instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-0471.
CVE ID: CVE-2022-0471 Date Updated: 2024-08-02T23:32:44.755Z Date Published: 2022-04-11T14:40:46 Description: The Favicon by RealFaviconGenerator WordPress plugin before 1.3.23 does not properly sanitise and escape the json_result_url parameter before outputting it back in the Favicon admin dashboard, leading to a Reflected Cross-Site Scripting issue No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/499bfee4-b481-4276-b6ad-0eead6680f66 - https://plugins.trac.wordpress.org/changeset/2695862 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21777.
CVE ID: CVE-2022-21777 Date Updated: 2024-08-03T02:53:36.239Z Date Published: 2022-07-06T13:07:31 Description: In Autoboot, there is a possible permission bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06713894; Issue ID: ALPS06713894. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/July-2022 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2385.
CVE ID: CVE-2018-2385 Date Updated: 2024-08-05T04:14:39.729Z Date Published: 2018-02-14T12:00:00 Description: Under certain conditions a malicious user provoking a divide by zero crash can prevent legitimate users from accessing the SAP Internet Graphics Server, 7.20, 7.20EXT, 7.45, 7.49, 7.53, and its services. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2525222 - https://blogs.sap.com/2018/02/13/sap-security-patch-day-february-2018/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19254.
CVE ID: CVE-2018-19254 Date Updated: 2019-01-08T19:57:01 Date Published: 2019-01-08T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1020.
CVE ID: CVE-2016-1020 Date Updated: 2024-08-05T22:38:41.532Z Date Published: 2016-04-09T01:00:00 Description: Adobe Flash Player before 18.0.0.343 and 19.x through 21.x before 21.0.0.213 on Windows and OS X and before 11.2.202.616 on Linux allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-1012, CVE-2016-1021, CVE-2016-1022, CVE-2016-1023, CVE-2016-1024, CVE-2016-1025, CVE-2016-1026, CVE-2016-1027, CVE-2016-1028, CVE-2016-1029, CVE-2016-1032, and CVE-2016-1033. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00044.html - http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00045.html - http://rhn.redhat.com/errata/RHSA-2016-0610.html - http://www.securityfocus.com/bid/85932 - http://www.securitytracker.com/id/1035509 - https://helpx.adobe.com/security/products/flash-player/apsb16-10.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3316.
CVE ID: CVE-2008-3316 Date Updated: 2024-08-07T09:37:26.409Z Date Published: 2008-07-25T16:00:00 Description: Cross-site scripting (XSS) vulnerability in the search feature in the Forum plugin before 2.7.1 for Geeklog allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, probably related to (1) public_html/index.php, (2) config.php, and (3) functions.inc. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/31188 - http://jvn.jp/en/jp/JVN60419863/index.html - http://www.geeklog.net/article.php/20080719093147449 - http://www.securityfocus.com/bid/30355 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43971 - http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000045.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T0855
The MITRE ATT&CK technique T0855: Unauthorized Command Message is related to the vulnerability CVE-CVE-2018-5459. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2024-2832.
CVE ID: CVE-2024-2832 Date Updated: 2024-08-01T19:25:41.995Z Date Published: 2024-03-23T06:00:05.613Z Description: A vulnerability classified as problematic was found in Campcodes Online Shopping System 1.0. This vulnerability affects unknown code of the file /offersmail.php. The manipulation of the argument email leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-257752. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.257752 - https://vuldb.com/?ctiid.257752 - https://github.com/comeony/vuln_report/blob/main/Online%20Shopping%20System%20-%20vuln%201.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46097.
CVE ID: CVE-2023-46097 Date Updated: 2024-08-02T20:37:39.332Z Date Published: 2023-11-14T11:04:19.007Z Description: A vulnerability has been identified in SIMATIC PCS neo (All versions < V4.1). The PUD Manager of affected products does not properly neutralize user provided inputs. This could allow an authenticated adjacent attacker to execute SQL statements in the underlying database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-456933.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17826.
CVE ID: CVE-2018-17826 Date Updated: 2024-08-05T10:54:10.893Z Date Published: 2018-10-01T08:00:00 Description: HisiPHP 1.0.8 allows CSRF via admin.php/admin/user/adduser.html to add an administrator account. The attacker can then use that account to execute arbitrary PHP code by leveraging app/common/model/AdminAnnex.php to add .php to the default list of allowable file-upload types (.jpg, .png, .gif, .jpeg, and .ico). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rakjong/vuln/blob/master/hisiphp_getshell.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-5117.
CVE ID: CVE-2010-5117 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2157.
CVE ID: CVE-2016-2157 Date Updated: 2024-08-05T23:17:50.707Z Date Published: 2016-05-22T20:00:00 Description: Cross-site request forgery (CSRF) vulnerability in mod/assign/adminmanageplugins.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allows remote attackers to hijack the authentication of administrators for requests that manage Assignment plugins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/03/21/1 - http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-53031 - https://moodle.org/mod/forum/discuss.php?d=330179 - http://www.securitytracker.com/id/1035333 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39223.
CVE ID: CVE-2024-39223 Date Updated: 2024-08-02T04:19:20.697Z Date Published: 2024-07-03T00:00:00 Description: An authentication bypass in the SSH service of gost v2.11.5 allows attackers to intercept communications via setting the HostKeyCallback function to ssh.InsecureIgnoreHostKey No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ginuerzh/gost/issues/1034 - https://github.com/ginuerzh/gost/blob/729d0e70005607dc7c69fc1de62fd8fe21f85355/ssh.go#L229 - https://gist.github.com/nyxfqq/a7242170b1118e78436a62dee4e09e8a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13049.
CVE ID: CVE-2019-13049 Date Updated: 2024-08-04T23:41:10.454Z Date Published: 2019-06-29T14:50:53 Description: An integer wrap in kernel/sys/syscall.c in ToaruOS 1.10.10 allows users to map arbitrary kernel pages into userland process space via TOARU_SYS_FUNC_MMAP, leading to escalation of privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/mehsauce/kowasuos/blob/master/exploits/kowasu-sysfunc-revenge.c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18189.
CVE ID: CVE-2019-18189 Date Updated: 2024-08-05T01:47:13.759Z Date Published: 2019-10-28T19:28:32 Description: A directory traversal vulnerability in Trend Micro Apex One, OfficeScan (11.0, XG) and Worry-Free Business Security (9.5, 10.0) may allow an attacker to bypass authentication and log on to an affected product's management console as a root user. The vulnerability does not require authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.trendmicro.com/solution/000151732 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3487.
CVE ID: CVE-2022-3487 Date Updated: 2023-04-02T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33641.
