instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
---|---|---|
Provide detailed information about CVE-2017-4556. | CVE ID: CVE-2017-4556
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-4567. | CVE ID: CVE-2024-4567
Date Updated: 2024-08-01T20:47:40.724Z
Date Published: 2024-05-09T20:03:38.213Z
Description:
The Themify Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themify_button shortcode in all versions up to, and including, 2.0.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/c63ff9d7-6a14-4186-8550-4e5c50855e7f?source=cve
- https://plugins.trac.wordpress.org/changeset/3082885/themify-shortcodes
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-5800. | CVE ID: CVE-2023-5800
Date Updated: 2024-08-02T08:14:24.007Z
Date Published: 2024-02-05T05:20:38.668Z
Description:
Vintage,
member of the AXIS OS Bug Bounty Program, has found that the VAPIX API create_overlay.cgi
did not have a sufficient input validation allowing for a possible remote code
execution. This flaw can only be exploited after authenticating with an
operator- or administrator-privileged service account. Axis has released patched AXIS OS
versions for the highlighted flaw. Please refer to the Axis security advisory
for more information and solution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.axis.com/dam/public/89/d9/99/cve-2023-5800-en-US-424339.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-7058. | CVE ID: CVE-2016-7058
Date Updated: 2017-07-21T18:57:01
Date Published: 2017-07-21T19:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-31493. | CVE ID: CVE-2022-31493
Date Updated: 2024-08-03T07:19:06.033Z
Date Published: 2022-06-06T18:18:59
Description:
LibreHealth EHR Base 2.0.0 allows gacl/admin/acl_admin.php acl_id XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/LibreHealthIO/lh-ehr/tags
- https://gitlab.com/librehealth/ehr/lh-ehr/-/tags
- https://nitroteam.kz/index.php?action=researches&slug=librehealth2_r
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-3255. | CVE ID: CVE-2012-3255
Date Updated: 2024-08-06T19:57:50.466Z
Date Published: 2012-09-08T10:00:00
Description:
Cross-site scripting (XSS) vulnerability in HP Business Availability Center (BAC) 8.07 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03475750
- http://osvdb.org/85250
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-5137. | CVE ID: CVE-2018-5137
Date Updated: 2024-08-05T05:26:46.945Z
Date Published: 2018-06-11T21:00:00
Description:
A legacy extension's non-contentaccessible, defined resources can be loaded by an arbitrary web page through script. This script does this by using a maliciously crafted path string to reference the resources. Note: this vulnerability does not affect WebExtensions. This vulnerability affects Firefox < 59.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1432870
- http://www.securityfocus.com/bid/103386
- http://www.securitytracker.com/id/1040514
- https://usn.ubuntu.com/3596-1/
- https://www.mozilla.org/security/advisories/mfsa2018-06/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-26937. | CVE ID: CVE-2022-26937
Date Updated: 2024-08-03T05:18:38.399Z
Date Published: 2022-05-10T20:33:56
Description:
Windows Network File System Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26937
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-2486. | CVE ID: CVE-2008-2486
Date Updated: 2024-08-07T09:05:29.778Z
Date Published: 2008-05-28T15:00:00
Description:
Unspecified vulnerability in eMule Plus before 1.2d has unknown impact and attack vectors related to "staticservers.dat processing."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42620
- http://secunia.com/advisories/30277
- http://sourceforge.net/project/shownotes.php?release_id=600155
- http://www.securityfocus.com/bid/29361
- http://www.vupen.com/english/advisories/2008/1651/references
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-0508. | CVE ID: CVE-2013-0508
Date Updated: 2024-08-06T14:25:10.342Z
Date Published: 2013-06-05T01:00:00
Description:
Multiple buffer overflows in IBM Tivoli Netcool System Service Monitors (SSM) and Application Service Monitors (ASM) 4.0.0 before FP14 and 4.0.1 before FP1 allow context-dependent attackers to execute arbitrary code or cause a denial of service via a long line in (1) hrfstable.idx, (2) hrdevice.idx, (3) hrstorage.idx, or (4) lotusmapfile in the SSM Config directory, or (5) .manifest.hive in the main agent directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/82333
- http://www-01.ibm.com/support/docview.wss?uid=swg21638459
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-13640. | CVE ID: CVE-2019-13640
Date Updated: 2024-08-04T23:57:39.495Z
Date Published: 2019-07-17T21:07:47
Description:
In qBittorrent before 4.1.7, the function Application::runExternalProgram() located in app/application.cpp allows command injection via shell metacharacters in the torrent name parameter or current tracker parameter, as demonstrated by remote command execution via a crafted name within an RSS feed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/qbittorrent/qBittorrent/issues/10925
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00085.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OH3WYCKODG4OKMC4S6PWHLHAWWU6ORNC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5T4XAX2VUI4WMAS5AI4OE3OEQSQCDCF5/
- https://www.debian.org/security/2020/dsa-4650
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-37501. | CVE ID: CVE-2021-37501
Date Updated: 2024-08-04T01:22:59.349Z
Date Published: 2023-02-03T00:00:00
Description:
Buffer Overflow vulnerability in HDFGroup hdf5-h5dump 1.12.0 through 1.13.0 allows attackers to cause a denial of service via h5tools_str_sprint in /hdf5/tools/lib/h5tools_str.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/HDFGroup/hdf5
- https://github.com/ST4RF4LL/Something_Found/blob/main/HDF5_v1.13.0_h5dump_heap_overflow.md
- https://github.com/HDFGroup/hdf5/issues/2458
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-11112. | CVE ID: CVE-2020-11112
Date Updated: 2024-08-04T11:21:14.621Z
Date Published: 2020-03-31T04:37:41
Description:
FasterXML jackson-databind 2.x before 2.9.10.4 mishandles the interaction between serialization gadgets and typing, related to org.apache.commons.proxy.provider.remoting.RmiProvider (aka apache/commons-proxy).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.debian.org/debian-lts-announce/2020/04/msg00012.html
- https://medium.com/%40cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://security.netapp.com/advisory/ntap-20200403-0002/
- https://github.com/FasterXML/jackson-databind/issues/2666
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-1951. | CVE ID: CVE-2016-1951
Date Updated: 2024-08-05T23:10:40.392Z
Date Published: 2016-08-07T19:00:00
Description:
Multiple integer overflows in io/prprf.c in Mozilla Netscape Portable Runtime (NSPR) before 4.12 allow remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a long string to a PR_*printf function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://groups.google.com/forum/message/raw?msg=mozilla.dev.tech.nspr/dV4MyMsg6jw/hhWcXOgJDQAJ
- http://www.securityfocus.com/bid/92385
- http://www.securitytracker.com/id/1036590
- https://hg.mozilla.org/projects/nspr/rev/96381e3aaae2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1174015
- http://www.ubuntu.com/usn/USN-3023-1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-1310. | CVE ID: CVE-2023-1310
Date Updated: 2024-08-02T05:41:00.086Z
Date Published: 2023-03-10T07:35:25.987Z
Description:
A vulnerability, which was classified as critical, has been found in SourceCodester Online Graduate Tracer System 1.0. Affected by this issue is some unknown functionality of the file admin/prof.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-222698 is the identifier assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.222698
- https://vuldb.com/?ctiid.222698
- https://github.com/gtest1112/111/blob/main/sqli-3.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-5908. | CVE ID: CVE-2018-5908
Date Updated: 2024-08-05T05:47:56.172Z
Date Published: 2018-11-27T18:00:00
Description:
In all android releases(Android for MSM, Firefox OS for MSM, QRD Android) from CAF using the linux kernel, there is a possible buffer overflow in display function due to lack of buffer length validation before copying.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=28e5918c60b832091c6b3618747258803cbd3302
- https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=4689d03e5db548d263232c274bf307956207da27
- https://www.codeaurora.org/security-bulletin/2018/11/05/november-2018-code-aurora-forum-security-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-7042. | CVE ID: CVE-2020-7042
Date Updated: 2024-08-04T09:18:02.510Z
Date Published: 2020-02-27T17:30:16
Description:
An issue was discovered in openfortivpn 1.11.0 when used with OpenSSL 1.0.2 or later. tunnel.c mishandles certificate validation because the hostname check operates on uninitialized memory. The outcome is that a valid certificate is never accepted (only a malformed certificate may be accepted).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/adrienverge/openfortivpn/issues/536
- https://github.com/adrienverge/openfortivpn/commit/cd9368c6a1b4ef91d77bb3fdbe2e5bc34aa6f4c4
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SRVVNXCNTNMPCIAZIVR4FAGYCSU53FNA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FF6HYIBREQGATRM5COF57MRQWKOKCWZ3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CKNKSGBVYGRRVRLFEFBEKUEJYJR5LWOF/
- https://github.com/adrienverge/openfortivpn/commit/9eee997d599a89492281fc7ffdd79d88cd61afc3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-2625. | CVE ID: CVE-2009-2625
Date Updated: 2024-08-07T05:59:56.314Z
Date Published: 2009-08-06T15:00:00
Description:
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://slackware.com/security/viewer.php?l=slackware-security&y=2011&m=slackware-security.486026
- https://rhn.redhat.com/errata/RHSA-2009-1200.html
- https://rhn.redhat.com/errata/RHSA-2009-1199.html
- http://www.networkworld.com/columnists/2009/080509-xml-flaw.html
- http://www.ubuntu.com/usn/USN-890-1
- http://secunia.com/advisories/36162
- http://www.vupen.com/english/advisories/2009/2543
- http://www.debian.org/security/2010/dsa-1984
- http://www.openwall.com/lists/oss-security/2009/10/22/9
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1
- http://secunia.com/advisories/37460
- http://www.redhat.com/support/errata/RHSA-2009-1615.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://marc.info/?l=bugtraq&m=125787273209737&w=2
- http://secunia.com/advisories/37754
- https://rhn.redhat.com/errata/RHSA-2009-1637.html
- http://www.cert.fi/en/reports/2009/vulnerability2009085.html
- http://www.codenomicon.com/labs/xml/
- http://secunia.com/advisories/36199
- http://rhn.redhat.com/errata/RHSA-2012-1537.html
- http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:209
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html
- http://www.redhat.com/support/errata/RHSA-2011-0858.html
- http://marc.info/?l=bugtraq&m=125787273209737&w=2
- http://www.securitytracker.com/id?1022680
- http://secunia.com/advisories/37671
- http://secunia.com/advisories/38342
- https://rhn.redhat.com/errata/RHSA-2009-1636.html
- http://www.securityfocus.com/bid/35958
- http://www.securityfocus.com/archive/1/507985/100/0/threaded
- https://rhn.redhat.com/errata/RHSA-2009-1649.html
- http://www.openwall.com/lists/oss-security/2009/10/26/3
- http://www.us-cert.gov/cas/techalerts/TA09-294A.html
- http://secunia.com/advisories/50549
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520
- http://secunia.com/advisories/36180
- http://secunia.com/advisories/38231
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:108
- http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1
- http://secunia.com/advisories/36176
- https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html
- http://secunia.com/advisories/43300
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356
- http://www.us-cert.gov/cas/techalerts/TA10-012A.html
- http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html
- http://rhn.redhat.com/errata/RHSA-2012-1232.html
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1
- http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055&r2=787352&pathrev=787353&diff_format=h
- http://secunia.com/advisories/37300
- http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html
- https://bugzilla.redhat.com/show_bug.cgi?id=512921
- https://rhn.redhat.com/errata/RHSA-2009-1201.html
- http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html
- http://www.openwall.com/lists/oss-security/2009/09/06/1
- http://www.openwall.com/lists/oss-security/2009/10/23/6
- http://www.vupen.com/english/advisories/2011/0359
- http://www.vupen.com/english/advisories/2009/3316
- https://rhn.redhat.com/errata/RHSA-2009-1650.html
- https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-35366. | CVE ID: CVE-2023-35366
Date Updated: 2024-08-02T16:23:59.702Z
Date Published: 2023-07-11T17:03:01.684Z
Description:
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-35366
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-1222. | CVE ID: CVE-2017-1222
Date Updated: 2024-08-05T13:25:17.557Z
Date Published: 2017-10-26T21:00:00
Description:
IBM Tivoli Endpoint Manager (IBM BigFix Platform 9.2 and 9.5) does not perform an authentication check for a critical resource or functionality allowing anonymous users access to protected areas. IBM X-Force ID: 123862.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/101571
- http://www.ibm.com/support/docview.wss?uid=swg22009673
- https://exchange.xforce.ibmcloud.com/vulnerabilities/123862
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-21685. | CVE ID: CVE-2023-21685
Date Updated: 2024-08-02T09:44:02.149Z
Date Published: 2023-02-14T19:33:25.356Z
Description:
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21685
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-21357. | CVE ID: CVE-2023-21357
Date Updated: 2024-09-06T19:59:31.552Z
Date Published: 2023-10-30T16:56:38.133Z
Description:
In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/docs/security/bulletin/android-14
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-32784. | CVE ID: CVE-2022-32784
Date Updated: 2024-08-03T07:46:45.275Z
Date Published: 2023-02-27T00:00:00
Description:
The issue was addressed with improved UI handling. This issue is fixed in Safari 15.6, iOS 15.6 and iPadOS 15.6. Visiting a maliciously crafted website may leak sensitive data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213346
- https://support.apple.com/en-us/HT213341
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-1000094. | CVE ID: CVE-2018-1000094
Date Updated: 2024-08-05T12:33:49.217Z
Date Published: 2018-03-13T01:00:00
Description:
CMS Made Simple version 2.2.5 contains a Remote Code Execution vulnerability in File Manager that can result in Allows an authenticated admin that has access to the file manager to execute code on the server. This attack appear to be exploitable via File upload -> copy to any extension.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/44976/
