id
stringlengths 12
47
| title
stringlengths 0
256
⌀ | description
stringlengths 3
189k
| cpes
listlengths 0
5.42k
| cvss_v4_0
float64 0
10
⌀ | cvss_v3_1
float64 0
10
⌀ | cvss_v3_0
float64 0
10
⌀ | cvss_v2_0
float64 0
10
⌀ | patch_commit_url
stringlengths 36
232
⌀ |
---|---|---|---|---|---|---|---|---|
GHSA-jx7f-v5r5-55j4
|
The Mojolicious module before 8.65 for Perl is vulnerable to secure_compare timing attacks that allow an attacker to guess the length of a secret string. Only versions after 1.74 are affected.
|
[] | null | 7.5 | null | null | null |
|
GHSA-63j4-jx57-q5fw
|
Trash Bin plugin 1.1.3 for MyBB has cross-site scripting (XSS) via a thread subject and a cross-site request forgery (CSRF) via a post subject.
|
[] | null | null | 8.8 | null | null |
|
CVE-2020-26547
|
Monal before 4.9 does not implement proper sender verification on MAM and Message Carbon (XEP-0280) results. This allows a remote attacker (able to send stanzas to a victim) to inject arbitrary messages into the local history, with full control over the sender and receiver displayed to the victim.
|
[
"cpe:2.3:a:monal:monal:*:*:*:*:*:iphone_os:*:*"
] | null | 9.8 | null | 5 | null |
|
GHSA-g8gg-rcmj-jj2r
|
Untrusted search path vulnerability in hsolinkcontrol in hsolink 1.0.118 allows local users to gain privileges via a modified PATH environment variable, which is used during execution of the (1) route, (2) mv, and (3) cp programs, a different vulnerability than CVE-2010-1671.
|
[] | null | null | null | null | null |
|
GHSA-7f6x-229m-7w2q
|
An attacker could utilize SQL commands to create a new user MDT AutoSave versions prior to v6.02.06 and update the user’s permissions, granting the attacker the ability to login.
|
[] | null | 9.8 | null | null | null |
|
CVE-2019-18858
|
CODESYS 3 web server before 3.5.15.20, as distributed with CODESYS Control runtime systems, has a Buffer Overflow.
|
[
"cpe:2.3:a:codesys:control_for_beaglebone:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_empc-a\\/imx6:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_iot2000:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_linux:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc100:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_pfc200:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_plcnext:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_for_raspberry_pi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_rte:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_runtime_system_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:control_win:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:embedded_target_visu_toolkit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:hmi:*:*:*:*:*:*:*:*",
"cpe:2.3:a:codesys:remote_target_visu_toolkit:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-22cq-qqmm-44qr
|
A vulnerability classified as problematic has been found in code-projects Payroll Management System 1.0. Affected is an unknown function of the file /home_employee.php. The manipulation of the argument division leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
|
[] | 5.1 | 3.5 | null | null | null |
|
GHSA-2fc3-gg5g-pf65
|
In JetBrains Hub before 2021.1.13690, the authentication throttling mechanism could be bypassed.
|
[] | null | 9.8 | null | null | null |
|
GHSA-vjwc-c2cc-76g5
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 7.0.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox as well as unauthorized update, insert or delete access to some of Oracle VM VirtualBox accessible data and unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: Only applicable to 7.0.x platform. CVSS 3.1 Base Score 7.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H).
|
[] | null | 7.3 | null | null | null |
|
GHSA-qhwv-rq72-8hq4
|
SWS web server 0.0.4, 0.0.3 and 0.1.0 allows remote attackers to cause a denial of service (crash) via a URL request that does not end with a newline.
|
[] | null | null | null | null | null |
|
GHSA-wv8g-fx9j-q2jg
|
phpMyAdmin cross-site scripting Vulnerability via ENUM value
|
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.0.x before 4.0.10.4, 4.1.x before 4.1.14.5, and 4.2.x before 4.2.9.1 allow remote authenticated users to inject arbitrary web script or HTML via a crafted ENUM value that is improperly handled during rendering of the (1) table search or (2) table structure page, related to `libraries/TableSearch.class.php` and `libraries/Util.class.php`.
|
[] | null | null | null | null | null |
CVE-2014-1583
|
The Alarm API in Mozilla Firefox before 33.0 and Firefox ESR 31.x before 31.2 does not properly restrict toJSON calls, which allows remote attackers to bypass the Same Origin Policy via crafted API calls that access sensitive information within the JSON data of an alarm.
|
[
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:30.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.0:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox:31.1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-rgvr-75f6-hq78
|
Microsoft SharePoint Server 2013 Service Pack 1 allows an elevation of privilege vulnerability when it fails to properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint XSS Vulnerability".
|
[] | null | null | 5.4 | null | null |
|
CVE-2023-40505
|
LG Simple Editor createThumbnailByMovie Command Injection Remote Code Execution Vulnerability
|
LG Simple Editor createThumbnailByMovie Command Injection Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of LG Simple Editor. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the createThumbnailByMovie method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of SYSTEM.