CVE ID: CVE-2022-33641 Date Updated: 2024-09-11T15:11:45.865Z Date Published: 2022-07-12T22:37:59 Description: Azure Site Recovery Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33641 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1790.
CVE ID: CVE-2018-1790 Date Updated: 2024-09-16T22:02:57.970Z Date Published: 2019-05-10T14:40:19.903410Z Description: IBM Financial Transaction Manager for Digital Payments for Multi-Platform 3.0.2 is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts. IBM X-Force ID: 148944. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ibm.com/support/docview.wss?uid=ibm10731607 - https://exchange.xforce.ibmcloud.com/vulnerabilities/148944 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15179.
CVE ID: CVE-2020-15179 Date Updated: 2024-08-04T13:08:22.438Z Date Published: 2020-09-15T18:10:13 Description: The ScratchSig extension for MediaWiki before version 1.0.1 allows stored Cross-Site Scripting. Using <script> tag inside <scratchsig> tag, attackers with edit permission can execute scripts on visitors' browser. With MediaWiki JavaScript API, this can potentially lead to privilege escalation and/or account takeover. This has been patched in release 1.0.1. This has already been deployed to all Scratch Wikis. No workarounds exist other than disabling the extension completely. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/InternationalScratchWiki/wiki-scratchsig/security/advisories/GHSA-gp9v-pg9f-vmp6 - https://github.com/InternationalScratchWiki/wiki-scratchsig/commit/4160a39a20eebeb63a59eb7597a91b961eca6388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28460.
CVE ID: CVE-2020-28460 Date Updated: 2024-09-17T02:56:56.365Z Date Published: 2020-12-22T13:05:14.404340Z Description: This affects the package multi-ini before 2.1.2. It is possible to pollute an object's prototype by specifying the constructor.proto object as part of an array. This is a bypass of CVE-2020-28448. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-MULTIINI-1053229 - https://github.com/evangelion1204/multi-ini/commit/6b2212b2ce152c19538a2431415f72942c5a1bde No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41969.
CVE ID: CVE-2023-41969 Date Updated: 2024-08-06T14:41:26.303Z Date Published: 2024-03-26T14:14:21.872Z Description: An arbitrary file deletion in ZSATrayManager where it protects the temporary encrypted ZApp issue reporting file from the unprivileged end user access and modification. Fixed version: Win ZApp 4.3.0 and later. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://help.zscaler.com/client-connector/client-connector-app-release-summary-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2819.
CVE ID: CVE-2009-2819 Date Updated: 2024-08-07T06:07:36.462Z Date Published: 2009-11-10T19:00:00 Description: AFP Client in Apple Mac OS X 10.5.8 allows remote AFP servers to execute arbitrary code or cause a denial of service (memory corruption and system crash) via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/36956 - http://www.vupen.com/english/advisories/2009/3184 - http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - http://support.apple.com/kb/HT3937 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11195.
CVE ID: CVE-2017-11195 Date Updated: 2024-08-05T18:05:28.610Z Date Published: 2017-07-12T20:00:00 Description: Pulse Connect Secure 8.3R1 has Reflected XSS in launchHelp.cgi. The helpLaunchPage parameter is reflected in an IFRAME element, if the value contains two quotes. It properly sanitizes quotes and tags, so one cannot simply close the src with a quote and inject after that. However, an attacker can use javascript: or data: to abuse this. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://twitter.com/sxcurity/status/884556905145937921 - http://www.sxcurity.pro/Multiple%20XSS%20and%20CSRF%20in%20Pulse%20Connect%20Secure%20v8.3R1.pdf - http://www.securityfocus.com/bid/99615 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9529.
CVE ID: CVE-2018-9529 Date Updated: 2024-08-05T07:24:55.977Z Date Published: 2018-11-14T18:00:00 Description: In ixheaacd_individual_ch_stream of ixheaacd_channel.c there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-9. Android ID: A-112551874 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2018-11-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3590.
CVE ID: CVE-2024-3590 Date Updated: 2024-08-21T20:51:24.611Z Date Published: 2024-05-09T06:00:02.736Z Description: The LetterPress WordPress plugin through 1.2.2 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks, such as delete arbitrary subscribers No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/829f4d40-e5b0-4009-b753-85ca2a5b3d25/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3433.
CVE ID: CVE-2017-3433 Date Updated: 2024-08-05T14:23:34.472Z Date Published: 2017-01-27T22:01:00 Description: Vulnerability in the Oracle One-to-One Fulfillment component of Oracle E-Business Suite (subcomponent: User Interface). Supported versions that are affected are 12.1.1, 12.1.2, 12.1.3, 12.2.3, 12.2.4, 12.2.5 and 12.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle One-to-One Fulfillment. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle One-to-One Fulfillment, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle One-to-One Fulfillment accessible data as well as unauthorized update, insert or delete access to some of Oracle One-to-One Fulfillment accessible data. CVSS v3.0 Base Score 8.2 (Confidentiality and Integrity impacts). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/95569 - http://www.oracle.com/technetwork/security-advisory/cpujan2017-2881727.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5815.
CVE ID: CVE-2016-5815 Date Updated: 2024-08-06T01:15:09.863Z Date Published: 2017-02-13T21:00:00 Description: An issue was discovered on Schneider Electric IONXXXX series power meters ION73XX series, ION75XX series, ION76XX series, ION8650 series, ION8800 series, and PM5XXX series. No authentication is configured by default. An unauthorized user can access the device management portal and make configuration changes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/94091 - https://ics-cert.us-cert.gov/advisories/ICSA-16-308-03 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27313.
CVE ID: CVE-2023-27313 Date Updated: 2024-09-17T17:26:14.223Z Date Published: 2023-10-12T18:22:28.435Z Description: SnapCenter versions 3.x and 4.x prior to 4.9 are susceptible to a vulnerability which may allow an authenticated unprivileged user to gain access as an admin user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/ntap-20230713-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3414.
CVE ID: CVE-2015-3414 Date Updated: 2024-08-06T05:47:57.689Z Date Published: 2015-04-24T17:00:00 Description: SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-1635.html - http://www.securitytracker.com/id/1033703 - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.securityfocus.com/bid/74228 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html - https://security.gentoo.org/glsa/201507-05 - http://www.ubuntu.com/usn/USN-2698-1 - http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html - https://support.apple.com/HT205267 - http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html - https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:217 - https://support.apple.com/HT205213 - http://www.debian.org/security/2015/dsa-3252 - http://seclists.org/fulldisclosure/2015/Apr/31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3451.