- http://dev.cmsmadesimple.org/bug/view/11741
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-0681. | CVE ID: CVE-2012-0681
Date Updated: 2024-08-06T18:30:53.902Z
Date Published: 2012-08-22T10:00:00
Description:
Apple Remote Desktop before 3.6.1 does not recognize the "Encrypt all network data" setting during connections to third-party VNC servers, which allows remote attackers to obtain cleartext VNC session content by sniffing the network.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/55100
- http://lists.apple.com/archives/security-announce/2012/Aug/msg00000.html
- http://support.apple.com/kb/HT5433
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-2927. | CVE ID: CVE-2016-2927
Date Updated: 2024-08-05T23:40:13.638Z
Date Published: 2016-11-25T20:00:00
Description:
IBM BigFix Remote Control before 9.1.3 does not properly restrict the set of available encryption algorithms, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by sniffing the network and performing calculations on encrypted data.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94561
- http://www-01.ibm.com/support/docview.wss?uid=swg21991875
- http://www-01.ibm.com/support/docview.wss?uid=swg1IV89792
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-23162. | CVE ID: CVE-2023-23162
Date Updated: 2024-08-02T10:28:40.514Z
Date Published: 2023-02-10T00:00:00
Description:
Art Gallery Management System Project v1.0 was discovered to contain a SQL injection vulnerability via the cid parameter at product.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://phpgurukul.com/projects/Art-Gallery-MS-PHP.zip
- https://phpgurukul.com/art-gallery-management-system-using-php-and-mysql/
- https://github.com/rahulpatwari/CVE/blob/main/CVE-2023-23162/CVE-2023-23162.txt
- http://packetstormsecurity.com/files/171643/Art-Gallery-Management-System-Project-1.0-SQL-Injection.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-22100. | CVE ID: CVE-2021-22100
Date Updated: 2024-08-03T18:30:23.950Z
Date Published: 2022-03-25T18:02:40
Description:
In cloud foundry CAPI versions prior to 1.122, a denial-of-service attack in which a developer can push a service broker that (accidentally or maliciously) causes CC instances to timeout and fail is possible. An attacker can leverage this vulnerability to cause an inability for anyone to push or manage apps.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cloudfoundry.org/blog/cve-2021-22100-cloud-controller-is-vulnerable-to-denial-of-service-due-to-misbehaving-service-brokers/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-2151. | CVE ID: CVE-2016-2151
Date Updated: 2024-08-05T23:17:50.559Z
Date Published: 2016-05-22T20:00:00
Description:
user/index.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 grants excessive authorization on the basis of the moodle/course:viewhiddenuserfields capability, which allows remote authenticated users to discover student e-mail addresses by leveraging the teacher role and reading a Participants list.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2016/03/21/1
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-52433
- http://www.securitytracker.com/id/1035333
- https://moodle.org/mod/forum/discuss.php?d=330173
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-21468. | CVE ID: CVE-2020-21468
Date Updated: 2024-08-04T14:30:33.361Z
Date Published: 2021-09-20T15:11:37
Description:
A segmentation fault in the redis-server component of Redis 5.0.7 leads to a denial of service (DOS). NOTE: the vendor cannot reproduce this issue in a released version, such as 5.0.7
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://redis.com
- https://github.com/antirez/redis/issues/6633
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-37758. | CVE ID: CVE-2023-37758
Date Updated: 2024-08-02T17:23:27.529Z
Date Published: 2023-07-18T00:00:00
Description:
D-LINK DIR-815 v1.01 was discovered to contain a buffer overflow via the component /web/captcha.cgi.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dlink.com/en/security-bulletin/
- https://support.dlink.ca/productinfo.aspx?m=dir-815
- https://hackmd.io/%40pSgS7xsnS5a4K7Y0yiB43g/rJr8oNn_n
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-37101. | CVE ID: CVE-2021-37101
Date Updated: 2024-08-04T01:09:07.810Z
Date Published: 2021-09-09T13:13:40
Description:
There is an improper authorization vulnerability in AIS-BW50-00 9.0.6.2(H100SP10C00) and 9.0.6.2(H100SP15C00). Due to improper authorization mangement, an attakcer can exploit this vulnerability by physical accessing the device and implant malicious code. Successfully exploit could leads to arbitrary code execution in the target device.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210908-01-badauthorization-en
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-3246. | CVE ID: CVE-2013-3246
Date Updated: 2024-08-06T16:00:10.106Z
Date Published: 2020-01-02T19:38:44
Description:
Stack-based buffer overflow in xnview.exe in XnView before 2.03 allows remote attackers to execute arbitrary code via a crafted image layer in an XCF file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.fuzzmyapp.com/advisories/FMA-2013-003/FMA-2013-003-EN.xml
- https://exchange.xforce.ibmcloud.com/vulnerabilities/84643
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-5385. | CVE ID: CVE-2017-5385
Date Updated: 2024-08-05T14:55:35.802Z
Date Published: 2018-06-11T21:00:00
Description:
Data sent with in multipart channels, such as the multipart/x-mixed-replace MIME type, will ignore the referrer-policy response header, leading to potential information disclosure for sites using this header. This vulnerability affects Firefox < 51.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.mozilla.org/show_bug.cgi?id=1295945
- http://www.securitytracker.com/id/1037693
- https://www.mozilla.org/security/advisories/mfsa2017-01/
- http://www.securityfocus.com/bid/95763
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-1194. | CVE ID: CVE-2023-1194
Date Updated: 2024-08-02T05:40:58.408Z
Date Published: 2023-11-03T07:41:35.083Z
Description:
An out-of-bounds (OOB) memory read flaw was found in parse_lease_state in the KSMBD implementation of the in-kernel samba server and CIFS in the Linux kernel. When an attacker sends the CREATE command with a malformed payload to KSMBD, due to a missing check of `NameOffset` in the `parse_lease_state()` function, the `create_context` object can access invalid memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://access.redhat.com/security/cve/CVE-2023-1194
- https://bugzilla.redhat.com/show_bug.cgi?id=2154176
- https://www.spinics.net/lists/stable-commits/msg303065.html
- https://security.netapp.com/advisory/ntap-20231221-0006/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-3837. | CVE ID: CVE-2013-3837
Date Updated: 2024-08-06T16:22:01.478Z
Date Published: 2013-10-16T15:00:00
Description:
Unspecified vulnerability in Oracle Solaris 10 and 11.1 allows remote attackers to affect availability via unknown vectors related to Cacao.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19496
- http://www.oracle.com/technetwork/topics/security/cpuoct2013-1899837.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-27365. | CVE ID: CVE-2023-27365
Date Updated: 2024-09-18T18:28:06.028Z
Date Published: 2024-05-03T01:56:15.953Z
Description:
Foxit PDF Editor DOC File Parsing Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of DOC files. The issue results from the lack of proper restrictions on macro-enabled documents. An attacker can leverage this vulnerability to execute code in the context of the current process.