. Was ZDI-CAN-19978.
|
[
"cpe:2.3:a:lg:simple_editor:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
GHSA-xfg7-2jxx-2vg8
|
A vulnerability classified as critical has been found in 1000 Projects Portfolio Management System MCA 1.0. Affected is an unknown function of the file /add_personal_details.php. The manipulation of the argument profile leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
|
[] | 5.3 | 6.3 | null | null | null |
|
CVE-2009-5000
|
Multiple cross-site scripting (XSS) vulnerabilities in the Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 4.0.2.x before 4.0.2.3-P8AE-FP003 allow remote attackers to inject arbitrary web script or HTML via unspecified parameters to .jsp pages.
|
[
"cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:001:*:*:*:*:*:*",
"cpe:2.3:a:ibm:filenet_p8_application_engine:4.0.2:002:*:*:*:*:*:*"
] | null | null | null | 4.3 | null |
|
CVE-2007-2350
|
admin/config.php in the music-on-hold module in freePBX 2.2.x allows remote authenticated administrators to execute arbitrary commands via shell metacharacters in the del parameter.
|
[
"cpe:2.3:a:freepbx:freepbx:*:*:*:*:*:*:*:*"
] | null | null | null | 6.5 | null |
|
CVE-2023-2958
|
IDOR in ATS Pro
|
Authorization Bypass Through User-Controlled Key vulnerability in Origin Software ATS Pro allows Authentication Abuse, Authentication Bypass.This issue affects ATS Pro: before 20230714.
|
[
"cpe:2.3:a:orjinyazilim:ats_pro:*:*:*:*:*:*:*:*"
] | null | 9.8 | null | null | null |
GHSA-xpm4-75c2-wrgc
|
A flaw was found in GDM in versions prior to 3.38.2.1. A race condition in the handling of session shutdown makes it possible to bypass the lock screen for a user that has autologin enabled, accessing their session without authentication. This is similar to CVE-2017-12164, but requires more difficult conditions to exploit.
|
[] | null | null | null | null | null |
|
GHSA-42m5-34mg-qrv6
|
cPanel before 60.0.25 allows file-overwrite operations during preparation for MySQL upgrades (SEC-161).
|
[] | null | null | 6.5 | null | null |
|
CVE-2023-47031
|
An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component.
|
[] | null | null | null | null | null |
|
GHSA-57rv-fpf7-pch9
|
The Countdown Timer for WordPress Block Editor WordPress plugin through 1.0.5 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-1778
|
Bypassing user account validation
|
When OTRS uses multiple backends for user authentication (with LDAP), agents are able to login even if the account is set to invalid. This issue affects OTRS; 8.0.9 and prior versions.
|
[
"cpe:2.3:a:otrs:otrs:*:*:*:*:*:*:*:*"
] | null | 4.1 | null | null | null |
CVE-2025-22798
|
WordPress Responsive jQuery Slider plugin <= 1.1.1 - Cross Site Scripting (XSS) vulnerability
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CHR Designer Responsive jQuery Slider allows Stored XSS.This issue affects Responsive jQuery Slider: from n/a through 1.1.1.
|
[] | null | 6.5 | null | null | null |
CVE-2017-10232
|
Vulnerability in the Hospitality WebSuite8 Cloud Service component of Oracle Hospitality Applications (subcomponent: General). Supported versions that are affected are 8.9.6 and 8.10.x. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Hospitality WebSuite8 Cloud Service. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Hospitality WebSuite8 Cloud Service accessible data as well as unauthorized update, insert or delete access to some of Hospitality WebSuite8 Cloud Service accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Hospitality WebSuite8 Cloud Service. CVSS 3.0 Base Score 7.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L).
|
[
"cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:hospitality_websuite8_cloud_service:8.10.2:*:*:*:*:*:*:*"
] | null | null | 7.6 | 6.5 | null |
|
CVE-2023-38586
|
An access issue was addressed with additional sandbox restrictions. This issue is fixed in macOS Sonoma 14. A sandboxed process may be able to circumvent sandbox restrictions.
|
[
"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*"
] | null | 10 | null | null | null |
|
GHSA-5r36-3w36-p2fp
|
VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing.
|
[] | null | 9.8 | null | null | null |
|
CVE-2020-10914
|
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VEEAM One Agent 9.5.4.4587. Authentication is not required to exploit this vulnerability. The specific flaw exists within the PerformHandshake method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-10400.