CVE ID: CVE-2010-3451 Date Updated: 2024-08-07T03:11:44.055Z Date Published: 2011-01-28T21:13:00 Description: Use-after-free vulnerability in oowriter in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via malformed tables in an RTF document. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/40775 - http://www.securityfocus.com/bid/46031 - http://www.debian.org/security/2011/dsa-2151 - http://secunia.com/advisories/60799 - http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html - http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml - http://secunia.com/advisories/43118 - http://secunia.com/advisories/43065 - http://www.vupen.com/english/advisories/2011/0230 - http://osvdb.org/70712 - https://exchange.xforce.ibmcloud.com/vulnerabilities/65030 - http://www.securitytracker.com/id?1025002 - http://www.openoffice.org/security/cves/CVE-2010-3451_CVE-2010-3452.html - http://www.vupen.com/english/advisories/2011/0232 - http://www.redhat.com/support/errata/RHSA-2011-0182.html - https://bugzilla.redhat.com/show_bug.cgi?id=641282 - http://ubuntu.com/usn/usn-1056-1 - http://www.redhat.com/support/errata/RHSA-2011-0181.html - http://www.vupen.com/english/advisories/2011/0279 - http://secunia.com/advisories/43105 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:027 - http://www.vsecurity.com/resources/advisory/20110126-1 - http://www.cs.brown.edu/people/drosenbe/research.html - http://secunia.com/advisories/42999 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1581.
CVE ID: CVE-2022-1581 Date Updated: 2024-08-03T00:10:03.682Z Date Published: 2022-11-21T00:00:00 Description: The WP-Polls WordPress plugin before 2.76.0 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based limitations to vote in certain situations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/c1896ab9-9585-40e2-abbf-ef5153b3c6b2 - https://www.hightechdad.com/2009/12/21/warning-wp-polls-wordpress-poll-plugin-can-be-exploited/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38724.
CVE ID: CVE-2024-38724 Date Updated: 2024-08-14T18:22:57.290Z Date Published: 2024-08-13T10:16:08.596Z Description: Cross-Site Request Forgery (CSRF), Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Muhammad Rehman Contact Form 7 Summary and Print allows Stored XSS.This issue affects Contact Form 7 Summary and Print: from n/a through 1.2.5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/cf7-summary-and-print/wordpress-contact-form-7-summary-and-print-plugin-1-2-5-cross-site-request-forgery-csrf-to-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2662.
CVE ID: CVE-2015-2662 Date Updated: 2024-08-06T05:24:37.875Z Date Published: 2015-07-16T10:00:00 Description: Unspecified vulnerability in Oracle Sun Solaris 10 and 11.2 allows local users to affect availability via vectors related to DHCP Server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html - http://www.securitytracker.com/id/1032914 - http://www.securityfocus.com/bid/75886 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42873.
CVE ID: CVE-2023-42873 Date Updated: 2024-08-28T19:45:18.907Z Date Published: 2024-02-21T06:41:59.491Z Description: The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.1, tvOS 17.1, macOS Monterey 12.7.1, iOS 16.7.2 and iPadOS 16.7.2, iOS 17.1 and iPadOS 17.1, macOS Ventura 13.6.1. An app may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213981 - https://support.apple.com/en-us/HT213987 - https://support.apple.com/en-us/HT213984 - https://support.apple.com/en-us/HT213985 - https://support.apple.com/en-us/HT213982 - https://support.apple.com/en-us/HT213983 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36149.
CVE ID: CVE-2022-36149 Date Updated: 2024-08-03T10:00:04.395Z Date Published: 2022-08-16T20:13:39 Description: tifig v0.2.2 was discovered to contain a heap-use-after-free via temInfoEntry(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/monostream/tifig/issues/70 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6656.
CVE ID: CVE-2014-6656 Date Updated: 2024-08-06T12:24:34.304Z Date Published: 2014-09-23T10:00:00 Description: The drareym (aka com.drareym) application 0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/856441 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1090.
CVE ID: CVE-2009-1090 Date Updated: 2024-08-07T04:57:17.932Z Date Published: 2009-03-25T18:00:00 Description: Directory traversal vulnerability in upload.php in Rapidleech rev.36 and earlier allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the uploaded parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/49256 - http://osvdb.org/52753 - http://security.bkis.vn/?p=345 - http://secunia.com/advisories/34300 - http://www.securityfocus.com/bid/34119 - http://www.securityfocus.com/archive/1/501854/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1291.
CVE ID: CVE-2015-1291 Date Updated: 2024-08-06T04:40:17.840Z Date Published: 2015-09-03T22:00:00 Description: The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2015-11/msg00013.html - http://googlechromereleases.blogspot.com/2015/09/stable-channel-update.html - https://src.chromium.org/viewvc/blink?revision=200098&view=revision - http://rhn.redhat.com/errata/RHSA-2015-1712.html - http://www.securitytracker.com/id/1033472 - http://lists.opensuse.org/opensuse-updates/2015-09/msg00029.html - http://www.debian.org/security/2015/dsa-3351 - https://security.gentoo.org/glsa/201603-09 - https://code.google.com/p/chromium/issues/detail?id=516377 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21741.
CVE ID: CVE-2022-21741 Date Updated: 2024-08-03T02:53:35.486Z Date Published: 2022-02-03T14:27:31 Description: Tensorflow is an Open Source Machine Learning Framework. ### Impact An attacker can craft a TFLite model that would trigger a division by zero in the implementation of depthwise convolutions. The parameters of the convolution can be user controlled and are also used within a division operation to determine the size of the padding that needs to be added before applying the convolution. There is no check before this division that the divisor is strictly positive. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj - https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc - https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000466.
CVE ID: CVE-2017-1000466 Date Updated: 2024-09-16T22:19:51.802Z Date Published: 2018-01-03T01:00:00Z Description: Invoice Ninja version 3.8.1 is vulnerable to stored cross-site scripting vulnerability, within the invoice creation page, which can result in disruption of service and execution of javascript code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/invoiceninja/invoiceninja/issues/1727 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4057.
CVE ID: CVE-2021-4057 Date Updated: 2024-08-03T17:16:03.325Z Date Published: 2021-12-23T00:45:41 Description: Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html - https://crbug.com/1262183 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W46HRT2UVHWSLZB6JZHQF6JNQWKV744/ - http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html - https://www.debian.org/security/2022/dsa-5046 - https://security.gentoo.org/glsa/202208-25 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3885.
CVE ID: CVE-2022-3885 Date Updated: 2024-08-03T01:20:58.436Z Date Published: 2022-11-09T00:00:00 Description: Use after free in V8 in Google Chrome prior to 107.0.5304.106 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/11/stable-channel-update-for-desktop.html - https://crbug.com/1377816 - https://www.debian.org/security/2022/dsa-5275 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2765.
