Datasets:

id
stringlengths
13
19
title
stringlengths
0
256
description
stringlengths
3
13.3k
cpes
sequencelengths
0
5.42k
CVE-2024-32856
Dell Client Platform BIOS contains an Improper Input Validation vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Information disclosure.
[ "cpe:2.3:o:dell:xps_8960_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8960:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:xps_8950_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:xps_8950:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_3502_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_3502:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3521_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3521:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:inspiron_15_3510_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:inspiron_15_3510:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:aurora_r16_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:aurora_r16:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x17_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x17_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r2:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x15_r1_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x15_r1:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_x14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_x14:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m17_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m17_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r4_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_m15_r3_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_m15_r3:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_ryzen_edition_r14_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_ryzen_edition_r14:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r15_amd_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r15_amd:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r15_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r15:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r13_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r13:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r12_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r12:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r11_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r11:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_aurora_r10_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_aurora_r10:-:*:*:*:*:*:*:*", "cpe:2.3:o:dell:alienware_area_51m_r2_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:dell:alienware_area_51m_r2:-:*:*:*:*:*:*:*" ]
GHSA-r8x4-pq89-gfpq
A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
[]
GHSA-h73c-366v-c3f5
arch/arm/mach-msm/qdsp6v2/ultrasound/usf.c in the Qualcomm components in Android before 2016-08-05 on Nexus 5 and 7 (2013) devices does not properly validate input parameters, which allows attackers to gain privileges via a crafted application, aka Android internal bug 28815575 and Qualcomm internal bug CR555030.
[]
CVE-2016-3910
services/soundtrigger/SoundTriggerHwService.cpp in mediaserver in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, 6.x before 2016-10-01, and 7.0 before 2016-10-01 allows attackers to gain privileges via a crafted application, aka internal bug 30148546.
[ "cpe:2.3:o:google:android:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:5.1.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*", "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*" ]
GHSA-x86w-ghh6-6vwx
Vulnerability in the Oracle WebCenter Sites component of Oracle Fusion Middleware (subcomponent: Advanced UI). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebCenter Sites. While the vulnerability is in Oracle WebCenter Sites, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebCenter Sites accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).
[]
CVE-2023-50856
WordPress Funnel Builder for WordPress by FunnelKit Plugin <= 2.14.3 is vulnerable to SQL Injection
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in FunnelKit Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits.This issue affects Funnel Builder for WordPress by FunnelKit – Customize WooCommerce Checkout Pages, Create Sales Funnels & Maximize Profits: from n/a through 2.14.3.
[ "cpe:2.3:a:funnelkit:funnel_builder:*:*:*:*:*:wordpress:*:*" ]
CVE-2007-5635
Multiple unspecified vulnerabilities in Salford Software Support Incident Tracker (SiT!) before 3.30 have unknown impact and attack vectors.
[ "cpe:2.3:a:sitracker:support_incident_tracker:*:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:1.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:2.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta1:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta2:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.00:beta3:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.01:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.02:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.03:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.03a:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.04a:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.05:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.06:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07.1:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07.2:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.07.3:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.08:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.08.1:alpha:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.09:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.10:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.11:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.12:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.14:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.15:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.16:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.17:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.18:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.19:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.20:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.21:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.22:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.22pl1:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.23:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta-2:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:3.24:beta2:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:10.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:11.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:14.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:16.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:17.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:18.8.00:*:*:*:*:*:*:*", "cpe:2.3:a:sitracker:support_incident_tracker:21.8.00:*:*:*:*:*:*:*" ]
GHSA-v335-hc2c-4hgf
The facial recognition module has a vulnerability in file permission control. Successful exploitation of this vulnerability may affect confidentiality.
[]
GHSA-c7wh-fj95-xw47
The Buffer Button WordPress plugin through 1.0 was vulnerable to Authenticated Stored Cross Site Scripting (XSS) within the Twitter username to mention text field.
[]
GHSA-q9cm-w87h-xc7j
Cross-site scripting (XSS) vulnerability in search/search.cgi in an unspecified KCScripts script, probably Search Engine or Site Search, distributed individually and as part of Portal Pack 6.0 and earlier, allows remote attackers to inject arbitrary web script or HTML via the q parameter.
[]
CVE-2024-24934
WordPress Elementor plugin <= 3.19.0 - Arbitrary File Deletion and Phar Deserialization vulnerability
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Elementor Elementor Website Builder allows Manipulating Web Input to File System Calls.This issue affects Elementor Website Builder: from n/a through 3.19.0.