|
[
"cpe:2.3:a:veeam:one:9.5.4.4587:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
|
GHSA-fq66-4fw4-f434
|
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Diagnostics). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle WebLogic Server accessible data. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
|
[] | null | 5.3 | null | null | null |
|
CVE-2016-8298
|
Vulnerability in the Oracle FLEXCUBE Private Banking component of Oracle Financial Services Applications (subcomponent: Product / Instrument Search). Supported versions that are affected are 2.0.1, 2.2.0 and 12.0.1. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle FLEXCUBE Private Banking. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle FLEXCUBE Private Banking accessible data as well as unauthorized access to critical data or complete access to all Oracle FLEXCUBE Private Banking accessible data. CVSS v3.0 Base Score 8.1 (Confidentiality and Integrity impacts).
|
[
"cpe:2.3:a:oracle:flexcube_private_banking:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*"
] | null | null | 8.1 | 5.5 | null |
|
CVE-2022-40359
|
Cross site scripting (XSS) vulnerability in kfm through 1.4.7 via crafted GET request to /kfm/index.php.
|
[
"cpe:2.3:a:kfm_project:kfm:*:*:*:*:*:*:*:*"
] | null | 6.1 | null | null | null |
|
GHSA-q823-fhxh-997g
|
In the Linux kernel, the following vulnerability has been resolved:drm/amd/display: Fix index out of bounds in degamma hardware format translationFixes index out of bounds issue in
`cm_helper_translate_curve_to_degamma_hw_format` function. The issue
could occur when the index 'i' exceeds the number of transfer function
points (TRANSFER_FUNC_POINTS).The fix adds a check to ensure 'i' is within bounds before accessing the
transfer function points. If 'i' is out of bounds the function returns
false to indicate an error.Reported by smatch:
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:594 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.red' 1025 <= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:595 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.green' 1025 <= s32max
drivers/gpu/drm/amd/amdgpu/../display/dc/dcn10/dcn10_cm_common.c:596 cm_helper_translate_curve_to_degamma_hw_format() error: buffer overflow 'output_tf->tf_pts.blue' 1025 <= s32max
|
[] | null | 7.8 | null | null | null |
|
CVE-2017-13136
|
The image_alloc function in bpgenc.c in libbpg 0.9.7 has an integer overflow, with a resultant invalid malloc and NULL pointer dereference.
|
[
"cpe:2.3:a:libbpg_project:libbpg:0.9.7:*:*:*:*:*:*:*"
] | null | null | 8.8 | 6.8 | null |
|
GHSA-86q5-qcjc-7pv4
|
Presto JDBC Server-Side Request Forgery by nextUri
|
SummaryPresto JDBC is vulnerable to Server-Side Request Forgery (SSRF) when connecting a remote Presto server. An attacker can modify the nextUri parameter to internal server in response content that Presto JDBC client will request next and view sensitive information from highly sensitive internal servers or perform a local port scan.DetailsThe Presto protocol has a nextUri parameter that specifies which URI the client will request next to obtain more query data. Presto JDBC will directly use the nextUri returned by the remote Presto server as the URL for the next request. So if a malicious server modify the nextUri parameter to the internal server, JDBC will request it and cause SSRF.For unexpected responses, JDBC will put the response body into the error. So the response of the internal server will be leaked if the server also returns the error directly to the user.The relevant code is in file path `/presto-client/src/main/java/com/facebook/presto/client/StatementClientV1.java` and function `advance` .The flowchart is as follows:PoCRunning an HTTP service to route POST /v1/statement redirect to the intranet. For example, using these Python code:Connecting to the malicious server using JDBC:Pwned!ImpactWhen the target remote Presto server to be connected is controllable, an attacker can view sensitive information from highly sensitive internal servers or perform a local port scan.Vulnerability Discovery Credit: Jianyu Li @ WuHeng Lab of ByteDance
|
[] | null | 7.6 | null | null | null |
CVE-2022-48730
|
dma-buf: heaps: Fix potential spectre v1 gadget
|
In the Linux kernel, the following vulnerability has been resolved:
dma-buf: heaps: Fix potential spectre v1 gadget
It appears like nr could be a Spectre v1 gadget as it's supplied by a
user and used as an array index. Prevent the contents
of kernel memory from being leaked to userspace via speculative
execution by using array_index_nospec.
[sumits: added fixes and cc: stable tags]
|
[
"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc1:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:5.17:rc2:*:*:*:*:*:*"
] | null | 5.5 | null | null | null |
RHSA-2014:1836
|
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2.0 security update
|
CXF: SSL hostname verification bypass, incomplete CVE-2012-5783 fix CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix
|
[
"cpe:/a:redhat:jboss_enterprise_application_platform:5.2.0"
] | null | null | 4.8 | null | null |
GHSA-4wvm-v4fc-prp5
|
An issue was discovered in function _libssh2_packet_add in libssh2 1.10.0 allows attackers to access out of bounds memory.
|
[] | null | 7.5 | null | null | null |
|
CVE-2014-2287
|
channels/chan_sip.c in Asterisk Open Source 1.8.x before 1.8.26.1, 11.8.x before 11.8.1, and 12.1.x before 12.1.1, and Certified Asterisk 1.8.15 before 1.8.15-cert5 and 11.6 before 11.6-cert2, when chan_sip has a certain configuration, allows remote authenticated users to cause a denial of service (channel and file descriptor consumption) via an INVITE request with a (1) Session-Expires or (2) Min-SE header with a malformed or invalid value.
|
[
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.0.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.2.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.2.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.3.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.3.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.4.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.4.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.5.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.7.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.10.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.13.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert1_rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert3:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:1.8.15:cert4:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6:cert1_rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:certified_asterisk:11.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.4.4:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.6.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.0:rc5:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.9.3:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.0:rc4:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.10.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.11.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.12.2:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.13.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.14.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.15.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.16.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.17.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.18.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.19.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.1:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.1:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.2:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.20.2:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.21.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.22.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:patch:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.23.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.24.1:*:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.25.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:1.8.26.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:11.8.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:-:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:digium:asterisk:12.1.0:rc3:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*"
] | null | null | null | 3.5 | null |
|
CVE-2025-32800
|
Conda-build vulnerable to supply chain attack vector due to pyproject.toml referring to dependencies not present in PyPI
|
Conda-build contains commands and tools to build conda packages. Prior to version 25.3.0, the pyproject.toml lists conda-index as a Python dependency. This package is not published in PyPI. An attacker could claim this namespace and upload arbitrary (malicious) code to the package, and then exploit pip install commands by injecting the malicious dependency in the solve. This issue has been fixed in version 25.3.0. A workaround involves using --no-deps for pip install-ing the project from the repository.
|
[] | 7.2 | null | null | null | null |
RHSA-2012:1301
|
Red Hat Security Advisory: JBoss Enterprise Data Services Platform 5.3.0 update
|
Teiid: JDBC socket does not encrypt client login messages by default
|
[
"cpe:/a:redhat:jboss_enterprise_data_services:5.3"
] | null | null | null | null | null |
GHSA-vgfm-52g5-pjww
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in The CSSIgniter Team Elements Plus! allows Stored XSS.This issue affects Elements Plus!: from n/a through 2.16.3.
|
[] | null | 6.5 | null | null | null |
|
GHSA-r6w2-wcgh-gxjv
|
Buffer overflow in Adobe Shockwave Player before 11.6.8.638 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-4173, CVE-2012-4174, CVE-2012-4175, and CVE-2012-5273.
|
[] | null | null | null | null | null |
|
GHSA-v24h-h5qr-mqm8
|
Driver Booster v10.6 was discovered to contain a buffer overflow via the Host parameter under the Customize proxy module.
|
[] | null | 7.5 | null | null | null |
|
CVE-2020-19112
|
SQL Injection vulnerability in Online Book Store v1.0 via the bookisbn parameter to admin_delete.php, which could let a remote malicious user execute arbitrary code.
|
[
"cpe:2.3:a:projectworlds:online_book_store_project_in_php:1.0:*:*:*:*:*:*:*"
] | null | 9.8 | null | 7.5 | null |
|
GHSA-jfh5-68jv-jpmr
|
In on_l2cap_data_ind of btif_sock_l2cap.cc, there is possible memory corruption due to a use after free. This could lead to remote code execution over Bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11 Android-10Android ID: A-175686168
|
[] | null | null | null | null | null |
|
GHSA-q74f-hvfr-7jqc
|
Korenix Jetwave 4200 Series 1.3.0 and JetWave 3000 Series 1.6.0 are vulnerable to Command Injection via /goform/formSysCmd. An attacker an modify the sysCmd parameter in order to execute commands as root.
|
[] | null | 8.8 | null | null | null |
|
CVE-2022-26889
|
Path Traversal in search parameter results in external content injection
|
In Splunk Enterprise versions before 8.1.2, the uri path to load a relative resource within a web page is vulnerable to path traversal. It allows an attacker to potentially inject arbitrary content into the web page (e.g., HTML Injection, XSS) or bypass SPL safeguards for risky commands. The attack is browser-based. An attacker cannot exploit the attack at will and requires the attacker to initiate a request within the victim's browser (e.g., phishing).
|
[
"cpe:2.3:a:splunk:splunk:*:*:*:*:enterprise:*:*:*"
] | null | 8.8 | null | null | null |
CVE-2020-9629
|
Adobe DNG Software Development Kit (SDK) 1.5 and earlier versions have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
|
[
"cpe:2.3:a:adobe:digital_negative_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
CVE-2022-22411
|
IBM Spectrum Scale Data Access Services (DAS) 5.1.3.1 could allow an authenticated user to insert code which could allow the attacker to manipulate cluster resources due to excessive permissions. IBM X-Force ID: 223016.