CVE ID: CVE-2024-2765 Date Updated: 2024-08-01T19:25:41.464Z Date Published: 2024-05-02T16:52:21.806Z Description: The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Skype and Spotify URL parameters in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/86ddd5fd-137b-478e-952e-b36fc6a5c28d?source=cve - https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L472 - https://github.com/ultimatemember/ultimatemember/blob/de04d89a49dfb9baf4019ea77b1edfbcd17fd849/includes/core/um-filters-fields.php#L117 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3067953%40ultimate-member&new=3067953%40ultimate-member&sfp_email=&sfph_mail= - https://github.com/ultimatemember/ultimatemember/pull/1491/files No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6437.
CVE ID: CVE-2013-6437 Date Updated: 2024-08-06T17:39:01.271Z Date Published: 2014-03-06T15:00:00 Description: The libvirt driver in OpenStack Compute (Nova) before 2013.2.2 and icehouse before icehouse-2 allows remote authenticated users to cause a denial of service (disk consumption) by creating and deleting instances with unique os_type settings, which triggers the creation of a new ephemeral disk backing file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2014-0231.html - http://lists.openstack.org/pipermail/openstack-announce/2013-December/000179.html - https://bugs.launchpad.net/nova/+bug/1253980 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2019-15994
CVE-CVE-2019-15994 is a vulnerability in Cisco Stealthwatch Enterprise. It is related to the MITRE ATT&CK technique T1204.001: Malicious Link. The vulnerability is classified as a exploitation_technique type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2017-11906.
CVE ID: CVE-2017-11906 Date Updated: 2024-09-16T22:24:37.662Z Date Published: 2017-12-12T21:00:00Z Description: Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11887 and CVE-2017-11919. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102078 - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11906 - http://www.securitytracker.com/id/1039993 - https://www.exploit-db.com/exploits/43372/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27943.
CVE ID: CVE-2023-27943 Date Updated: 2024-08-02T12:23:30.456Z Date Published: 2023-05-08T00:00:00 Description: This issue was addressed with improved checks. This issue is fixed in macOS Ventura 13.3, iOS 16.4 and iPadOS 16.4. Files downloaded from the internet may not have the quarantine flag applied. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213670 - https://support.apple.com/en-us/HT213676 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0336.
CVE ID: CVE-2023-0336 Date Updated: 2024-08-02T05:10:55.578Z Date Published: 2023-03-27T15:37:38.218Z Description: The OoohBoi Steroids for Elementor WordPress plugin before 2.1.5 has CSRF and broken access control vulnerabilities which leads user with role as low as subscriber to delete attachment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/ac74df9a-6fbf-4411-a501-97eba1ad1895 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1556.009 : Conditional Access Policies
Name: Conditional Access Policies ID: T1556.009 URL: https://attack.mitre.org/techniques/T1556/009 Platforms: Azure AD, SaaS, IaaS Kill Chain Phases: Credential Access, Defense Evasion, Persistence Description: Adversaries may disable or modify conditional access policies to enable persistent access to compromised accounts. Conditional access policies are additional verifications used by identity providers and identity and access management systems to determine whether a user should be granted access to a resource. For example, in Azure AD, Okta, and JumpCloud, users can be denied access to applications based on their IP address, device enrollment status, and use of multi-factor authentication.(Citation: Microsoft Conditional Access)(Citation: JumpCloud Conditional Access Policies)(Citation: Okta Conditional Access Policies) In some cases, identity providers may also support the use of risk-based metrics to deny sign-ins based on a variety of indicators. In AWS and GCP, IAM policies can contain `condition` attributes that verify arbitrary constraints such as the source IP, the date the request was made, and the nature of the resources or regions being requested.(Citation: AWS IAM Conditions)(Citation: GCP IAM Conditions) These measures help to prevent compromised credentials from resulting in unauthorized access to data or resources, as well as limit user permissions to only those required. By modifying conditional access policies, such as adding additional trusted IP ranges, removing [Multi-Factor Authentication](T1556.006) requirements, or allowing additional [Unused/Unsupported Cloud Regions](T1535), adversaries may be able to ensure persistent access to accounts and circumvent defensive measures. Data Sources: Active Directory: Active Directory Object Modification, Cloud Service: Cloud Service Modification Detection:
Provide detailed information about CVE-2008-3764.
CVE ID: CVE-2008-3764 Date Updated: 2024-08-07T09:52:59.926Z Date Published: 2008-08-21T17:00:00 Description: Eval injection vulnerability in globalsoff.php in Turnkey PHP Live Helper 2.0.1 and earlier allows remote attackers to execute arbitrary PHP code via the test parameter, and probably arbitrary parameters, to chat.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/6261 - http://securityreason.com/securityalert/4178 - http://www.securityfocus.com/archive/1/495542/100/0/threaded - http://www.securityfocus.com/bid/30729 - http://demos.turnkeywebtools.com/phplivehelper/docs/change_log.txt - http://secunia.com/advisories/31521 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44571 - http://www.gulftech.org/?node=research&article_id=00124-08162008 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6218.
CVE ID: CVE-2024-6218 Date Updated: 2024-08-01T21:33:05.211Z Date Published: 2024-06-21T02:00:06.482Z Description: A vulnerability, which was classified as critical, has been found in itsourcecode Vehicle Management System 1.0. Affected by this issue is some unknown functionality of the file busprofile.php. The manipulation of the argument busid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-269282 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.269282 - https://vuldb.com/?ctiid.269282 - https://vuldb.com/?submit.360697 - https://github.com/HryspaHodor/CVE/issues/7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1830.
CVE ID: CVE-2014-1830 Date Updated: 2024-08-06T09:50:11.480Z Date Published: 2014-10-15T14:00:00 Description: Requests (aka python-requests) before 2.3.0 allows remote servers to obtain sensitive information by reading the Proxy-Authorization header in a redirected request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=733108 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:133 - http://lists.opensuse.org/opensuse-updates/2016-01/msg00095.html - https://github.com/kennethreitz/requests/issues/1885 - http://www.debian.org/security/2015/dsa-3146 - http://advisories.mageia.org/MGASA-2014-0409.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47345.
CVE ID: CVE-2021-47345 Date Updated: 2024-09-11T17:33:48.847Z Date Published: 2024-05-21T14:35:51.621Z Description: In the Linux kernel, the following vulnerability has been resolved: RDMA/cma: Fix rdma_resolve_route() memory leak Fix a memory leak when "mda_resolve_route() is called more than once on the same "rdma_cm_id". This is possible if cma_query_handler() triggers the RDMA_CM_EVENT_ROUTE_ERROR flow which puts the state machine back and allows rdma_resolve_route() to be called again. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/40b613db3a95bc27998e4097d74c2f7e5d083a0b - https://git.kernel.org/stable/c/e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a - https://git.kernel.org/stable/c/e4e062da082a199357ba4911145f331d40139ad8 - https://git.kernel.org/stable/c/4893c938f2a140a74be91779e45e4a7fa111198f - https://git.kernel.org/stable/c/032c68b4f5be128a2167f35b558b7cec88fe4972 - https://git.kernel.org/stable/c/3d08b5917984f737f32d5bee9737b9075c3895c6 - https://git.kernel.org/stable/c/f4f553d67236145fa5fd203ed7b35b9377e19939 - https://git.kernel.org/stable/c/07583ba2e2d8947c3d365d97608cb436510885ac - https://git.kernel.org/stable/c/74f160ead74bfe5f2b38afb4fcf86189f9ff40c9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3578.