. Was ZDI-CAN-19739.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-493/
- https://www.foxit.com/support/security-bulletins.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-17785. | CVE ID: CVE-2017-17785
Date Updated: 2024-08-05T20:59:17.922Z
Date Published: 2017-12-20T09:00:00
Description:
In GIMP 2.8.22, there is a heap-based buffer overflow in the fli_read_brun function in plug-ins/file-fli/fli.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.gnome.org/show_bug.cgi?id=739133
- https://www.debian.org/security/2017/dsa-4077
- https://usn.ubuntu.com/3539-1/
- http://www.openwall.com/lists/oss-security/2017/12/19/5
- https://lists.debian.org/debian-lts-announce/2017/12/msg00023.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-47121. | CVE ID: CVE-2023-47121
Date Updated: 2024-08-02T21:01:22.643Z
Date Published: 2023-11-10T15:13:42.254Z
Description:
Discourse is an open source platform for community discussion. Prior to version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches, the embedding feature is susceptible to server side request forgery. The issue is patched in version 3.1.3 of the `stable` branch and version 3.2.0.beta3 of the `beta` and `tests-passed` branches. As a workaround, disable the Embedding feature.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/discourse/discourse/security/advisories/GHSA-hp24-94qf-8cgc
- https://github.com/discourse/discourse/commit/24cca10da731734af4e9748de99a508d586e59f1
- https://github.com/discourse/discourse/commit/5f20748e402223b265e6fee381472c14e2604da6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-8076. | CVE ID: CVE-2016-8076
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-7429. | CVE ID: CVE-2019-7429
Date Updated: 2024-08-04T20:46:46.347Z
Date Published: 2019-03-20T19:29:10
Description:
PHP Scripts Mall Property Rental Software 2.1.4 has directory traversal via a direct request for a listing of an uploads directory such as the wp-content/uploads/2016/08 directory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gkaim.com/cve-2019-7429-vikas-chaudhary/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-6223. | CVE ID: CVE-2024-6223
Date Updated: 2024-08-01T21:33:05.217Z
Date Published: 2024-07-30T06:00:09.898Z
Description:
The Send email only on Reply to My Comment WordPress plugin through 1.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/cf7d1cea-0bf4-4b9e-bab4-71d5719a7c30/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2019-11544. | CVE ID: CVE-2019-11544
Date Updated: 2024-08-04T22:55:41.038Z
Date Published: 2019-09-09T18:28:54
Description:
An issue was discovered in GitLab Community and Enterprise Edition 8.x, 9.x, 10.x, and 11.x before 11.8.9, 11.9.x before 11.9.10, and 11.10.x before 11.10.2. It allows Information Disclosure. Non-member users who subscribe to notifications of an internal project with issue and repository restrictions will receive emails about restricted events.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://about.gitlab.com/2019/04/29/security-release-gitlab-11-dot-10-dot-2-released/
- https://gitlab.com/gitlab-org/gitlab-ce/issues/58372
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-3231. | CVE ID: CVE-2016-3231
Date Updated: 2024-08-05T23:47:58.413Z
Date Published: 2016-06-16T01:00:00
Description:
The Standard Collector service in Windows Diagnostics Hub mishandles library loading, which allows local users to gain privileges via a crafted application, aka "Windows Diagnostics Hub Elevation of Privilege Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-078
- http://www.securitytracker.com/id/1036105
- http://www.zerodayinitiative.com/advisories/ZDI-16-372
- http://www.securityfocus.com/bid/91116
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-8154. | CVE ID: CVE-2016-8154
Date Updated: 2021-03-01T23:08:02
Date Published: 2021-03-01T23:08:02
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-1617. | CVE ID: CVE-2020-1617
Date Updated: 2024-09-16T18:03:44.233Z
Date Published: 2020-04-08T19:25:54.368787Z
Description:
This issue occurs on Juniper Networks Junos OS devices which do not support Advanced Forwarding Interface (AFI) / Advanced Forwarding Toolkit (AFT). Devices using AFI and AFT are not exploitable to this issue. An improper initialization of memory in the packet forwarding architecture in Juniper Networks Junos OS non-AFI/AFT platforms which may lead to a Denial of Service (DoS) vulnerability being exploited when a genuine packet is received and inspected by non-AFT/AFI sFlow and when the device is also configured with firewall policers. This first genuine packet received and inspected by sampled flow (sFlow) through a specific firewall policer will cause the device to reboot. After the reboot has completed, if the device receives and sFlow inspects another genuine packet seen through a specific firewall policer, the device will generate a core file and reboot. Continued inspection of these genuine packets will create an extended Denial of Service (DoS) condition. Depending on the method for service restoration, e.g. hard boot or soft reboot, a core file may or may not be generated the next time the packet is received and inspected by sFlow. This issue affects: Juniper Networks Junos OS 17.4 versions prior to 17.4R2-S9, 17.4R3 on PTX1000 and PTX10000 Series, QFX10000 Series; 18.1 versions prior to 18.1R3-S9 on PTX1000 and PTX10000 Series, QFX10000 Series; 18.2X75 versions prior to 18.2X75-D12, 18.2X75-D30 on PTX1000 and PTX10000 Series, QFX10000 Series; 18.2 versions prior to 18.2R3 on PTX1000 and PTX10000 Series, QFX10000 Series; 18.3 versions prior to 18.3R3 on PTX1000 and PTX10000 Series, QFX10000 Series. This issue is not applicable to Junos OS versions before 17.4R1. This issue is not applicable to Junos OS Evolved or Junos OS with Advanced Forwarding Toolkit (AFT) forwarding implementations which use a different implementation of sFlow. The following example information is unrelated to this issue and is provided solely to assist you with determining if you have AFT or not. Example: A Junos OS device which supports the use of EVPN signaled VPWS with Flexible Cross Connect uses the AFT implementation. Since this configuration requires support and use of the AFT implementation to support this configuration, the device is not vulnerable to this issue as the sFlow implementation is different using the AFT architecture. For further details about AFT visit the AFI / AFT are in the links below. If you are uncertain if you use the AFI/AFT implementation or not, there are configuration examples in the links below which you may use to determine if you are vulnerable to this issue or not. If the commands work, you are. If not, you are not. You may also use the Feature Explorer to determine if AFI/AFT is supported or not. If you are still uncertain, please contact your support resources.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA11000
- https://github.com/Juniper/AFI
- https://www.juniper.net/documentation/en_US/junos/topics/example/example-configuring-vpws-service-with-evpn-signaling-mechanisms.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-27085. | CVE ID: CVE-2024-27085
Date Updated: 2024-08-21T23:12:39.336Z
Date Published: 2024-03-15T19:22:46.937Z
Description:
Discourse is an open source platform for community discussion. In affected versions users that are allowed to invite others can inject arbitrarily large data in parameters used in the invite route. The problem has been patched in the latest version of Discourse. Users are advised to upgrade. Users unable to upgrade should disable invites or restrict access to them using the `invite allowed groups` site setting.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/discourse/discourse/security/advisories/GHSA-cvp5-h7p8-mjj6
- https://github.com/discourse/discourse/commit/62ea382247c1f87361d186392c45ca74c83be295
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-46687. | CVE ID: CVE-2024-46687
Date Updated: 2024-09-29T15:08:11.126Z
Date Published: 2024-09-13T05:29:18.429Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
btrfs: fix a use-after-free when hitting errors inside btrfs_submit_chunk()
[BUG]
There is an internal report that KASAN is reporting use-after-free, with
the following backtrace:
BUG: KASAN: slab-use-after-free in btrfs_check_read_bio+0xa68/0xb70 [btrfs]
Read of size 4 at addr ffff8881117cec28 by task kworker/u16:2/45