|
[
"cpe:2.3:a:ibm:spectrum_scale_data_access_services:5.1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] | null | null | 6.3 | null | null |
|
CVE-2024-2221
|
Path Traversal and Arbitrary File Upload Vulnerability in qdrant/qdrant
|
qdrant/qdrant is vulnerable to a path traversal and arbitrary file upload vulnerability via the `/collections/{COLLECTION}/snapshots/upload` endpoint, specifically through the `snapshot` parameter. This vulnerability allows attackers to upload and overwrite any file on the filesystem, leading to potential remote code execution. This issue affects the integrity and availability of the system, enabling unauthorized access and potentially causing the server to malfunction.
|
[
"cpe:2.3:a:qdrant:qdrant:*:*:*:*:*:*:*:*"
] | null | null | 9.8 | null | null |
CVE-2025-49669
|
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
|
Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network.
|
[] | null | 8.8 | null | null | null |
GHSA-rf6q-m37m-q323
|
SQL injection vulnerability in includes/count_dl_or_link.inc.php in the astatsPRO (com_astatspro) 1.0.1 component for Joomla! allows remote attackers to execute arbitrary SQL commands via the id parameter to getfile.php, a different vector than CVE-2008-0839. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
|
[] | null | null | null | null | null |
|
GHSA-2hgr-r3c9-m9jw
|
Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.
|
[] | null | 8.1 | null | null | null |
|
CVE-2020-19293
|
A stored cross-site scripting (XSS) vulnerability in the /article/add component of Jeesns 1.4.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload in a posted article.
|
[
"cpe:2.3:a:jeesns:jeesns:1.4.2:*:*:*:*:*:*:*"
] | null | 5.4 | null | 3.5 | null |
|
RHSA-2013:1170
|
Red Hat Security Advisory: mongodb and pymongo security and enhancement update
|
MongoDB: Server Side JavaScript Includes allow Remote Code Execution pymongo: null pointer when decoding invalid DBRef
|
[
"cpe:/a:redhat:enterprise_mrg:2:server:el6"
] | null | null | null | null | null |
CVE-2023-51712
|
An issue was discovered in Trusted Firmware-M through 2.0.0. The lack of argument verification in the logging subsystem allows attackers to read sensitive data via the login function.
|
[
"cpe:2.3:o:arm:trusted_firmware-m:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
|
CVE-2019-15427
|
The Xiaomi Mi Mix Android device with a build fingerprint of Xiaomi/lithium/lithium:6.0.1/MXB48T/7.1.5:user/release-keys contains a pre-installed app with a package name of com.miui.powerkeeper app (versionCode=40000, versionName=4.0.00) that allows unauthorized wireless settings modification via a confused deputy attack. This capability can be accessed by any app co-located on the device.
|
[
"cpe:2.3:o:mi:mix_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:mi:mix:-:*:*:*:*:*:*:*"
] | null | 3.3 | null | 2.1 | null |
|
RHSA-2003:270
|
Red Hat Security Advisory: kdebase security update
|
security flaw security flaw
|
[
"cpe:/o:redhat:enterprise_linux:2.1::as",
"cpe:/o:redhat:enterprise_linux:2.1::aw",
"cpe:/o:redhat:enterprise_linux:2.1::es",
"cpe:/o:redhat:enterprise_linux:2.1::ws"
] | null | null | null | null | null |
GHSA-mhxp-j75h-h86w
|
Unspecified vulnerability in Panda Gold Protection and Global Protection 2014 7.01.01 and earlier, Internet Security 2014 19.01.01 and earlier, and AV Pro 2014 13.01.01 and earlier allows local users to gain privileges via unspecified vectors.
|
[] | null | null | null | null | null |
|
CVE-2018-20874
|
cPanel before 74.0.8 allows self XSS in the WHM "Create a New Account" interface (SEC-428).
|
[
"cpe:2.3:a:cpanel:cpanel:*:*:*:*:*:*:*:*"
] | null | null | 5.4 | 3.5 | null |
|
GHSA-2f7m-mw9v-6jvp
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in VaultDweller Leyka allows Stored XSS. This issue affects Leyka: from n/a through 3.31.8.
|
[] | null | 6.5 | null | null | null |
|
CVE-2020-14629
|
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 5.2.44, prior to 6.0.24 and prior to 6.1.12. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.0 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N).
|
[
"cpe:2.3:a:oracle:vm_virtualbox:*:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*"
] | null | 6 | null | null | null |
|
GHSA-69hc-w7p9-9v7x
|
vRealize Operations for Horizon Adapter (6.7.x prior to 6.7.1 and 6.6.x prior to 6.6.1) uses a JMX RMI service which is not securely configured. An unauthenticated remote attacker who has network access to vRealize Operations, with the Horizon Adapter running, may be able to execute arbitrary code in vRealize Operations.
|
[] | null | null | null | null | null |
|
CVE-2020-22158
|
MediaKind (formerly Ericsson) RX8200 5.13.3 devices are vulnerable to multiple reflected and stored XSS. An attacker has to inject JavaScript code directly in the "path" or "Services+ID" parameters and send the URL to a user in order to exploit reflected XSS. In the case of stored XSS, an attacker must modify the "name" parameter with the malicious code.
|
[
"cpe:2.3:o:mediakind:rx8200_firmware:5.13.3:*:*:*:*:*:*:*",
"cpe:2.3:h:mediakind:rx8200:-:*:*:*:*:*:*:*"
] | null | 6.1 | null | 4.3 | null |
|
CVE-2023-31065
|
Apache InLong: Insufficient Session Expiration in InLong
|
Insufficient Session Expiration vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.6.0.