[ "cpe:2.3:a:elementor:website_builder:*:*:*:*:*:*:*:*" ]
GHSA-884g-c37h-jg8g
IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5 under certain circumstances could allow an authenticated user to the database to cause a denial of service when a statement is run on columnar tables. IBM X-Force ID: 273393.
[]
GHSA-c6ff-fqc2-ff9g
Cross Site Scripting exists in InfoVista VistaPortal SE Version 5.1 (build 51029). The page "/VPortal/mgtconsole/Contacts.jsp" has reflected XSS via the ConnPoolName parameter.
[]
GHSA-cpvv-5cvm-737x
An issue in HummerRisk HummerRisk v.1.10 thru 1.4.1 allows an authenticated attacker to execute arbitrary code via a crafted request to the service/LicenseService component.
[]
GHSA-jrhq-g3gj-39qq
An out-of-bounds write vulnerability in Bitdefender Engines on Windows causes the engine to crash. This issue affects Bitdefender Engines version 7.94791 and lower.
[]
GHSA-33hj-36q7-m72x
A vulnerability in the web management interface of Cisco Secure Email and Web Manager, formerly Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an authenticated, remote attacker to retrieve sensitive information from a Lightweight Directory Access Protocol (LDAP) external authentication server connected to an affected device. This vulnerability is due to a lack of proper input sanitization while querying the external authentication server. An attacker could exploit this vulnerability by sending a crafted query through an external authentication web page. A successful exploit could allow the attacker to gain access to sensitive information, including user credentials from the external authentication server. To exploit this vulnerability, an attacker would need valid operator-level (or higher) credentials.
[]
GHSA-j92p-xh86-8wrm
Cross-site request forgery (CSRF) vulnerability in the Related Posts by Zemanta plugin before 1.3.2 for WordPress allows remote attackers to hijack the authentication of unspecified users for requests that change settings via unknown vectors.
[]
GHSA-3ghq-g9vp-wwq2
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV.
[]
CVE-2024-43298
WordPress Clone plugin <= 2.4.5 - Broken Access Control vulnerability
Missing Authorization vulnerability in Migrate Clone allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Clone: from n/a through 2.4.5.
[ "cpe:2.3:a:backupbliss:clone:*:*:*:*:*:wordpress:*:*" ]
CVE-2017-3076
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the MPEG-4 AVC module. Successful exploitation could lead to arbitrary code execution.
[ "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:edge:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:internet_explorer:*:*", "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:chrome:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:google:chrome_os:-:*:*:*:*:*:*:*", "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:adobe:flash_player:*:*:*:*:*:*:*:*" ]
GHSA-8crg-9wvr-72vm
A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/bwdates-report-details.php. The manipulation of the argument fdate leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-248952.
[]
GHSA-4vq9-fqw4-6r9r
Portainer 1.24.1 and earlier is affected by an insecure permissions vulnerability that may lead to remote arbitrary code execution. A non-admin user is allowed to spawn new containers with critical capabilities such as SYS_MODULE, which can be used to take over the Docker host.
[]
CVE-2023-35299
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Windows Common Log File System Driver Elevation of Privilege Vulnerability
[ "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*" ]
GHSA-93v8-gx5g-v586
The SSH authentication agent follows symlinks via a UNIX domain socket.
[]
CVE-2023-20137
Cisco Small Business RV016, RV042, RV042G, RV082 , RV320, and RV325 Routers Cross-Site Scripting Vulnerabilities
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV016, RV042, RV042G, RV082, RV320, and RV325 Routers could allow an unauthenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. These vulnerabilities are due to insufficient input validation by the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device and then persuading a user to visit specific web pages that include malicious payloads. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. Cisco has not released software updates that address these vulnerabilities.
[ "cpe:2.3:o:cisco:rv016_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv016:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv042g_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv042g:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv082_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv082:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv320_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv320:-:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:rv325_firmware:*:*:*:*:*:*:*:*", "cpe:2.3:h:cisco:rv325:-:*:*:*:*:*:*:*" ]
GHSA-6gj2-w23f-chf3
rpmbuild in RPM 4.8.0 and earlier does not properly parse the syntax of spec files, which allows user-assisted remote attackers to remove home directories via vectors involving a ;~ (semicolon tilde) sequence in a Name tag.