CPU: 1 UID: 0 PID: 45 Comm: kworker/u16:2 Not tainted 6.11.0-rc2-next-20240805-default+ #76
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-3-gd478f380-rebuilt.opensuse.org 04/01/2014
Workqueue: btrfs-endio btrfs_end_bio_work [btrfs]
Call Trace:
dump_stack_lvl+0x61/0x80
print_address_description.constprop.0+0x5e/0x2f0
print_report+0x118/0x216
kasan_report+0x11d/0x1f0
btrfs_check_read_bio+0xa68/0xb70 [btrfs]
process_one_work+0xce0/0x12a0
worker_thread+0x717/0x1250
kthread+0x2e3/0x3c0
ret_from_fork+0x2d/0x70
ret_from_fork_asm+0x11/0x20
Allocated by task 20917:
kasan_save_stack+0x37/0x60
kasan_save_track+0x10/0x30
__kasan_slab_alloc+0x7d/0x80
kmem_cache_alloc_noprof+0x16e/0x3e0
mempool_alloc_noprof+0x12e/0x310
bio_alloc_bioset+0x3f0/0x7a0
btrfs_bio_alloc+0x2e/0x50 [btrfs]
submit_extent_page+0x4d1/0xdb0 [btrfs]
btrfs_do_readpage+0x8b4/0x12a0 [btrfs]
btrfs_readahead+0x29a/0x430 [btrfs]
read_pages+0x1a7/0xc60
page_cache_ra_unbounded+0x2ad/0x560
filemap_get_pages+0x629/0xa20
filemap_read+0x335/0xbf0
vfs_read+0x790/0xcb0
ksys_read+0xfd/0x1d0
do_syscall_64+0x6d/0x140
entry_SYSCALL_64_after_hwframe+0x4b/0x53
Freed by task 20917:
kasan_save_stack+0x37/0x60
kasan_save_track+0x10/0x30
kasan_save_free_info+0x37/0x50
__kasan_slab_free+0x4b/0x60
kmem_cache_free+0x214/0x5d0
bio_free+0xed/0x180
end_bbio_data_read+0x1cc/0x580 [btrfs]
btrfs_submit_chunk+0x98d/0x1880 [btrfs]
btrfs_submit_bio+0x33/0x70 [btrfs]
submit_one_bio+0xd4/0x130 [btrfs]
submit_extent_page+0x3ea/0xdb0 [btrfs]
btrfs_do_readpage+0x8b4/0x12a0 [btrfs]
btrfs_readahead+0x29a/0x430 [btrfs]
read_pages+0x1a7/0xc60
page_cache_ra_unbounded+0x2ad/0x560
filemap_get_pages+0x629/0xa20
filemap_read+0x335/0xbf0
vfs_read+0x790/0xcb0
ksys_read+0xfd/0x1d0
do_syscall_64+0x6d/0x140
entry_SYSCALL_64_after_hwframe+0x4b/0x53
[CAUSE]
Although I cannot reproduce the error, the report itself is good enough
to pin down the cause.
The call trace is the regular endio workqueue context, but the
free-by-task trace is showing that during btrfs_submit_chunk() we
already hit a critical error, and is calling btrfs_bio_end_io() to error
out. And the original endio function called bio_put() to free the whole
bio.
This means a double freeing thus causing use-after-free, e.g.:
1. Enter btrfs_submit_bio() with a read bio
The read bio length is 128K, crossing two 64K stripes.
2. The first run of btrfs_submit_chunk()
2.1 Call btrfs_map_block(), which returns 64K
2.2 Call btrfs_split_bio()
Now there are two bios, one referring to the first 64K, the other
referring to the second 64K.
2.3 The first half is submitted.
3. The second run of btrfs_submit_chunk()
3.1 Call btrfs_map_block(), which by somehow failed
Now we call btrfs_bio_end_io() to handle the error
3.2 btrfs_bio_end_io() calls the original endio function
Which is end_bbio_data_read(), and it calls bio_put() for the
original bio.
Now the original bio is freed.
4. The submitted first 64K bio finished
Now we call into btrfs_check_read_bio() and tries to advance the bio
iter.
But since the original bio (thus its iter) is already freed, we
trigger the above use-after free.
And even if the memory is not poisoned/corrupted, we will later call
the original endio function, causing a double freeing.
[FIX]
Instead of calling btrfs_bio_end_io(), call btrfs_orig_bbio_end_io(),
which has the extra check on split bios and do the pr
---truncated---
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/51722b99f41f5e722ffa10b8f61e802a0e70b331
- https://git.kernel.org/stable/c/4a3b9e1a8e6cd1a8d427a905e159de58d38941cc
- https://git.kernel.org/stable/c/10d9d8c3512f16cad47b2ff81ec6fc4b27d8ee10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-40253. | CVE ID: CVE-2023-40253
Date Updated: 2024-10-01T20:45:41.739Z
Date Published: 2023-08-11T05:34:48.443Z
Description:
Improper Authentication vulnerability in Genians Genian NAC V4.0, Genians Genian NAC V5.0, Genians Genian NAC Suite V5.0, Genians Genian ZTNA allows Authentication Abuse.This issue affects Genian NAC V4.0: from V4.0.0 through V4.0.155; Genian NAC V5.0: from V5.0.0 through V5.0.42 (Revision 117460); Genian NAC Suite V5.0: from V5.0.0 through V5.0.54; Genian ZTNA: from V6.0.0 through V6.0.15.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.genians.com/nac/5.0/release/ko/advisories/GN-SA-2023-001.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2015-4056. | CVE ID: CVE-2015-4056
Date Updated: 2024-08-06T06:04:02.605Z
Date Published: 2017-02-21T19:00:00
Description:
The System Library in VCE Vision Intelligent Operations before 2.6.5 does not properly implement cryptography, which makes it easier for local users to discover credentials by leveraging administrative access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://seclists.org/bugtraq/2015/Jun/91
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-7104. | CVE ID: CVE-2017-7104
Date Updated: 2024-08-05T15:49:02.829Z
Date Published: 2017-10-23T01:00:00
Description:
An issue was discovered in certain Apple products. iOS before 11 is affected. Safari before 11 is affected. iCloud before 7.0 on Windows is affected. iTunes before 12.7 on Windows is affected. tvOS before 11 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/100994
- https://support.apple.com/HT208141
- http://www.securitytracker.com/id/1039384
- https://support.apple.com/HT208142
- https://support.apple.com/HT208113
- https://support.apple.com/HT208112
- http://www.securitytracker.com/id/1039428
- https://support.apple.com/HT208116
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-11646. | CVE ID: CVE-2020-11646
Date Updated: 2024-09-17T04:20:30.486Z
Date Published: 2020-10-15T14:59:26.606024Z
Description:
A log information disclosure vulnerability in B&R GateManager 4260 and 9250 versions <9.0.20262 and GateManager 8250 versions <9.2.620236042 allows authenticated users to view log information reserved for other users.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.br-automation.com/downloads_br_productcatalogue/assets/1600003183751-de-original-1.0.pdf
- https://us-cert.cisa.gov/ics/advisories/icsa-20-273-03
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-4491. | CVE ID: CVE-2012-4491
Date Updated: 2024-08-06T20:35:09.806Z
Date Published: 2012-10-31T16:00:00
Description:
The Monthly Archive by Node Type module 6.x for Drupal does not properly check permissions defined by node_access modules, which allows remote attackers to access restricted nodes via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2012/10/04/6
- http://www.securityfocus.com/bid/54768
- http://drupal.org/node/1708198
- http://www.openwall.com/lists/oss-security/2012/10/07/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-27179. | CVE ID: CVE-2024-27179
Date Updated: 2024-08-02T00:27:59.898Z
Date Published: 2024-06-14T04:09:24.831Z
Description:
Admin cookies are written in clear-text in logs. An attacker can retrieve them and bypass the authentication mechanism. As for the affected products/models/versions, see the reference URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.toshibatec.com/information/20240531_01.html
- https://www.toshibatec.com/information/pdf/information20240531_01.pdf
- https://jvn.jp/en/vu/JVNVU97136265/index.html
- http://seclists.org/fulldisclosure/2024/Jul/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-42192. | CVE ID: CVE-2021-42192
Date Updated: 2024-08-04T03:30:37.488Z
Date Published: 2022-05-04T00:00:00
Description:
Konga v0.14.9 is affected by an incorrect access control vulnerability where a specially crafted request can lead to privilege escalation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.google.com/document/d/1-YU9zWiDVUps3Mb6zos3996yvZ48vW_vfOvaJLLHc4I/edit?usp=sharing
- https://github.com/pantsel/konga/
- https://www.exploit-db.com/exploits/50521
- https://github.com/whokilleddb/Konga-Privilege-Escalation-Exploit
- https://github.com/pantsel/konga/commit/d61535277aced18b5be0313ab2d124f60f649978
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-21100. | CVE ID: CVE-2021-21100
Date Updated: 2024-09-17T04:05:02.167Z
Date Published: 2021-04-15T13:51:28.016415Z
Description:
Adobe Digital Editions version 4.5.11.187245 (and earlier) is affected by a Privilege Escalation vulnerability during installation. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary file system write in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/Digital-Editions/apsb21-26.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-3035. | CVE ID: CVE-2012-3035
Date Updated: 2024-08-06T19:50:05.516Z