CVE ID: CVE-2010-3578 Date Updated: 2024-08-07T03:11:44.477Z Date Published: 2010-10-14T17:00:00 Description: Unspecified vulnerability in Oracle OpenSolaris allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Depot Server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuoct2010-175626.html - http://www.us-cert.gov/cas/techalerts/TA10-287A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3010.
CVE ID: CVE-2016-3010 Date Updated: 2024-08-05T23:40:14.457Z Date Published: 2016-09-01T10:00:00 Description: Cross-site scripting (XSS) vulnerability in the Web UI in IBM Connections 4.0 through CR4, 4.5 through CR5, 5.0 before CR4, and 5.5 before CR1 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors, a different vulnerability than CVE-2016-2995, CVE-2016-2997, and CVE-2016-3005. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21988991 - http://www-01.ibm.com/support/docview.wss?uid=swg1LO89929 - http://www.securityfocus.com/bid/92583 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0891.
CVE ID: CVE-2009-0891 Date Updated: 2024-08-07T04:48:52.633Z Date Published: 2009-03-25T01:00:00 Description: The Web Services Security component in IBM WebSphere Application Server 7.0 before Fix Pack 1 (7.0.0.1), 6.1 before Fix Pack 23 (6.1.0.23),and 6.0.2 before Fix Pack 33 (6.0.2.33) does not properly enforce (1) nonce and (2) timestamp expiration values in WS-Security bindings as stored in the com.ibm.wsspi.wssecurity.core custom property, which allows remote authenticated users to conduct session hijacking attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg27007951 - http://secunia.com/advisories/34131 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49391 - http://www-01.ibm.com/support/docview.wss?uid=swg27006876 - http://www-01.ibm.com/support/docview.wss?uid=swg27014463 - http://www-1.ibm.com/support/search.wss?rs=0&q=PK66676&apar=only No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7053.
CVE ID: CVE-2020-7053 Date Updated: 2024-08-04T09:18:03.128Z Date Published: 2020-01-14T20:04:02 Description: In the Linux kernel 4.14 longterm through 4.14.165 and 4.19 longterm through 4.19.96 (and 5.x before 5.2), there is a use-after-free (write) in the i915_ppgtt_close function in drivers/gpu/drm/i915/i915_gem_gtt.c, aka CID-7dc40713618c. This is related to i915_gem_context_destroy_ioctl in drivers/gpu/drm/i915/i915_gem_context.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lore.kernel.org/stable/20200114183937.12224-1-tyhicks%40canonical.com - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2 - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7dc40713618c884bf07c030d1ab1f47a9dc1f310 - https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1859522 - https://usn.ubuntu.com/4255-1/ - https://usn.ubuntu.com/4255-2/ - https://security.netapp.com/advisory/ntap-20200204-0002/ - http://packetstormsecurity.com/files/156455/Kernel-Live-Patch-Security-Notice-LSN-0063-1.html - https://usn.ubuntu.com/4285-1/ - https://usn.ubuntu.com/4287-1/ - https://usn.ubuntu.com/4287-2/ - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18535.
CVE ID: CVE-2019-18535 Date Updated: 2019-10-28T14:42:38 Date Published: 2019-10-28T14:42:38 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6902.
CVE ID: CVE-2013-6902 Date Updated: 2024-08-06T17:53:45.553Z Date Published: 2013-12-05T11:00:00 Description: Cross-site scripting (XSS) vulnerability in the Space function in Cybozu Garoon before 3.7.0 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://cs.cybozu.co.jp/information/20131202up01.php - https://support.cybozu.com/ja-jp/article/5838 - http://jvndb.jvn.jp/jvndb/JVNDB-2013-000113 - http://jvn.jp/en/jp/JVN23981867/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21730.
CVE ID: CVE-2023-21730 Date Updated: 2024-08-02T09:51:51.293Z Date Published: 2023-01-10T00:00:00 Description: Microsoft Cryptographic Services Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21730 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4506.
CVE ID: CVE-2022-4506 Date Updated: 2024-08-03T01:41:45.658Z Date Published: 2022-12-15T00:00:00 Description: Unrestricted Upload of File with Dangerous Type in GitHub repository openemr/openemr prior to 7.0.0.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/f423d193-4ab0-4f03-ad90-25e4f02e7942 - https://github.com/openemr/openemr/commit/2e7678d812df167ea3c0756382408b670e8aa51f - https://www.cve.org/CVERecord?id=CVE-2022-4506 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3560.
CVE ID: CVE-2011-3560 Date Updated: 2024-08-06T23:37:48.238Z Date Published: 2011-10-19T21:00:00 Description: Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE JDK and JRE 7, 6 Update 27 and earlier, 5.0 Update 31 and earlier, and 1.4.2_33 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://secunia.com/advisories/48692 - http://marc.info/?l=bugtraq&m=134254866602253&w=2 - http://marc.info/?l=bugtraq&m=133365109612558&w=2 - http://secunia.com/advisories/48308 - http://marc.info/?l=bugtraq&m=132750579901589&w=2 - http://lists.opensuse.org/opensuse-security-announce/2012-05/msg00009.html - http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00049.html - http://osvdb.org/76507 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14394 - http://rhn.redhat.com/errata/RHSA-2013-1455.html - http://marc.info/?l=bugtraq&m=132750579901589&w=2 - http://secunia.com/advisories/48948 - http://www.redhat.com/support/errata/RHSA-2011-1384.html - http://secunia.com/advisories/48915 - http://www.oracle.com/technetwork/topics/security/javacpuoct2011-443431.html - http://rhn.redhat.com/errata/RHSA-2012-0508.html - http://marc.info/?l=bugtraq&m=134254957702612&w=2 - http://secunia.com/advisories/49198 - http://www.redhat.com/support/errata/RHSA-2012-0006.html - http://lists.opensuse.org/opensuse-security-announce/2012-01/msg00051.html - http://marc.info/?l=bugtraq&m=133728004526190&w=2 - https://exchange.xforce.ibmcloud.com/vulnerabilities/70834 - http://www.securityfocus.com/bid/50236 - http://marc.info/?l=bugtraq&m=133365109612558&w=2 - http://marc.info/?l=bugtraq&m=133728004526190&w=2 - http://www.securitytracker.com/id?1026215 - http://www.ubuntu.com/usn/USN-1263-1 - http://marc.info/?l=bugtraq&m=134254957702612&w=2 - http://www.ibm.com/developerworks/java/jdk/alerts/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38065.