[]
CVE-2021-43890
Windows AppX Installer Spoofing Vulnerability
We have investigated reports of a spoofing vulnerability in AppX installer that affects Microsoft Windows. Microsoft is aware of attacks that attempt to exploit this vulnerability by using specially crafted packages that include the malware family known as Emotet/Trickbot/Bazaloader. An attacker could craft a malicious attachment to be used in phishing campaigns. The attacker would then have to convince the user to open the specially crafted attachment. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Please see the Security Updates table for the link to the updated app. Alternatively you can download and install the Installer using the links provided in the FAQ section. Please see the Mitigations and Workaround sections for important information about steps you can take to protect your system from this vulnerability. December 27 2023 Update: In recent months, Microsoft Threat Intelligence has seen an increase in activity from threat actors leveraging social engineering and phishing techniques to target Windows OS users and utilizing the ms-appinstaller URI scheme. To address this increase in activity, we have updated the App Installer to disable the ms-appinstaller protocol by default and recommend other potential mitigations.
[ "cpe:2.3:a:microsoft:app_installer:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1903:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1909:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_2004:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_20h2:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h1:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_11_21h2:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:*:*" ]
GHSA-gw3c-jrpr-59hg
Xenstore: Guests can create orphaned Xenstore nodes By creating multiple nodes inside a transaction resulting in an error, a malicious guest can create orphaned nodes in the Xenstore data base, as the cleanup after the error will not remove all nodes already created. When the transaction is committed after this situation, nodes without a valid parent can be made permanent in the data base.
[]
GHSA-mfpg-9h24-vwhp
An Operation on a Resource after Expiration or Release vulnerability in the Routing Protocol Daemon (RPD) of Juniper Networks Junos OS and Junos OS Evolved allows an unauthenticated network-based attacker with an established BGP session to cause a Denial of Service (DoS). This issue occurs when proxy-generate route-target filtering is enabled, and certain proxy-route add and delete events are happening. This issue affects: Juniper Networks Junos OS All versions prior to 17.3R3-S11; 17.4 versions prior to 17.4R2-S13, 17.4R3-S4; 18.3 versions prior to 18.3R3-S4; 18.4 versions prior to 18.4R1-S8, 18.4R2-S8, 18.4R3-S6; 19.1 versions prior to 19.1R3-S4; 19.2 versions prior to 19.2R1-S6, 19.2R3-S2; 19.3 versions prior to 19.3R2-S6, 19.3R3-S1; 19.4 versions prior to 19.4R1-S4, 19.4R2-S4, 19.4R3; 20.1 versions prior to 20.1R2; 20.2 versions prior to 20.2R2; 20.3 versions prior to 20.3R1-S2, 20.3R2. Juniper Networks Junos OS Evolved All versions prior to 20.1R3-EVO; 20.2 versions prior to 20.2R3-EVO; 20.3 versions prior to 20.3R2-EVO.
[]
CVE-2023-0282
YourChannel < 1.2.2 - Subscriber+ Stored XSS
The YourChannel WordPress plugin before 1.2.2 does not sanitize and escape some parameters, which could allow users with a role as low as Subscriber to perform Cross-Site Scripting attacks.
[ "cpe:2.3:a:plugin:yourchannel:*:*:*:*:*:wordpress:*:*" ]
GHSA-j593-h5v3-45x6
usememos/memos may leak user information to an authenticated user
usememos/memos 0.9.0 and prior has endpoint that leaks user information like names, email, role, and OpenID to an authenticated user. A patch is available at commit 05b41804e33a34102f1f75bb2d69195dda6a1210 on the `main` branch.
[]
GHSA-6xff-6366-vrm2
Honeywell OneWirelessWireless Device Manager (WDM) for the following versions R310.x, R320.x, R321.x, R322.1, R322.2, R323.x, R330.1 contains a command injection vulnerability. An attacker who is authenticated could use the firmware update process to potentially exploit the vulnerability, leading to a command injection. Honeywell recommends updating toR322.3, R330.2 or the most recent version of this product2.
[]
CVE-2020-8855
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 9.7.0.2947. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the fxhtml2pdf.exe module. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-9560.