Date Published: 2012-10-01T18:00:00
Description:
Buffer overflow in Emerson DeltaV 9.3.1 and 10.3 through 11.3.1 allows remote attackers to cause a denial of service (daemon crash) via a long string to an unspecified port.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/55719
- http://www.us-cert.gov/control_systems/pdf/ICSA-12-265-01.pdf
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78972
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-45392. | CVE ID: CVE-2022-45392
Date Updated: 2024-08-03T14:09:57.064Z
Date Published: 2022-11-15T00:00:00
Description:
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by attackers with Extended Read permission, or access to the Jenkins controller file system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912
- http://www.openwall.com/lists/oss-security/2022/11/15/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-12387. | CVE ID: CVE-2018-12387
Date Updated: 2024-08-05T08:30:59.795Z
Date Published: 2018-10-18T13:00:00
Description:
A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR < 60.2.2 and Firefox < 62.0.3.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201810-01
- http://www.securityfocus.com/bid/105460
- https://usn.ubuntu.com/3778-1/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1493903
- https://www.debian.org/security/2018/dsa-4310
- https://access.redhat.com/errata/RHSA-2018:2884
- http://www.securitytracker.com/id/1041770
- https://www.mozilla.org/security/advisories/mfsa2018-24/
- https://access.redhat.com/errata/RHSA-2018:2881
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-1720. | CVE ID: CVE-2014-1720
Date Updated: 2024-08-06T09:50:10.603Z
Date Published: 2014-04-09T10:00:00
Description:
Use-after-free vulnerability in the HTMLBodyElement::insertedInto function in core/html/HTMLBodyElement.cpp in Blink, as used in Google Chrome before 34.0.1847.116, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving attributes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://code.google.com/p/chromium/issues/detail?id=356095
- http://googlechromereleases.blogspot.com/2014/04/stable-channel-update.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00012.html
- http://security.gentoo.org/glsa/glsa-201408-16.xml
- http://www.debian.org/security/2014/dsa-2905
- https://src.chromium.org/viewvc/blink?revision=170216&view=revision
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-19953. | CVE ID: CVE-2018-19953
Date Updated: 2024-08-05T11:51:17.770Z
Date Published: 2020-10-28T17:55:18
Description:
If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed the issue in the following QTS versions. QTS 4.4.2.1231 on build 20200302; QTS 4.4.1.1201 on build 20200130; QTS 4.3.6.1218 on build 20200214; QTS 4.3.4.1190 on build 20200107; QTS 4.3.3.1161 on build 20200109; QTS 4.2.6 on build 20200109.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qnap.com/zh-tw/security-advisory/qsa-20-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-5503. | CVE ID: CVE-2018-5503
Date Updated: 2024-09-16T17:23:05.265Z
Date Published: 2018-03-22T18:00:00Z
Description:
On F5 BIG-IP versions 13.0.0 - 13.1.0.3 or 12.0.0 - 12.1.3.1, TMM may restart when processing a specifically crafted page through a virtual server with an associated PEM policy that has content insertion as an action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1040560
- https://support.f5.com/csp/article/K54562183
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-15958. | CVE ID: CVE-2018-15958
Date Updated: 2024-08-05T10:10:05.695Z
Date Published: 2018-09-25T13:00:00
Description:
Adobe ColdFusion versions July 12 release (2018.0.0.310739), Update 6 and earlier, and Update 14 and earlier have a deserialization of untrusted data vulnerability. Successful exploitation could lead to arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/coldfusion/apsb18-33.html
- http://www.securitytracker.com/id/1041621
- http://www.securityfocus.com/bid/105313
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-1444. | CVE ID: CVE-2012-1444
Date Updated: 2024-08-06T19:01:00.348Z
Date Published: 2012-03-21T10:00:00
Description:
The ELF file parser in eSafe 7.0.17.0, Prevx 3.0, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified abiversion field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/522005
- http://www.securityfocus.com/bid/52604
- http://www.ieee-security.org/TC/SP2012/program.html
- http://osvdb.org/80429
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-32552. | CVE ID: CVE-2024-32552
Date Updated: 2024-08-02T02:13:39.972Z
Date Published: 2024-04-18T10:20:15.530Z
Description:
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tagbox Taggbox allows Stored XSS.This issue affects Taggbox: from n/a through 3.2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/taggbox-widget/wordpress-tagbox-ugc-galleries-social-media-widgets-user-reviews-analytics-plugin-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-0844. | CVE ID: CVE-2012-0844
Date Updated: 2024-08-06T18:38:14.959Z
Date Published: 2020-02-21T17:42:21
Description:
Information-disclosure vulnerability in Netsurf through 2.8 due to a world-readable cookie jar.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security-tracker.debian.org/tracker/CVE-2012-0844
- https://access.redhat.com/security/cve/cve-2012-0844
- http://www.openwall.com/lists/oss-security/2012/02/11/3
- https://www.securityfocus.com/bid/51981
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the vulnerability CVE-CVE-2020-11010 | CVE-CVE-2020-11010 is a vulnerability in tortoise-orm. It is related to the MITRE ATT&CK technique T1005: Data from Local System. The vulnerability is classified as a secondary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2022-34899. | CVE ID: CVE-2022-34899
Date Updated: 2024-08-03T09:22:10.747Z
Date Published: 2022-07-18T14:17:40
Description:
This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Access 6.5.4 (39316) Agent. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability. The specific flaw exists within the Parallels service. By creating a symbolic link, an attacker can abuse the service to execute a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-16134.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-22-947/
- https://kb.parallels.com/en/129010
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-0626. | CVE ID: CVE-2021-0626
Date Updated: 2024-08-03T15:47:28.226Z
Date Published: 2021-08-18T14:44:13
Description:
In ged, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05687510; Issue ID: ALPS05687510.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/August-2021
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2008-6689. | CVE ID: CVE-2008-6689
Date Updated: 2024-08-07T11:41:59.564Z
Date Published: 2009-04-10T15:00:00
Description:
SQL injection vulnerability in JobControl (dmmjobcontrol) 1.15.0 and earlier extension for TYPO3 allows remote attackers to execute arbitrary SQL commands via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://osvdb.org/46386
- http://typo3.org/teams/security/security-bulletins/typo3-20080619-1/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/43204
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
null | Describe the vulnerability CVE-CVE-2020-3237 | CVE-CVE-2020-3237 is a vulnerability in Cisco IOx. It is related to the MITRE ATT&CK technique T1565.001: Stored Data Manipulation. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2022-42360. | CVE ID: CVE-2022-42360
Date Updated: 2024-09-16T16:42:38.290Z
Date Published: 2022-12-19T10:00:14.221629Z
Description:
Adobe Experience Manager version 6.5.14 (and earlier) is affected by a reflected Cross-Site Scripting (XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/experience-manager/apsb22-59.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-23285. | CVE ID: CVE-2022-23285
Date Updated: 2024-08-03T03:36:20.374Z
Date Published: 2022-03-09T17:07:05
Description:
Remote Desktop Client Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23285
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-0180. | CVE ID: CVE-2012-0180
Date Updated: 2024-08-06T18:16:20.137Z
Date Published: 2012-05-09T00:00:00
Description:
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly handle user-mode input passed to kernel mode for (1) windows and (2) messages, which allows local users to gain privileges via a crafted application, aka "Windows and Messages Vulnerability."