CVE ID: CVE-2024-38065 Date Updated: 2024-09-19T17:36:55.239Z Date Published: 2024-07-09T17:03:16.225Z Description: Secure Boot Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38065 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16551.
CVE ID: CVE-2018-16551 Date Updated: 2024-08-05T10:24:32.995Z Date Published: 2018-09-05T22:00:00 Description: LavaLite 5.5 has XSS via a /edit URI, as demonstrated by client/job/job/Zy8PWBekrJ/edit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/LavaLite/cms/issues/259 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4261.
CVE ID: CVE-2019-4261 Date Updated: 2024-09-17T03:43:43.454Z Date Published: 2019-08-05T13:40:15.514791Z Description: IBM WebSphere MQ V7.1, 7.5, IBM MQ V8, IBM MQ V9.0LTS, IBM MQ V9.1 LTS, and IBM MQ V9.1 CD are vulnerable to a denial of service attack caused by specially crafted messages. IBM X-Force ID: 160013. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/docview.wss?uid=ibm10886887 - https://exchange.xforce.ibmcloud.com/vulnerabilities/160013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28310.
CVE ID: CVE-2021-28310 Date Updated: 2024-08-03T21:40:14.187Z Date Published: 2021-04-13T19:32:47 Description: Win32k Elevation of Privilege Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28310 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10252.
CVE ID: CVE-2020-10252 Date Updated: 2024-08-04T10:58:39.998Z Date Published: 2021-02-19T06:12:52 Description: An issue was discovered in ownCloud before 10.4. Because of an SSRF issue (via the apps/files_sharing/external remote parameter), an authenticated attacker can interact with local services blindly (aka Blind SSRF) or conduct a Denial Of Service attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://owncloud.org/changelog/server/ - https://blog.hacktivesecurity.com/index.php?controller=post&action=view&id_post=44 - https://owncloud.com/security-advisories/ssrf-in-add-to-your-owncloud-functionality/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13618.
CVE ID: CVE-2019-13618 Date Updated: 2024-08-04T23:57:39.520Z Date Published: 2019-07-16T16:07:17 Description: In GPAC before 0.8.0, isomedia/isom_read.c in libgpac.a has a heap-based buffer over-read, as demonstrated by a crash in gf_m2ts_sync in media_tools/mpegts.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gpac/gpac/issues/1250 - https://github.com/gpac/gpac/compare/440d475...6b4ab40 - https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1479.
CVE ID: CVE-2012-1479 Date Updated: 2024-08-06T19:01:01.572Z Date Published: 2012-03-14T01:00:00 Description: Unspecified vulnerability in the AContact (com.movester.quickcontact) application 1.8.2 for Android has unknown impact and attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www4.comp.polyu.edu.hk/~appsec/bugs/CVE-2012-1479-vulnerability-in-AContact.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/74025 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28791.
CVE ID: CVE-2023-28791 Date Updated: 2024-09-19T14:47:07.689Z Date Published: 2023-10-06T13:01:43.555Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Gangesh Matta Simple Org Chart plugin <= 2.3.4 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/simple-org-chart/wordpress-simple-org-chart-plugin-2-3-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3648.
CVE ID: CVE-2014-3648 Date Updated: 2024-08-06T10:50:18.312Z Date Published: 2022-07-01T13:16:16 Description: The simplepush server iterates through the application installations and pushes a notification to the server provided by deviceToken. But this is user controlled. If a bogus applications is registered with bad deviceTokens, one can generate endless exceptions when those endpoints can't be reached or can slow the server down by purposefully wasting it's time with slow endpoints. Similarly, one can provide whatever HTTP end point they want. This turns the server into a DDOS vector or an anonymizer for the posting of malware and so on. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://issues.redhat.com/browse/AEROGEAR-6091 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7867.
CVE ID: CVE-2016-7867 Date Updated: 2024-08-06T02:13:20.317Z Date Published: 2016-12-15T06:31:00 Description: Adobe Flash Player versions 23.0.0.207 and earlier, 11.2.202.644 and earlier have an exploitable buffer overflow / underflow vulnerability in the RegExp class related to bookmarking in searches. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00064.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-154 - http://www.securityfocus.com/bid/94871 - https://security.gentoo.org/glsa/201701-17 - http://www.securitytracker.com/id/1037442 - http://www.zerodayinitiative.com/advisories/ZDI-16-622 - http://rhn.redhat.com/errata/RHSA-2016-2947.html - https://helpx.adobe.com/security/products/flash-player/apsb16-39.html - http://lists.opensuse.org/opensuse-updates/2016-12/msg00112.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34352.
CVE ID: CVE-2023-34352 Date Updated: 2024-09-30T18:01:46.179Z Date Published: 2023-09-06T01:36:42.163Z Description: A permissions issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Ventura 13.4, tvOS 16.5, iOS 16.5 and iPadOS 16.5, watchOS 9.5. An attacker may be able to leak user account emails. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213758 - https://support.apple.com/en-us/HT213764 - https://support.apple.com/en-us/HT213757 - https://support.apple.com/en-us/HT213761 - https://support.apple.com/kb/HT213757 - https://support.apple.com/kb/HT213761 - https://support.apple.com/kb/HT213764 - https://support.apple.com/kb/HT213758 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5390.
CVE ID: CVE-2023-5390 Date Updated: 2024-08-02T07:59:44.316Z Date Published: 2024-01-31T17:46:39.809Z Description: An attacker could potentially exploit this vulnerability, leading to files being read from the Honeywell Experion ControlEdge VirtualUOC and ControlEdge UOC. This exploit could be used to read files from the controller that may expose limited information from the device. Honeywell recommends updating to the most recent version of the product. See Honeywell Security Notification for recommendations on upgrading and versioning. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://process.honeywell.com - https://www.honeywell.com/us/en/product-security No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1192.
CVE ID: CVE-2012-1192 Date Updated: 2024-09-16T18:08:20.003Z Date Published: 2012-02-17T22:00:00Z Description: The resolver in Unbound before 1.4.11 overwrites cached server names and TTL values in NS records during the processing of a response to an A record query, which allows remote attackers to trigger continued resolvability of revoked domain names via a "ghost domain names" attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.isc.org/files/imce/ghostdomain_camera.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2992.