[ "cpe:2.3:a:foxitsoftware:reader:*:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "cpe:2.3:a:foxitsoftware:phantompdf:*:*:*:*:*:*:*:*" ]
GHSA-p7fp-g747-v67w
A denial-of-service issue was addressed with improved memory handling. This issue is fixed in iOS 16.5 and iPadOS 16.5, macOS Ventura 13.4. Opening a PDF file may lead to unexpected app termination
[]
GHSA-mqrg-8c46-vfrq
Huawei AR1220 routers with software before V200R005SPH006 allow remote attackers to cause a denial of service (board reset) via vectors involving a large amount of traffic from the GE port to the FE port.
[]
CVE-2006-0460
Multiple buffer overflows in BomberClone before 0.11.6.2 allow remote attackers to execute arbitrary code via long error messages.
[ "cpe:2.3:a:bomberclone:bomberclone:0.1:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.2:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.3:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.4:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.5:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.6:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.7:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.8:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.9.5:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.9.6:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.9.7:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.9.8:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.9.9:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.10.0:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.11.3:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.11.4:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.11.5:*:*:*:*:*:*:*", "cpe:2.3:a:bomberclone:bomberclone:0.11.6:*:*:*:*:*:*:*" ]
GHSA-r245-745x-2whv
cPanel before 82.0.18 allows attackers to read an arbitrary database via MySQL dump streaming (SEC-531).
[]
CVE-2018-6627
In WatchDog Anti-Malware 2.74.186.150, the driver file (ZAMGUARD32.SYS) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x80002054.
[ "cpe:2.3:a:watchdogdevelopment:anti-malware:2.74.186.150:*:*:*:*:*:*:*" ]
GHSA-qh9r-899c-pqqg
Unspecified vulnerability in rpc.yppasswdd in HP HP-UX B.11.11, B.11.23, and B.11.31 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors.
[]
CVE-2013-7354
Multiple integer overflows in libpng before 1.5.14rc03 allow remote attackers to cause a denial of service (crash) via a crafted image to the (1) png_set_sPLT or (2) png_set_text_2 function, which triggers a heap-based buffer overflow.
[ "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.0:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.1:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.1:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.2:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.3:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.4:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.4:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.5:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.5:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.6:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.6:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.7:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.7:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.8:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.8:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.9:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.9:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.10:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.11:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.11:beta:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.12:*:*:*:*:*:*:*", "cpe:2.3:a:libpng:libpng:1.5.13:beta:*:*:*:*:*:*" ]
GHSA-jwm8-5prh-37pj
In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from JavaScript in an SVG document.
[]
GHSA-x44r-c6cw-9c9w
Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
[]
GHSA-cpw5-xffh-q7hh
The Atlassian Hipchat Integration Plugin for Bitbucket Server 6.26.0 before 6.27.5, 6.28.0 before 7.3.7, and 7.4.0 before 7.8.17; Confluence HipChat plugin 6.26.0 before 7.8.17; and HipChat for JIRA plugin 6.26.0 before 7.8.17 allows remote attackers to obtain the secret key for communicating with HipChat instances by reading unspecified pages.
[]
CVE-2008-6181
SQL injection vulnerability in the Mad4Joomla Mailforms (com_mad4joomla) component before 1.1.8.2 for Joomla! allows remote attackers to execute arbitrary SQL commands via the jid parameter to index.php.
[ "cpe:2.3:a:joomla:joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:*:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.7:*:*:*:*:*:*:*", "cpe:2.3:a:mad4media:com_mad4joomla:1.1.8:*:*:*:*:*:*:*" ]
CVE-2022-0167
An issue has been discovered in GitLab affecting all versions starting from 14.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting from 14.6.0 before 14.6.2. GitLab was not disabling the Autocomplete attribute of fields related to sensitive information making it possible to be retrieved under certain conditions.
[ "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*", "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*" ]
CVE-2021-33211
A Directory Traversal vulnerability in the Unzip feature in Elements-IT HTTP Commander 5.3.3 allows remote authenticated users to write files to arbitrary directories via relative paths in ZIP archives.
[ "cpe:2.3:a:element-it:http_commander:5.3.3:*:*:*:*:*:*:*" ]
GHSA-jh84-c2j7-r7w4
Missing Authorization vulnerability in Tyche Softwares Payment Gateway Based Fees and Discounts for WooCommerce.This issue affects Payment Gateway Based Fees and Discounts for WooCommerce: from n/a through 2.12.1.
[]
GHSA-9569-cpr5-gfhc
Multiple SQL injection vulnerabilities in Free Reprintables ArticleFR 3.0.4 and earlier allow remote attackers to execute arbitrary SQL commands via the id parameter in a (1) get or (2) set action to rate.php.