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15466
- http://www.securitytracker.com/id?1027039
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-034
- http://www.us-cert.gov/cas/techalerts/TA12-129A.html
- http://www.securityfocus.com/bid/53324
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2014-8246. | CVE ID: CVE-2014-8246
Date Updated: 2024-08-06T13:10:51.207Z
Date Published: 2014-12-16T23:00:00
Description:
Cross-site request forgery (CSRF) vulnerability in CA Release Automation (formerly iTKO LISA Release Automation) before 4.7.1 b448 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20141215-01-security-notice-for-ca-lisa-release-automation.aspx
- http://seclists.org/fulldisclosure/2014/Dec/55
- http://www.kb.cert.org/vuls/id/343060
- http://www.securityfocus.com/archive/1/534246/100/0/threaded
- http://securitytracker.com/id?1031375
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-3971. | CVE ID: CVE-2022-3971
Date Updated: 2024-08-03T01:27:53.979Z
Date Published: 2022-11-13T00:00:00
Description:
A vulnerability was found in matrix-appservice-irc up to 0.35.1. It has been declared as critical. This vulnerability affects unknown code of the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a73c1415e7. It is recommended to upgrade the affected component. VDB-213550 is the identifier assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/matrix-org/matrix-appservice-irc/pull/1619
- https://github.com/matrix-org/matrix-appservice-irc/releases/tag/0.36.0
- https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7
- https://vuldb.com/?id.213550
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-6834. | CVE ID: CVE-2018-6834
Date Updated: 2024-08-05T06:17:15.860Z
Date Published: 2018-02-08T07:00:00
Description:
static/js/pad_utils.js in Etherpad Lite before v1.6.3 has XSS via window.location.href.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ether/etherpad-lite/releases/tag/1.6.3
- https://github.com/ether/etherpad-lite/commit/a03422b09468cdd5f192b05643311c705447588b
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-29435. | CVE ID: CVE-2022-29435
Date Updated: 2024-09-16T16:52:54.361Z
Date Published: 2022-05-17T19:54:24.442750Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in Alexander Stokmann's Code Snippets Extended plugin <= 1.4.7 on WordPress allows an attacker to delete or to turn on/off snippets.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/code-snippets-extended/#developers
- https://patchstack.com/database/vulnerability/code-snippets-extended/wordpress-code-snippets-extended-plugin-1-4-7-cross-site-request-forgery-csrf-vulnerability
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-43659. | CVE ID: CVE-2023-43659
Date Updated: 2024-09-16T15:51:43.554Z
Date Published: 2023-10-16T21:05:31.991Z
Description:
Discourse is an open source platform for community discussion. Improper escaping of user input allowed for Cross-site Scripting attacks via the digest email preview UI. This issue only affects sites with CSP disabled. This issue has been patched in the 3.1.1 stable release as well as the 3.2.0.beta1 release. Users are advised to upgrade. Users unable to upgrade should ensure CSP is enabled on the forum.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/discourse/discourse/security/advisories/GHSA-g4qg-5q2h-m8ph
- https://developer.mozilla.org/en-US/docs/Web/HTTP/CSP
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2012-3779. | CVE ID: CVE-2012-3779
Date Updated: 2023-09-14T18:40:26.096Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-25352. | CVE ID: CVE-2021-25352
Date Updated: 2024-08-03T20:03:05.562Z
Date Published: 2021-03-25T16:11:37
Description:
Using PendingIntent with implicit intent in Bixby Voice prior to version 3.0.52.14 allows attackers to execute privileged action by hijacking and modifying the intent.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/
- https://security.samsungmobile.com/serviceWeb.smsb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-0886. | CVE ID: CVE-2024-0886
Date Updated: 2024-09-12T19:27:13.813Z
Date Published: 2024-01-25T21:31:04.333Z
Description:
A vulnerability classified as problematic was found in Poikosoft EZ CD Audio Converter 8.0.7. Affected by this vulnerability is an unknown functionality of the component Activation Handler. The manipulation of the argument Key leads to denial of service. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier VDB-252037 was assigned to this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.252037
- https://vuldb.com/?ctiid.252037
- https://fitoxs.com/vuldb/09-exploit-perl.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-0343. | CVE ID: CVE-2011-0343
Date Updated: 2024-08-06T21:51:08.491Z
Date Published: 2011-01-28T15:00:00
Description:
Balabit syslog-ng 2.0, 3.0, 3.1, 3.2 OSE and PE, when running on FreeBSD or HP-UX, does not properly perform cast operations, which causes syslog-ng to use a default value of -1 to create log files with insecure permissions (07777), which allows local users to read and write to these log files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608491
- http://www.securityfocus.com/archive/1/515955/100/0/threaded
- https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000101.html
- https://lists.balabit.com/pipermail/syslog-ng-announce/2011-January/000102.html
- http://www.securityfocus.com/bid/45988
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2009-4346. | CVE ID: CVE-2009-4346
Date Updated: 2024-09-17T02:42:39.662Z
Date Published: 2009-12-17T17:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in the Frontend news submitter with RTE (fe_rtenews) extension 1.4.1 and earlier for TYPO3 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2009/3550
- http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-020/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2016-9318. | CVE ID: CVE-2016-9318
Date Updated: 2024-08-06T02:50:36.929Z
Date Published: 2016-11-16T00:00:00
Description:
libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.gnome.org/show_bug.cgi?id=772726
- https://github.com/lsh123/xmlsec/issues/43
- https://usn.ubuntu.com/3739-1/
- https://security.gentoo.org/glsa/201711-01
- http://www.securityfocus.com/bid/94347
- https://usn.ubuntu.com/3739-2/
- https://lists.debian.org/debian-lts-announce/2022/04/msg00004.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-3586. | CVE ID: CVE-2010-3586
Date Updated: 2024-08-07T03:18:51.338Z
Date Published: 2011-01-19T15:00:00
Description:
Unspecified vulnerability in Oracle Solaris 9 allows local users to affect confidentiality and integrity via unknown vectors related to XScreenSaver.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64805
- http://secunia.com/advisories/42984
- http://www.securitytracker.com/id?1024975
- http://www.vupen.com/english/advisories/2011/0151
- http://www.securityfocus.com/bid/45903
- http://www.oracle.com/technetwork/topics/security/cpujan2011-194091.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2021-0034. | CVE ID: CVE-2021-0034
Date Updated: 2023-05-16T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-35153. | CVE ID: CVE-2022-35153