CVE ID: CVE-2019-2992 Date Updated: 2024-10-01T16:24:21.147Z Date Published: 2019-10-16T17:40:58 Description: Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: 2D). Supported versions that are affected are Java SE: 7u231, 8u221, 11.0.4 and 13; Java SE Embedded: 8u221. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.0 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - https://access.redhat.com/errata/RHSA-2019:3134 - https://access.redhat.com/errata/RHSA-2019:3135 - https://security.netapp.com/advisory/ntap-20191017-0001/ - https://access.redhat.com/errata/RHSA-2019:3136 - https://www.debian.org/security/2019/dsa-4546 - https://seclists.org/bugtraq/2019/Oct/27 - https://seclists.org/bugtraq/2019/Oct/31 - https://www.debian.org/security/2019/dsa-4548 - https://access.redhat.com/errata/RHSA-2019:3157 - https://access.redhat.com/errata/RHSA-2019:3158 - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00064.html - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00066.html - https://access.redhat.com/errata/RHSA-2019:4110 - https://access.redhat.com/errata/RHSA-2019:4109 - https://lists.debian.org/debian-lts-announce/2019/12/msg00005.html - https://access.redhat.com/errata/RHSA-2019:4113 - https://access.redhat.com/errata/RHSA-2019:4115 - http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00031.html - https://usn.ubuntu.com/4223-1/ - https://access.redhat.com/errata/RHSA-2020:0006 - https://access.redhat.com/errata/RHSA-2020:0046 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-4254.
CVE ID: CVE-2012-4254 Date Updated: 2024-08-06T20:28:07.681Z Date Published: 2012-08-13T18:00:00 Description: MySQLDumper 1.24.4 allows remote attackers to obtain sensitive information (Notices) via a direct request to (1) learn/cubemail/restore.php or (2) learn/cubemail/dump.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.org/files/112304/MySQLDumper-1.24.4-LFI-XSS-CSRF-Code-Execution-Traversal.html - http://www.securityfocus.com/bid/53306 - https://exchange.xforce.ibmcloud.com/vulnerabilities/75287 - http://www.osvdb.org/81616 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0734.
CVE ID: CVE-2019-0734 Date Updated: 2024-08-04T17:58:57.314Z Date Published: 2019-05-16T18:17:00 Description: An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully decode and replace authentication request using Kerberos, allowing an attacker to be validated as an Administrator.The update addresses this vulnerability by changing how these requests are validated., aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-0936. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0734 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46059.
CVE ID: CVE-2021-46059 Date Updated: 2022-01-15T15:04:32 Date Published: 2022-01-07T22:39:33 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1470.
CVE ID: CVE-2014-1470 Date Updated: 2017-08-28T12:57:01 Date Published: 2014-08-18T10:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4937.
CVE ID: CVE-2013-4937 Date Updated: 2024-09-17T02:46:42.662Z Date Published: 2013-07-26T10:00:00Z Description: Multiple unspecified vulnerabilities in the AiCloud feature on the ASUS RT-AC66U, RT-N66U, RT-N65U, RT-N14U, RT-N16, RT-N56U, and DSL-N55U with firmware before 3.0.4.372 have unknown impact and attack vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://reviews.cnet.com/8301-3132_7-57594003-98 - http://twitter.com/ASUSUSA/statuses/357612236392509440 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8411.
CVE ID: CVE-2019-8411 Date Updated: 2024-08-04T21:17:31.322Z Date Published: 2019-02-17T19:00:00 Description: admin/dl_data.php in zzcms 2018 (2018-10-19) allows remote attackers to delete arbitrary files via action=del&filename=../ directory traversal. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/615/VulnPoC/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2969.
CVE ID: CVE-2011-2969 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2254.
CVE ID: CVE-2015-2254 Date Updated: 2024-08-06T05:10:15.861Z Date Published: 2019-03-13T16:00:00 Description: Huawei OceanStor UDS devices with software before V100R002C01SPC102 might allow remote attackers to capture and change patch loading information resulting in the deletion of directory files and compromise of system functions when loading a patch. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/hw-417839 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0247.
CVE ID: CVE-2015-0247 Date Updated: 2024-08-06T04:03:10.673Z Date Published: 2015-02-17T15:00:00 Description: Heap-based buffer overflow in openfs.c in the libext2fs library in e2fsprogs before 1.42.12 allows local users to execute arbitrary code via crafted block group descriptor data in a filesystem image. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201701-06 - http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150606.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/100740 - http://www.securityfocus.com/archive/1/534633/100/0/threaded - http://www.debian.org/security/2015/dsa-3166 - http://lists.opensuse.org/opensuse-updates/2015-06/msg00010.html - http://advisories.mageia.org/MGASA-2015-0061.html - http://packetstormsecurity.com/files/130283/e2fsprogs-Input-Sanitization.html - http://www.ocert.org/advisories/ocert-2015-002.html - http://lists.fedoraproject.org/pipermail/package-announce/2015-March/150805.html - http://www.ubuntu.com/usn/USN-2507-1 - http://www.securityfocus.com/bid/72520 - http://git.kernel.org/cgit/fs/ext2/e2fsprogs.git/commit/?id=f66e6ce4 - http://lists.fedoraproject.org/pipermail/package-announce/2015-February/149434.html - http://www.mandriva.com/security/advisories?name=MDVSA-2015:045 - http://www.mandriva.com/security/advisories?name=MDVSA-2015:067 - https://bugzilla.redhat.com/show_bug.cgi?id=1187032 - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00019.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24826.
CVE ID: CVE-2023-24826 Date Updated: 2024-08-02T11:03:19.278Z Date Published: 2023-05-30T16:07:45.208Z Description: RIOT-OS, an operating system for Internet of Things (IoT) devices, contains a network stack with the ability to process 6LoWPAN frames. Prior to version 2023.04, an attacker can send crafted frames to the device to trigger the usage of an uninitialized object leading to denial of service. This issue is fixed in version 2023.04. As a workaround, disable fragment forwarding or SFR. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-xfj4-9g7w-f4gh - https://github.com/RIOT-OS/RIOT/commit/287f030af20e829469cdf740606148018a5a220d - https://github.com/RIOT-OS/RIOT/blob/ccbb304eae7b59e8aca24a6ffd095b5b3f7720ee/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L402 - https://github.com/RIOT-OS/RIOT/blob/ccbb304eae7b59e8aca24a6ffd095b5b3f7720ee/sys/net/gnrc/network_layer/sixlowpan/frag/sfr/gnrc_sixlowpan_frag_sfr.c#L420 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1712.
CVE ID: CVE-2024-1712 Date Updated: 2024-08-01T18:48:21.840Z Date Published: 2024-04-15T05:00:04.271Z Description: The Carousel Slider WordPress plugin before 2.2.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/23805a61-9fcd-4744-a60d-05c8cb43ee01/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13950.