An old session can be used by an attacker even after the user has been deleted or the password has been changed.
Users are advised to upgrade to Apache InLong's 1.7.0 or cherry-pick https://github.com/apache/inlong/pull/7836 https://github.com/apache/inlong/pull/7836 , https://github.com/apache/inlong/pull/7884 https://github.com/apache/inlong/pull/7884 to solve it.
|
[
"cpe:2.3:a:apache:inlong:*:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
CVE-2016-7508
|
Multiple SQL injection vulnerabilities in GLPI 0.90.4 allow an authenticated remote attacker to execute arbitrary SQL commands by using a certain character when the database is configured to use Big5 Asian encoding.
|
[
"cpe:2.3:a:glpi-project:glpi:0.90.4:*:*:*:*:*:*:*"
] | null | null | 7.5 | 6 | null |
|
GHSA-hcrc-4mmf-w8v9
|
An issue was discovered in Avast Antivirus before 20. The aswTask RPC endpoint for the TaskEx library in the Avast Service (AvastSvc.exe) allows attackers to enumerate the network interfaces and access points from a Low Integrity process via RPC.
|
[] | null | null | null | null | null |
|
GHSA-936g-q8pj-qjhp
|
Vulnerability in AMSS++ version 4.31, which does not sufficiently encode user-controlled input, resulting in a Cross-Site Scripting (XSS) vulnerability through /amssplus/modules/book/main/bookdetail_school_person.php, in the 'b_id' parameter. This vulnerability could allow a remote attacker to send a specially crafted URL to an authenticated user and steal their session cookie credentials.
|
[] | null | 7.1 | null | null | null |
|
CVE-2019-14998
|
The Webwork action Cross-Site Request Forgery (CSRF) protection implementation in Jira before version 8.4.0 allows remote attackers to bypass its protection via "cookie tossing" a CSRF cookie from a subdomain of a Jira instance.
|
[
"cpe:2.3:a:atlassian:jira_server:*:*:*:*:*:*:*:*"
] | null | 6.5 | null | 4.3 | null |
|
GHSA-2c3g-5x92-qfrv
|
Local privilege escalation due to insecure folder permissions. The following products are affected: Acronis Cyber Protect Home Office (Windows) before build 39900.
|
[] | null | 7.8 | null | null | null |
|
GHSA-2qxv-pr9r-9797
|
An input validation weakness was discovered in XCC that could allow a valid, authenticated XCC user with elevated privileges to perform command injection or cause a recoverable denial of service using a specially crafted file.
|
[] | null | 7.2 | null | null | null |
|
CVE-2019-4161
|
IBM Security Information Queue (ISIQ) 1.0.0, 1.0.1, and 1.0.2 discloses sensitive information to unauthorized users. The information can be used to mount further attacks on the system. IBM X-Force ID: 158660.
|
[
"cpe:2.3:a:ibm:security_information_queue:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:security_information_queue:1.0.2:*:*:*:*:*:*:*"
] | null | null | 4 | null | null |
|
GHSA-rm9p-68g4-m5r5
|
An issue discovered in phpwcms 1.9.25 allows remote attackers to run arbitrary code via DB user field during installation.
|
[] | null | 9.8 | null | null | null |
|
GHSA-f4h5-j74p-qq45
|
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Bit Apps Bit Form Pro.This issue affects Bit Form Pro: from n/a through 2.6.4.
|
[] | null | 6.5 | null | null | null |
|
GHSA-xv6x-456v-24xh
|
gotify/server vulnerable to Cross-site Scripting in the application image file upload
|
ImpactThe XSS vulnerability allows authenticated users to upload .html files. With that, an attacker could execute client side scripts **if** another user opened a link, such as:An attacker could potentially take over the account of the user that clicked the link. Keep in mind, the Gotify UI won't natively expose such a malicious link, so an attacker has to get the user to open the malicious link in a context outside of Gotify.PatchesThe vulnerability has been fixed in version 2.2.2.WorkaroundsYou can block access to non image files via a reverse proxy in the `./image` directory.Referenceshttps://github.com/gotify/server/pull/534
https://github.com/gotify/server/pull/535Thanks to rickshang (aka 无在无不在) for discovering and reporting this bug.
|
[] | null | 4.6 | null | null | null |
CVE-2015-0972
|
Pearson ProctorCache before 2015.1.17 uses the same hardcoded password across different customers' installations, which allows remote attackers to modify test metadata or cause a denial of service (test disruption) by leveraging knowledge of this password.
|
[
"cpe:2.3:a:pearson:proctorcache:*:*:*:*:*:*:*:*"
] | null | null | null | 5 | null |
|
GHSA-7rp4-4g4h-9gwv
|
RuvarOA v6.01 and v12.01 were discovered to contain a SQL injection vulnerability via the id parameter at /AddressBook/address_public_show.aspx.
|
[] | null | 9.8 | null | null | null |
|
CVE-2015-7091
|
Apple QuickTime before 7.7.9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted movie file, a different vulnerability than CVE-2015-7085, CVE-2015-7086, CVE-2015-7087, CVE-2015-7088, CVE-2015-7089, CVE-2015-7090, CVE-2015-7092, and CVE-2015-7117.
|
[
"cpe:2.3:a:apple:quicktime:*:*:*:*:*:*:*:*"
] | null | null | 6.6 | 6.8 | null |
|
GHSA-4xvh-94m9-fjgr
|
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Options). Supported versions that are affected are 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data. CVSS 3.1 Base Score 4.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N).
|
[] | null | null | null | null | null |
|
CVE-2023-23551
|
X-600M Code Injection
|
Control By Web X-600M devices run Lua scripts and are vulnerable to code injection, which could allow an attacker to remotely execute arbitrary code.
|
[
"cpe:2.3:o:controlbyweb:x-600m_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:controlbyweb:x-600m:-:*:*:*:*:*:*:*"
] | null | 9.1 | null | null | null |
CVE-2019-17180
|
Valve Steam Client before 2019-09-12 allows placing or appending partially controlled filesystem content, as demonstrated by file modifications on Windows in the context of NT AUTHORITY\SYSTEM. This could lead to denial of service, elevation of privilege, or unspecified other impact.
|
[
"cpe:2.3:a:valvesoftware:steam_client:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] | null | 7.8 | null | 7.2 | null |
|
CVE-2006-6570
|
Unrestricted file upload vulnerability in upload.php in GenesisTrader 1.0 allows remote authenticated users to upload arbitrary files via unspecified vectors, possibly involving form.php and the ajoutfich "foap" action.
|
[
"cpe:2.3:a:genesistrader:genesistrader:1.0:*:*:*:*:*:*:*"
] | null | null | null | 7.5 | null |
|
GHSA-f22m-r62p-8qrj
|
Vulnerability in the Oracle Advanced Outbound Telephony product of Oracle E-Business Suite (component: Calendar). Supported versions that are affected are 12.1.1-12.1.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Advanced Outbound Telephony. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Advanced Outbound Telephony, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Advanced Outbound Telephony accessible data as well as unauthorized update, insert or delete access to some of Oracle Advanced Outbound Telephony accessible data. CVSS 3.0 Base Score 8.2 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N).
|
[] | null | null | null | null | null |
|
RHSA-2019:0229
|
Red Hat Security Advisory: ghostscript security and bug fix update
|
ghostscript: use-after-free in copydevice handling (699661) ghostscript: access bypass in psi/zdevice2.c (700153) ghostscript: access bypass in psi/zicc.c (700169) ghostscript: access bypass in psi/zfjbig2.c (700168) ghostscript: subroutines within pseudo-operators must themselves be pseudo-operators (700317)
|
[
"cpe:/o:redhat:enterprise_linux:7::client",
"cpe:/o:redhat:enterprise_linux:7::computenode",
"cpe:/o:redhat:enterprise_linux:7::server",
"cpe:/o:redhat:enterprise_linux:7::workstation"
] | null | null | 7.3 | null | null |
RHSA-2021:2307
|
Red Hat Security Advisory: microcode_ctl security, bug fix and enhancement update
|
hw: vt-d related privilege escalation hw: improper isolation of shared resources in some Intel Processors hw: observable timing discrepancy in some Intel Processors hw: information disclosure on some Intel Atom processors
|
[
"cpe:/o:redhat:rhel_eus:8.2::baseos"
] | null | 5.6 | null | null | null |
GHSA-9fjq-qvpr-gcq2
|
Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and earlier and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent attackers to cause a denial of service (application crash) via a deep directory tree, related to the fts_level structure member, as demonstrated by (a) du, (b) rm, (c) chmod, and (d) chgrp on OpenBSD; and (e) SearchIndexer.exe on Vista Enterprise.
|
[] | null | null | null | null | null |
|
GHSA-36c3-jcm2-rm3j
|
ChakraCore RCE Vulnerability
|
The Chakra JavaScript engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3386, CVE-2016-3389, and CVE-2016-7190.
|
[] | null | null | 7.5 | null | null |
GHSA-6mmm-fwjc-qrhc
|
In the Linux kernel, the following vulnerability has been resolved:io_uring: check if iowq is killed before queuingtask work can be executed after the task has gone through io_uring
termination, whether it's the final task_work run or the fallback path.