[]
GHSA-c9q9-j66q-9r97
SQL injection vulnerability in the employees node (class.employee.inc) in Achievo 1.1.0 and earlier and 1.2 and earlier allows remote attackers to execute arbitrary SQL commands via the atkselector parameter.
[]
GHSA-2m5v-qw26-9cmh
IrfanView 4.54 allows a user-mode write access violation starting at FORMATS!GetPlugInInfo+0x0000000000007e20.
[]
CVE-2022-25903
Denial of Service (DoS)
The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed.
[ "cpe:2.3:a:opcua_project:opcua:*:*:*:*:*:rust:*:*" ]
CVE-2020-19185
Buffer Overflow vulnerability in one_one_mapping function in progs/dump_entry.c:1373 in ncurses 6.1 allows remote attackers to cause a denial of service via crafted command.
[ "cpe:2.3:a:gnu:ncurses:6.1:*:*:*:*:*:*:*", "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vsphere:*:*" ]
GHSA-j777-795c-2jfr
Google Chrome before 6.0.472.53 does not properly handle the _blank value for the target attribute of unspecified elements, which allows remote attackers to bypass the pop-up blocker via unknown vectors.
[]
CVE-2019-9238
In the NFC stack, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-121267042
[ "cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*" ]
CVE-2024-11918
Image Alt Text <= 2.0.0 - Missing Authorization to Authenticated (Subscriber+) Image Alt Text Update
The Image Alt Text plugin for WordPress is vulnerable to unauthorized modification of data| due to a missing capability check on the iat_add_alt_txt_action and iat_update_alt_txt_action AJAX actions in all versions up to, and including, 2.0.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the alt text on arbitrary images.
[]
GHSA-7hrp-6jq3-pm4q
The strListGetItem function in src/HttpHeaderTools.c in Squid 2.7 allows remote attackers to cause a denial of service via a crafted auth header with certain comma delimiters that trigger an infinite loop of calls to the strcspn function.
[]
CVE-2025-0135
GlobalProtect App on macOS: Non Admin User Can Disable the GlobalProtect App
An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app. The GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected.
[ "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.4:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.3:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.2:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.1:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:globalprotect_app:6.2.0:-:*:*:*:*:*:*" ]
GHSA-hp4v-x6cx-hqr2
radexecd.exe in Persistent Systems Radia Client Automation (RCA) 7.9, 8.1, 9.0, and 9.1 allows remote attackers to execute arbitrary commands via a crafted request to TCP port 3465.
[]
CVE-2018-12783
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
[ "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*", "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", "cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*", "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*" ]
GHSA-p7xr-j3cg-2w5r
Multiple buffer overflows in Python 2.5.2 and earlier on 32bit platforms allow context-dependent attackers to cause a denial of service (crash) or have unspecified other impact via a long string that leads to incorrect memory allocation during Unicode string processing, related to the unicode_resize function and the PyMem_RESIZE macro.
[]
CVE-2021-3340
A cross-site scripting (XSS) vulnerability in many forms of Wikindx before 5.7.0 and 6.x through 6.4.0 allows remote attackers to inject arbitrary web script or HTML via the message parameter to index.php?action=initLogon or modules/admin/DELETEIMAGES.php.
[ "cpe:2.3:a:wikindx_project:wikindx:*:*:*:*:*:*:*:*" ]
GHSA-hpx2-w5ch-4fmv
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP, T3 to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
[]
CVE-2024-30572
Netgear R6850 1.1.0.88 was discovered to contain a command injection vulnerability via the ntp_server parameter.
[ "cpe:2.3:o:netgear:r6850_firmware:-:*:*:*:*:*:*:*" ]
GHSA-gxvv-2vwq-fcjp
Google Chrome before 15.0.874.102 does not properly handle drag and drop operations on URL strings, which allows user-assisted remote attackers to spoof the URL bar via unspecified vectors.
[]
CVE-2018-13727
The mintToken function of a smart contract implementation for Eastcoin, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
[ "cpe:2.3:a:eastcoin_project:eastcoin:-:*:*:*:*:*:*:*" ]
CVE-2025-2580
Contact Form by Bit Form <= 2.18.3 - Authenticated (Author+) Stored Cross-Site Scripting via SVG File Upload
The Contact Form by Bit Form plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 2.18.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file.
[]
GHSA-2r4c-mwv9-xcr6
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS).
[]
GHSA-gcx3-7mfr-m9mp
An issue was discovered in Mikrotik-Router-Monitoring-System through 2018-10-22. SQL Injection exists in check_community.php via the parameter community.
[]
CVE-2022-45817
WordPress GC Testimonials Plugin <= 1.3.2 is vulnerable to Cross Site Scripting (XSS)
Cross-Site Scripting (XSS) vulnerability in Erin Garscadden GC Testimonials plugin <= 1.3.2 versions.
[ "cpe:2.3:a:gc_testimonials_project:gc_testimonials:*:*:*:*:*:wordpress:*:*" ]
GHSA-93g9-45m8-559m
Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.
[]
CVE-2009-1729
Multiple cross-site scripting (XSS) vulnerabilities in Sun Java System Communications Express 6 2005Q4 (aka 6.2) and 6.3 allow remote attackers to inject arbitrary web script or HTML via (1) the abperson_displayName parameter to uwc/abs/search.xml in the Add Contact implementation in the Personal Address Book component or (2) the temporaryCalendars parameter to uwc/base/UWCMain.
[ "cpe:2.3:a:sun:java_system_communications_express:6.2:*:sparc:*:*:*:*:*", "cpe:2.3:a:sun:java_system_communications_express:6.3:*:sparc:*:*:*:*:*", "cpe:2.3:a:sun:java_system_communications_express:6.2:*:x86:*:*:*:*:*", "cpe:2.3:a:sun:java_system_communications_express:6.3:*:x86:*:*:*:*:*", "cpe:2.3:a:sun:java_system_communications_express:6.2:*:linux:*:*:*:*:*", "cpe:2.3:a:sun:java_system_communications_express:6.3:*:linux:*:*:*:*:*" ]
CVE-2014-8516
Unrestricted file upload vulnerability in Visual Mining NetCharts Server allows remote attackers to execute arbitrary code by uploading a file with an executable extension, then accessing it via unspecified vectors.
[ "cpe:2.3:a:cloudfastpath:netcharts_server:-:*:*:*:*:*:*:*" ]
CVE-2016-6376
The Adaptive Wireless Intrusion Prevention System (wIPS) feature on Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device restart) via a malformed wIPS packet, aka Bug ID CSCuz40263.
[ "cpe:2.3:a:cisco:wireless_lan_controller:3.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.1.59.24:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.1.105.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.1.111.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.78.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.116.21:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.150.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.150.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.171.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.171.6:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.185.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.193.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.2.195.10:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:3.6.0e:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.108:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.155.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.155.5:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.179.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.179.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.196:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.206.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.217.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.0.219.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.1.171.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.1.181.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.1.185.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.61.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.99.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.117.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.130.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.173.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.174.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.176.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2.182.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:4.2_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.0.148.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.0.148.2:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.1.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.1.152.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.1.160.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.2.157.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:5.2.169.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:6.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.0_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.1_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.2_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.3.101.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.3.103.8:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.3.112:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.3_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.4.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.4.100:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.4.100.60:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.4.110.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.4.121.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.4_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.5.102.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.5.102.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.5_base:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.6.1.62:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.6.100.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.6.110.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.6.120.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:7.6.130.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.0.30220.385:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.72.140:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.100:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.115.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.120.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.0.121.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.1.104.37:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.1.111.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.1.122.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller:8.1.130.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_6.0:182.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_6.0:188.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_6.0:196.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_6.0:199.4:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_6.0:202.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:98.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:98.218:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:116.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:220.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:240.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:250.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.0:252.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.1:91.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.2:103.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.4:1.19:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.4:1.54:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:wireless_lan_controller_7.4:140.0:*:*:*:*:*:*:*" ]
CVE-2018-5173
The filename appearing in the "Downloads" panel improperly renders some Unicode characters, allowing for the file name to be spoofed. This can be used to obscure the file extension of potentially executable files from user view in the panel. Note: the dialog to open the file will show the full, correct filename and whether it is executable or not. This vulnerability affects Firefox < 60.
[ "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*" ]
GHSA-8rf9-8x75-vvg3
An exploitable XML external entity vulnerability exists in the reporting functionality of SAP BPC. A specially crafted XML request can cause an XML external entity to be referenced, resulting in information disclosure and potential denial of service. An attacker can issue authenticated HTTP requests to trigger this vulnerability.
[]
GHSA-7cvf-36vw-9mfv
RealPlayer 16.0.2.32 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mp4 file.
[]
GHSA-hvhf-6r4f-4rcc
root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
[]
CVE-2006-0037
ip_nat_pptp in the PPTP NAT helper (netfilter/ip_nat_helper_pptp.c) in Linux kernel 2.6.14, and other versions, allows local users to cause a denial of service (memory corruption or crash) via a crafted outbound packet that causes an incorrect offset to be calculated from pointer arithmetic when non-linear SKBs (socket buffers) are used.
[ "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*" ]
GHSA-mv7m-fwq2-hc3h
An access issue was addressed with improvements to the sandbox. This issue is fixed in macOS Monterey 12.5, macOS Big Sur 11.6.8, Security Update 2022-005 Catalina. An app may be able to access sensitive user information.
[]
GHSA-qqpw-v685-55rr
Unspecified vulnerability on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 8.2(4) and earlier allows remote attackers to cause a denial of service (block exhaustion) via multicast traffic, aka Bug ID CSCtg63992.
[]
GHSA-5w3g-8vcj-w28f
A Reflected Client Side Template Injection (CSTI) with Angular was discovered in the SolarWinds Orion Platform 2019.2 HF1 in many forms. An attacker can inject an Angular expression and escape the Angular sandbox to achieve stored XSS.
[]
CVE-1999-0766
The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
[ "cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:java_virtual_machine:*:*:*:*:*:*:*:*" ]
CVE-2018-5743
Limiting simultaneous TCP clients was ineffective
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
[ "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_local_traffic_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_acceleration_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_analytics:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_access_policy_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_application_security_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_edge_gateway:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_fraud_protection_service:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_global_traffic_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_link_controller:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_webaccelerator:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:15.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:*:*:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.9.3:s1:*:*:supported_preview:*:*:*", "cpe:2.3:a:isc:bind:9.10.8:p1:*:*:*:*:*:*", "cpe:2.3:a:isc:bind:9.11.5:s3:*:*:supported_preview:*:*:*", "cpe:2.3:a:isc:bind:9.11.5:s5:*:*:supported_preview:*:*:*", "cpe:2.3:a:isc:bind:9.14.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:iworkflow:2.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", "cpe:2.3:a:f5:big-ip_domain_name_system:15.0.0:*:*:*:*:*:*:*" ]
GHSA-h5p6-2x4v-9wqh
GFast between v2 to v3.2 was discovered to contain a SQL injection vulnerability via the SortName parameter at /system/loginLog/list.
[]
GHSA-2hph-w7cx-74wr
A vulnerability was found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. It has been rated as critical. This issue affects the function cgi_FMT_R12R5_2nd_DiskMGR of the file /cgi-bin/hd_config.cgi. The manipulation of the argument f_source_dev leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
[]
GHSA-rqw6-j5pf-6mvv
Google Chrome before 11.0.696.71 does not properly implement the GPU command buffer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors.
[]
CVE-2024-54109
Read/Write vulnerability in the image decoding module Impact: Successful exploitation of this vulnerability will affect availability.
[ "cpe:2.3:o:huawei:harmonyos:5.0.0:*:*:*:*:*:*:*" ]
CVE-2021-44117
A Cross Site Request Forgery (CSRF) vulnerability exists in TheDayLightStudio Fuel CMS 1.5.0 via a POST call to /fuel/sitevariables/delete/4.
[ "cpe:2.3:a:thedaylightstudio:fuel_cms:1.5.0:*:*:*:*:*:*:*" ]
GHSA-353f-5xf4-qw67
Vite Server Options (server.fs.deny) can be bypassed using double forward-slash (//)
The issue involves a security vulnerability in Vite where the server options can be bypassed using a double forward slash (`//`). This vulnerability poses a potential security risk as it can allow unauthorized access to sensitive directories and files.Steps to Fix. **Update Vite**: Ensure that you are using the latest version of Vite. Security issues like this are often fixed in newer releases.\n2. **Secure the server configuration**: In your `vite.config.js` file, review and update the server configuration options to restrict access to unauthorized requests or directories.ImpactOnly users explicitly exposing the Vite dev server to the network (using `--host` or the [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) are affected and only files in the immediate Vite project root folder could be exposed.\n\n### Patches\nFixed in vite@**4.3.9**, vite@**4.2.3**, vite@**4.1.5**, vite@**4.0.5** and in the latest minors of the previous two majors, vite@**3.2.7** and vite@**2.9.16**.DetailsVite serves the application with under the root-path of the project while running on the dev mode. By default, Vite uses the server option fs.deny to protect sensitive files. But using a simple double forward-slash, we can bypass this restriction. \n\n### PoC\n1. Create a new latest project of Vite using any package manager. (here I'm using react and vue templates and pnpm for testing)\n2. Serve the application on dev mode using `pnpm run dev`.\n3. Directly access the file via url using double forward-slash (`//`) (e.g: `//.env`, `//.env.local`)\n4. The server option `fs.deny` was successfully bypassed.Proof Images: ![proof-1](https://user-images.githubusercontent.com/30733517/241105344-6ecbc7f6-57b7-45c7-856a-6421a577dda1.png)\n![proof-2](https://user-images.githubusercontent.com/30733517/241105349-ab9561e7-8aff-4f29-97f9-b784e673c122.png)
[]
CVE-2022-27340
MCMS v5.2.7 contains a Cross-Site Request Forgery (CSRF) via /role/saveOrUpdateRole.do. This vulnerability allows attackers to escalate privileges and modify data.
[ "cpe:2.3:a:mingsoft:mcms:5.2.7:*:*:*:*:*:*:*" ]
CVE-2015-6997
The X.509 certificate-trust implementation in Apple iOS before 9.1 does not recognize that the kSecRevocationRequirePositiveResponse flag implies a revocation-checking requirement, which makes it easier for man-in-the-middle attackers to spoof endpoints by leveraging access to a revoked certificate.
[ "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*" ]
CVE-2002-0883
Vulnerability in Compaq ProLiant BL e-Class Integrated Administrator 1.0 and 1.10, allows authenticated users with Telnet, SSH, or console access to conduct unauthorized activities.
[ "cpe:2.3:h:compaq:proliant_bl_e-class_integrated_administrator_firmware:1.0:*:*:*:*:*:*:*", "cpe:2.3:h:compaq:proliant_bl_e-class_integrated_administrator_firmware:1.10:*:*:*:*:*:*:*" ]
CVE-2016-8492
The implementation of an ANSI X9.31 RNG in Fortinet FortiGate allows attackers to gain unauthorized read access to data handled by the device via IPSec/TLS decryption.
[ "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.0:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.10:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.12:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.13:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.14:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.15:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.16:*:*:*:*:*:*:*", "cpe:2.3:o:fortinet:fortios:4.3.17:*:*:*:*:*:*:*" ]
CVE-2019-13294
AROX School-ERP Pro has a command execution vulnerability. import_stud.php and upload_fille.php do not have session control. Therefore an unauthenticated user can execute a command on the system.
[ "cpe:2.3:a:arox:school-erp:-:*:*:*:pro:*:*:*" ]
CVE-2002-2169
Cross-site scripting vulnerability AOL Instant Messenger (AIM) 4.5 and 4.7 for MacOS and Windows allows remote attackers to conduct unauthorized activities, such as adding buddies and groups to a user's buddy list, via a URL with a META HTTP-EQUIV="refresh" tag to an aim: URL.
[ "cpe:2.3:a:aol:instant_messenger:4.5:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.7:*:*:*:*:*:*:*", "cpe:2.3:a:aol:instant_messenger:4.7.2480:*:*:*:*:*:*:*" ]
CVE-2006-4876
Multiple SQL injection vulnerabilities in Jupiter CMS allow remote attackers to execute arbitrary SQL commands via (1) the user name during login, or the (2) key or (3) fpwusername parameters in modules/register.
[ "cpe:2.3:a:jupiter_cms:jupiter_cms:*:*:*:*:*:*:*:*" ]
CVE-2018-8587
A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook.
[ "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*" ]
CVE-2023-1500
code-projects Simple Art Gallery adminHome.php cross site scripting
A vulnerability, which was classified as problematic, has been found in code-projects Simple Art Gallery 1.0. Affected by this issue is some unknown functionality of the file adminHome.php. The manipulation of the argument about_info leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223400.
[ "cpe:2.3:a:code-projects:simple_art_gallery:1.0:*:*:*:*:*:*:*" ]
GHSA-5c8h-j5h5-r8w3
`EncryptingOutputStream` was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode. This vulnerability affects Firefox ESR < 115.6 and Firefox < 121.
[]
GHSA-fr85-fm4x-7g26
Veritas APTARE versions prior to 10.4 included code that bypassed the normal login process when specific authentication credentials were provided to the server.
[]