Date Updated: 2024-08-03T09:29:17.444Z
Date Published: 2022-08-18T04:16:34
Description:
FusionPBX 5.0.1 was discovered to contain a command injection vulnerability via /fax/fax_send.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/fusionpbx/fusionpbx/commit/de22a9121a091e7fedddff22329dd6149dc5ab28
- https://github.com/fusionpbx/fusionpbx/commit/07679fe80dadb08ca23d0fc16c0f832348bfec78
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2018-17454. | CVE ID: CVE-2018-17454
Date Updated: 2024-08-05T10:47:04.782Z
Date Published: 2023-04-15T00:00:00
Description:
An issue was discovered in GitLab Community and Enterprise Edition before 11.1.7, 11.2.x before 11.2.4, and 11.3.x before 11.3.1. There is stored XSS on the issue details screen.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://about.gitlab.com/blog/categories/releases/
- https://about.gitlab.com/releases/2018/10/01/security-release-gitlab-11-dot-3-dot-1-released/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2011-4303. | CVE ID: CVE-2011-4303
Date Updated: 2024-08-07T00:01:51.577Z
Date Published: 2012-07-11T10:00:00Z
Description:
lib/db/upgrade.php in Moodle 2.0.x before 2.0.5 and 2.1.x before 2.1.2 does not set the correct registration_hubs.secret value during installation, which allows remote attackers to bypass intended access restrictions by leveraging the hubs feature.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://moodle.org/mod/forum/discuss.php?d=188315
- http://git.moodle.org/gw?p=moodle.git%3Ba=commit%3Bh=ca896fdfcfcc87846fa91a297d0aa6999a68c48a
- https://bugzilla.redhat.com/show_bug.cgi?id=747444
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-37225. | CVE ID: CVE-2024-37225
Date Updated: 2024-08-02T03:50:55.848Z
Date Published: 2024-07-09T09:06:12.823Z
Description:
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Zoho Marketing Automation.This issue affects Zoho Marketing Automation: from n/a through 1.2.7.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/zoho-marketinghub/wordpress-zoho-marketing-automation-plugin-1-2-7-sql-injection-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-45360. | CVE ID: CVE-2023-45360
Date Updated: 2024-08-02T20:21:16.159Z
Date Published: 2023-11-03T00:00:00
Description:
An issue was discovered in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. There is XSS in youhavenewmessagesmanyusers and youhavenewmessages i18n messages. This is related to MediaWiki:Youhavenewmessagesfromusers.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://phabricator.wikimedia.org/T340221
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-42276. | CVE ID: CVE-2022-42276
Date Updated: 2024-08-03T13:03:45.885Z
Date Published: 2023-01-13T01:32:03.102Z
Description:
NVIDIA DGX A100 contains a vulnerability in SBIOS in the SmiFlash, where a local user with elevated privileges can read, write and erase flash, which may lead to code execution, escalation of privileges, denial of service, and information disclosure. The scope of impact can extend to other components.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nvidia.custhelp.com/app/answers/detail/a_id/5435
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2010-5231. | CVE ID: CVE-2010-5231
Date Updated: 2024-09-17T01:42:02.172Z
Date Published: 2012-09-07T10:00:00Z
Description:
Untrusted search path vulnerability in DivX Player 7.2.019 allows local users to gain privileges via a Trojan horse VersionCheckDLL.dll file in the current working directory, as demonstrated by a directory that contains a .avi file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/blog/120
- http://secunia.com/advisories/41108
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2013-4837. | CVE ID: CVE-2013-4837
Date Updated: 2024-09-17T00:26:46.897Z
Date Published: 2013-11-04T15:00:00Z
Description:
Unspecified vulnerability in Virtual User Generator in HP LoadRunner before 11.52 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-1832.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437
- https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03969437
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2024-39836. | CVE ID: CVE-2024-39836
Date Updated: 2024-08-22T16:39:21.881Z
Date Published: 2024-08-22T06:27:09.829Z
Description:
Mattermost versions 9.9.x <= 9.9.1, 9.5.x <= 9.5.7, 9.10.x <= 9.10.0 and 9.8.x <= 9.8.2 fail to ensure that remote/synthetic users cannot create sessions or reset passwords, which allows the munged email addresses, created by shared channels, to be used to receive email notifications and to reset passwords, when they are valid, functional emails.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://mattermost.com/security-updates
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2023-28036. | CVE ID: CVE-2023-28036
Date Updated: 2024-08-02T12:23:30.885Z
Date Published: 2023-06-23T10:01:57.598Z
Description:
Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/en-us/000212204/dsa-2023-099-dell-client-bios-security-update-for-multiple-improper-input-validation-vulnerabilities
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2022-3477. | CVE ID: CVE-2022-3477
Date Updated: 2024-08-03T01:14:01.441Z
Date Published: 2022-11-14T00:00:00
Description:
The tagDiv Composer WordPress plugin before 3.5, required by the Newspaper WordPress theme before 12.1 and Newsmag WordPress theme before 5.2.2, does not properly implement the Facebook login feature, allowing unauthenticated attackers to login as any user by just knowing their email address
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/993a95d2-6fce-48de-ae17-06ce2db829ef
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2017-17321. | CVE ID: CVE-2017-17321
Date Updated: 2024-08-05T20:51:30.745Z
Date Published: 2018-03-09T17:00:00
Description:
Huawei eNSP software with software of versions earlier than V100R002C00B510 has a buffer overflow vulnerability. Due to the improper validation of specific command line parameter, a local attacker could exploit this vulnerability to cause the software process abnormal.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180309-01-ensp-en
- http://www.securityfocus.com/bid/103425
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
|
Provide detailed information about CVE-2020-14787. | CVE ID: CVE-2020-14787
Date Updated: 2024-09-26T20:23:06.609Z
Date Published: 2020-10-21T14:04:25
Description:
Vulnerability in the Oracle Communications Diameter Signaling Router (DSR) product of Oracle Communications (component: User Interface). Supported versions that are affected are 8.0.0.0-8.4.0.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Communications Diameter Signaling Router (DSR). Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Communications Diameter Signaling Router (DSR), attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Communications Diameter Signaling Router (DSR) accessible data as well as unauthorized read access to a subset of Oracle Communications Diameter Signaling Router (DSR) accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuoct2020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |