing:12.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.5:*:*:*:*:*:*:*", "cpe:2.3:a:oracle:marketing:12.2.6:*:*:*:*:*:*:*" ]
CVE-2025-23765
WordPress W3SPEEDSTER plugin <= 7.33 - Cross Site Request Forgery (CSRF) vulnerability
Cross-Site Request Forgery (CSRF) vulnerability in W3speedster W3SPEEDSTER allows Cross Site Request Forgery.This issue affects W3SPEEDSTER: from n/a through 7.33.
[]
CVE-2023-22351
Out-of-bounds write in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[ "cpe:2.3:a:ieisystem:uefi_firmware:8.4:*:*:*:*:*:*:*" ]
GHSA-q68x-pcr4-p8cm
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 software. An application crash can occur because of incorrect application-level input validation. The LG ID is LVE-SMP-200018 (July 2020).
[]
GHSA-f8v5-j9xm-582x
Zoom On-Premise Meeting Connector MMR before version 4.8.20220815.130 contains an improper access control vulnerability. As a result, a malicious actor could obtain the audio and video feed of a meeting they were not authorized to join and cause other meeting disruptions.
[]
GHSA-p2m3-5whj-8vxq
Directory Traversal vulnerability in NEXSYS-ONE before v.Rev.15320 allows a remote attacker to obtain sensitive information via a crafted request.
[]
GHSA-w3vw-ccc5-qr8v
Use After Free in Context::start_auth_session
Impact**This issue only applies to applications starting authorization sessions using an explicit initial `nonce`.**When [`Context::start_auth_session`](https://docs.rs/tss-esapi/7.0.1/tss_esapi/struct.Context.html#method.start_auth_session) was called with a `nonce` argument value of `Some(...)`, the nonce pointer passed down through FFI to `Esys_StartAuthSession` would be a dangling pointer, left over from a defunct instance of `TPM2B_NONCE`. This could lead to an incorrect value being used as a nonce, though whether that value is controllable is unclear (so should be assumed as possible). The error became apparent due to changes in v1.61.0 of the Rust compiler.Logs indicating a failure due to this issue (with the 1.61.0 version of the Rust toolchain) look as follows:PatchesThe issue has been patched in versions 6 and 7 of the `tss-esapi` crate. Please update to `7.1.0` or `6.1.2`.WorkaroundsThere is no workaround that achieves the same functionality.ReferencesFor more information on the cause of the issue and the fix, see [this](https://github.com/parallaxsecond/rust-tss-esapi/pull/344) PR.For more details about the `TPM2_StartAuthSession` command see section 11.1 of [the TPM spec, part 3](https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part3_Commands_pub.pdf), and section 19.6.3 of [part 1 of the same spec](https://trustedcomputinggroup.org/wp-content/uploads/TCG_TPM2_r1p59_Part1_Architecture_pub.pdf) for more information regarding session nonces.For more informationIf you have any questions or comments about this advisory:Open an issue or discussion in [our repo](https://github.com/parallaxsecond/rust-tss-esapi)Get in touch on [our Slack channel](https://github.com/parallaxsecond/community#community-channel)
[]
GHSA-6x23-5xx9-c9wx
The Image11::map function in renderer/d3d/d3d11/Image11.cpp in libANGLE, as used in Google Chrome before 46.0.2490.71, mishandles mapping failures after device-lost events, which allows remote attackers to cause a denial of service (invalid read or write) or possibly have unspecified other impact via vectors involving a removed device.
[]
GHSA-2vq8-2cg2-c3hv
Lindy 42633 4-Port USB 2.0 Gigabit Network Server 2.078.000 devices allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
[]
CVE-2023-44120
A vulnerability has been identified in Spectrum Power 7 (All versions < V23Q4). The affected product's sudo configuration permits the local administrative account to execute several entries as root user. This could allow an authenticated local attacker to inject arbitrary code and gain root access.
[ "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*" ]
CVE-2023-20043
A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device.
[ "cpe:2.3:a:cisco:cx_cloud_agent:*:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:cx_cloud_agent:2.2:*:*:*:*:*:*:*" ]
GHSA-34vh-vgvx-pqr7
Adobe Reader and Acrobat before 11.0.17, Acrobat and Acrobat Reader DC Classic before 15.006.30198, and Acrobat and Acrobat Reader DC Continuous before 15.017.20050 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-4192, CVE-2016-4193, CVE-2016-4194, CVE-2016-4195, CVE-2016-4196, CVE-2016-4197, CVE-2016-4198, CVE-2016-4199, CVE-2016-4200, CVE-2016-4201, CVE-2016-4202, CVE-2016-4203, CVE-2016-4204, CVE-2016-4205, CVE-2016-4206, CVE-2016-4207, CVE-2016-4208, CVE-2016-4211, CVE-2016-4212, CVE-2016-4213, CVE-2016-4214, CVE-2016-4250, CVE-2016-4251, CVE-2016-4252, and CVE-2016-4254.
[]
CVE-2022-2561
This vulnerability allows remote attackers to execute arbitrary code on affected installations of OPC Labs QuickOPC 2022.1. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XML files in Connectivity Explorer. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-16596.
[ "cpe:2.3:a:opclabs:quickopc:*:*:*:*:*:*:*:*" ]