CVE ID: CVE-2019-13950 Date Updated: 2024-08-05T00:05:43.911Z Date Published: 2019-07-18T15:57:04 Description: index.php?c=admin&a=index in SyGuestBook A5 Version 1.2 has stored XSS via a reply to a comment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fragrant10.github.io/2019/02/22/SyGuestBookA5%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.html - https://github.com/fragrant10/fragrant10.github.io/blob/master/_posts/2019-02-22-SyGuestBookA5%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43300.
CVE ID: CVE-2023-43300 Date Updated: 2024-08-02T19:37:23.389Z Date Published: 2023-12-07T00:00:00 Description: An issue in urban_project mini-app on Line v13.6.1 allows attackers to send crafted malicious notifications via leakage of the channel access token. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/syz913/CVE-reports/blob/main/CVE-2023-43300.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12446.
CVE ID: CVE-2020-12446 Date Updated: 2024-08-04T11:56:51.975Z Date Published: 2020-04-29T13:54:28 Description: The ene.sys driver in G.SKILL Trident Z Lighting Control through 1.00.08 exposes mapping and un-mapping of physical memory, reading and writing to Model Specific Register (MSR) registers, and input from and output to I/O ports to local non-privileged users. This leads to privilege escalation to NT AUTHORITY\SYSTEM. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/active-labs/Advisories/blob/master/2020/ACTIVE-2020-003.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2957.
CVE ID: CVE-2008-2957 Date Updated: 2024-08-07T09:21:34.603Z Date Published: 2008-07-01T22:00:00 Description: The UPnP functionality in Pidgin 2.0.0, and possibly other versions, allows remote attackers to trigger the download of arbitrary files and cause a denial of service (memory or disk consumption) via a UDP packet that specifies an arbitrary URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2009:025 - http://www.securityfocus.com/bid/29985 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9076 - http://support.avaya.com/elmodocs2/security/ASA-2008-493.htm - http://secunia.com/advisories/33102 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17599 - http://www.openwall.com/lists/oss-security/2008/06/27/3 - http://www.ubuntu.com/usn/USN-675-1 - http://secunia.com/advisories/32859 - http://crisp.cs.du.edu/?q=ca2007-1 - http://www.redhat.com/support/errata/RHSA-2008-1023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4742.
CVE ID: CVE-2019-4742 Date Updated: 2024-09-17T00:26:29.572Z Date Published: 2019-12-20T16:25:26.313896Z Description: IBM Financial Transaction Manager 3.0 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 172877. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1135173 - https://exchange.xforce.ibmcloud.com/vulnerabilities/172877 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46831.
CVE ID: CVE-2022-46831 Date Updated: 2024-08-03T14:39:39.008Z Date Published: 2022-12-08T17:38:04.997Z Description: In JetBrains TeamCity between 2022.10 and 2022.10.1 connecting to AWS using the "Default Credential Provider Chain" allowed TeamCity project administrators to access AWS resources normally limited to TeamCity system administrators. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jetbrains.com/privacy-security/issues-fixed/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15456.
CVE ID: CVE-2020-15456 Date Updated: 2021-05-27T20:13:12 Date Published: 2021-05-27T20:13:12 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7254.
CVE ID: CVE-2016-7254 Date Updated: 2024-08-06T01:57:47.222Z Date Published: 2016-11-10T06:16:00 Description: Microsoft SQL Server 2012 SP2 and 2012 SP3 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka "SQL RDBMS Engine Elevation of Privilege Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1037250 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136 - http://www.securityfocus.com/bid/94061 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3099.
CVE ID: CVE-2015-3099 Date Updated: 2024-08-06T05:39:31.690Z Date Published: 2015-06-10T01:00:00 Description: Adobe Flash Player before 13.0.0.292 and 14.x through 18.x before 18.0.0.160 on Windows and OS X and before 11.2.202.466 on Linux, Adobe AIR before 18.0.0.144 on Windows and before 18.0.0.143 on OS X and Android, Adobe AIR SDK before 18.0.0.144 on Windows and before 18.0.0.143 on OS X, and Adobe AIR SDK & Compiler before 18.0.0.144 on Windows and before 18.0.0.143 on OS X allow remote attackers to bypass the Same Origin Policy via unspecified vectors, a different vulnerability than CVE-2015-3098 and CVE-2015-3102. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/flash-player/apsb15-11.html - http://www.securityfocus.com/bid/75080 - http://www.securitytracker.com/id/1032519 - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00009.html - https://security.gentoo.org/glsa/201506-01 - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00005.html - http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00011.html - http://rhn.redhat.com/errata/RHSA-2015-1086.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0081.
CVE ID: CVE-2020-0081 Date Updated: 2024-08-04T05:47:40.840Z Date Published: 2020-04-17T18:19:12 Description: In finalize of AssetManager.java, there is possible memory corruption due to a double free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.0 Android-8.1 Android-9 Android-10Android ID: A-144028297 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2020-04-01 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC6HLX5SG4PZO6Y54D2LFJ4ATG76BKOP/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9092.
CVE ID: CVE-2020-9092 Date Updated: 2024-08-04T10:19:20.112Z Date Published: 2020-10-19T19:35:02 Description: HUAWEI Mate 20 versions earlier than 10.1.0.163(C00E160R3P8) have a JavaScript injection vulnerability. A module does not verify a specific input. This could allow attackers to bypass filter mechanism to launch JavaScript injection. This could compromise normal service of the affected module. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20201014-01-smartphone-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6265.
CVE ID: CVE-2015-6265 Date Updated: 2024-08-06T07:15:13.290Z Date Published: 2015-08-27T01:50:00 Description: The CLI in Cisco Application Control Engine (ACE) 4700 A5 3.0 and earlier allows local users to bypass intended access restrictions, and read or write to files, by entering an unspecified CLI command with a crafted file as this command's input, aka Bug ID CSCur23662. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1033381 - http://tools.cisco.com/security/center/viewAlert.x?alertId=40666 - http://www.securityfocus.com/bid/76491 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14384.
CVE ID: CVE-2017-14384 Date Updated: 2024-09-16T22:30:59.956Z Date Published: 2018-03-16T20:00:00Z Description: In Dell Storage Manager versions earlier than 16.3.20, the EMConfigMigration service is affected by a directory traversal vulnerability. A remote malicious user could potentially exploit this vulnerability to read unauthorized files by supplying specially crafted strings in input parameters of the application. A malicious user cannot delete or modify any files via this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/103467 - http://topics-cdn.dell.com/pdf/storage-sc2000_release%20notes24_en-us.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.