In this case, task work will find ->io_wq being already killed and
null'ed, which is a problem if it then tries to forward the request to
io_queue_iowq(). Make io_queue_iowq() fail requests in this case.Note that it also checks PF_KTHREAD, because the user can first close
a DEFER_TASKRUN ring and shortly after kill the task, in which case
->iowq check would race.
|
[] | null | null | null | null | null |
|
CVE-2021-40564
|
A Segmentation fault caused by null pointer dereference vulnerability eists in Gpac through 1.0.2 via the avc_parse_slice function in av_parsers.c when using mp4box, which causes a denial of service.
|
[
"cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*"
] | null | 5.5 | null | 4.3 | null |
|
GHSA-8qxp-976h-rx2p
|
Vulnerability in the Oracle Retail Customer Management and Segmentation Foundation product of Oracle Retail Applications (component: Internal Operations). The supported version that is affected is 19.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Retail Customer Management and Segmentation Foundation. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Retail Customer Management and Segmentation Foundation accessible data as well as unauthorized read access to a subset of Oracle Retail Customer Management and Segmentation Foundation accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Retail Customer Management and Segmentation Foundation. CVSS 3.1 Base Score 6.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L).
|
[] | null | null | null | null | null |
|
CVE-2021-35554
|
Vulnerability in the Oracle Trade Management product of Oracle E-Business Suite (component: Quotes). Supported versions that are affected are 12.1.1-12.1.3 and 12.2.3-12.2.10. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Trade Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Trade Management accessible data. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
|
[
"cpe:2.3:a:oracle:trade_management:*:*:*:*:*:*:*:*"
] | null | 5.3 | null | null | null |
|
GHSA-9vvm-3ggf-936m
|
A logic issue was addressed with improved restrictions. This issue is fixed in iOS 15.4 and iPadOS 15.4, macOS Monterey 12.3. A malicious application may be able to leak sensitive user information.
|
[] | null | 5.5 | null | null | null |
|
RHSA-2014:1997
|
Red Hat Security Advisory: kernel security and bug fix update
|
Kernel: net: guard tcp_set_keepalive against crash kernel: sctp: skb_over_panic when receiving malformed ASCONF chunks kernel: net: sctp: fix panic on duplicate ASCONF chunks kernel: net: sctp: remote memory pressure from excessive queueing kernel: isofs: unbound recursion when processing relocated directories kernel: isofs: unbound recursion when processing relocated directories kernel: udf: Avoid infinite loop when processing indirect ICBs kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
|
[
"cpe:/o:redhat:enterprise_linux:6::client",
"cpe:/o:redhat:enterprise_linux:6::computenode",
"cpe:/o:redhat:enterprise_linux:6::server",
"cpe:/o:redhat:enterprise_linux:6::workstation"
] | null | null | 8.4 | null | null |
GHSA-52fv-pgw9-4xgg
|
Cross-site request forgery (CSRF) vulnerability in ecrire/action/logout.php in SPIP before 2.1.24 allows remote attackers to hijack the authentication of arbitrary users for requests that logout the user via unspecified vectors.
|
[] | null | null | null | null | null |
|
GHSA-xcmh-fgq9-r6jc
|
Type Confusion in V8 in Google Chrome prior to 131.0.6778.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
|
[] | null | 8.8 | null | null | null |
|
CVE-2024-36505
|
An improper access control vulnerability [CWE-284] in FortiOS 7.4.0 through 7.4.3, 7.2.5 through 7.2.7, 7.0.12 through 7.0.14 and 6.4.x may allow an attacker who has already successfully obtained write access to the underlying system (via another hypothetical exploit) to bypass the file integrity checking system.
|
[
"cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*"
] | null | 4.7 | null | null | null |
|
GHSA-48mx-245h-4c59
|
libX11 X library allows remote attackers to cause a denial of service via a resource mask of 0, which causes libX11 to go into an infinite loop.
|
[] | null | null | null | null | null |
|
CVE-2018-8058
|
CMS Made Simple (CMSMS) 2.2.6 has XSS in admin/moduleinterface.php via the pagedata parameter.
|
[
"cpe:2.3:a:cmsmadesimple:cms_made_simple:2.2.6:*:*:*:*:*:*:*"
] | null | null | 4.8 | 3.5 | null |
|
GHSA-9gx2-ffqm-p293
|
Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Link Software LLC WP Terms Popup plugin <= 2.6.0 versions.
|
[] | null | 4.8 | null | null | null |
|
GHSA-448r-5hhg-h92c
|
Chicken before 4.8.0 does not properly handle NUL bytes in certain strings, which allows an attacker to conduct "poisoned NUL byte attack."
|
[] | null | 6.5 | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.