instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-21195.
CVE ID: CVE-2021-21195 Date Updated: 2024-08-03T18:01:14.312Z Date Published: 2021-04-09T21:35:21 Description: Use after free in V8 in Google Chrome prior to 89.0.4389.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2021/03/stable-channel-update-for-desktop_30.html - https://crbug.com/1182647 - https://security.gentoo.org/glsa/202104-08 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUZBGKGVZADNA3I24NVG7HAYYUTOSN5A/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EAJ42L4JFPBJATCZ7MOZQTUDGV4OEHHG/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U3GZ42MYPGD35V652ZPVPYYS7A7LVXVY/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38677.
CVE ID: CVE-2022-38677 Date Updated: 2024-08-03T11:02:14.340Z Date Published: 2022-10-14T00:00:00 Description: In cell service, there is a missing permission check. This could lead to local denial of service in cell service with no additional execution privileges needed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.unisoc.com/en_us/secy/announcementDetail/1575654905820020738 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6338.
CVE ID: CVE-2013-6338 Date Updated: 2024-08-06T17:39:01.254Z Date Published: 2013-11-04T15:00:00 Description: The dissect_sip_common function in epan/dissectors/packet-sip.c in the SIP dissector in Wireshark 1.8.x before 1.8.11 and 1.10.x before 1.10.3 does not properly initialize a data structure, which allows remote attackers to cause a denial of service (application crash) via a crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2013-11/msg00027.html - http://anonsvn.wireshark.org/viewvc/trunk/epan/dissectors/packet-sip.c?r1=52354&r2=52353&pathrev=52354 - http://www.debian.org/security/2013/dsa-2792 - http://anonsvn.wireshark.org/viewvc?view=revision&revision=52354 - http://lists.opensuse.org/opensuse-updates/2013-11/msg00026.html - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=9228 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19145 - http://rhn.redhat.com/errata/RHSA-2014-0342.html - http://www.wireshark.org/security/wnpa-sec-2013-63.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3016.
CVE ID: CVE-2012-3016 Date Updated: 2024-08-06T19:50:05.465Z Date Published: 2012-07-31T10:00:00 Description: Siemens SIMATIC S7-400 PN CPU devices with firmware 6 before 6.0.3 allow remote attackers to cause a denial of service (defect-mode transition and service outage) via crafted ICMP packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.siemens.com/corporate-technology/pool/de/forschungsfelder/siemens_security_advisory_ssa-589272.pdf - http://www.us-cert.gov/control_systems/pdf/ICSA-12-212-02.pdf - https://cert-portal.siemens.com/productcert/pdf/ssa-589272.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3439.
CVE ID: CVE-2014-3439 Date Updated: 2024-08-06T10:43:06.105Z Date Published: 2014-11-07T11:00:00 Description: ConsoleServlet in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU5 allows remote attackers to write to arbitrary files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2014/Nov/7 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20141105_00 - http://www.securityfocus.com/bid/70845 - https://exchange.xforce.ibmcloud.com/vulnerabilities/98527 - http://www.securityfocus.com/archive/1/533918/100/0/threaded - http://www.securitytracker.com/id/1031176 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2562.
CVE ID: CVE-2018-2562 Date Updated: 2024-10-03T20:46:52.791Z Date Published: 2018-01-18T02:00:00 Description: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.0 Base Score 7.1 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:0587 - https://www.debian.org/security/2018/dsa-4341 - https://usn.ubuntu.com/3537-1/ - https://lists.debian.org/debian-lts-announce/2018/01/msg00024.html - http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html - https://access.redhat.com/errata/RHSA-2018:2729 - https://lists.debian.org/debian-lts-announce/2018/06/msg00015.html - https://www.debian.org/security/2018/dsa-4091 - http://www.securityfocus.com/bid/102713 - https://access.redhat.com/errata/RHSA-2018:2439 - https://usn.ubuntu.com/3537-2/ - https://security.netapp.com/advisory/ntap-20180117-0002/ - http://www.securitytracker.com/id/1040216 - https://access.redhat.com/errata/RHSA-2019:1258 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-47058.
CVE ID: CVE-2023-47058 Date Updated: 2024-09-04T20:32:37.495Z Date Published: 2023-11-16T16:16:28.877Z Description: Adobe Premiere Pro version 24.0 (and earlier) and 23.6 (and earlier) are affected by an out-of-bounds read vulnerability when parsing a crafted file, which could result in a read past the end of an allocated memory structure. An attacker could leverage this vulnerability to execute code in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/premiere_pro/apsb23-65.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25980.
CVE ID: CVE-2022-25980 Date Updated: 2024-09-17T02:56:47.787Z Date Published: 2022-03-29T16:37:03.370801Z Description: Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability that exists in HandlerCommon.ashx. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4307.
CVE ID: CVE-2020-4307 Date Updated: 2024-09-16T16:24:19.325Z Date Published: 2020-06-03T14:30:22.184740Z Description: IBM Security Guardium 11.1 could allow an attacker on the same network to gain access to the Solr dashboard and cause a denial of service attack. IBM X-Force ID: 176997. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6218974 - https://exchange.xforce.ibmcloud.com/vulnerabilities/176997 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0056.
CVE ID: CVE-2018-0056 Date Updated: 2024-09-17T02:51:55.327Z Date Published: 2018-10-10T18:00:00Z Description: If a duplicate MAC address is learned by two different interfaces on an MX Series device, the MAC address learning function correctly flaps between the interfaces. However, the Layer 2 Address Learning Daemon (L2ALD) daemon might crash when attempting to delete the duplicate MAC address when the particular entry is not found in the internal MAC address table. This issue only occurs on MX Series devices with l2-backhaul VPN configured. No other products or platforms are affected by this issue. Affected releases are Juniper Networks Junos OS: 15.1 versions prior to 15.1R7-S1 on MX Series; 16.1 versions prior to 16.1R4-S12, 16.1R6-S6 on MX Series; 16.2 versions prior to 16.2R2-S7 on MX Series; 17.1 versions prior to 17.1R2-S9 on MX Series; 17.2 versions prior to 17.2R1-S7, 17.2R2-S6 on MX Series; 17.3 versions prior to 17.3R2-S4, 17.3R3-S1 on MX Series; 17.4 versions prior to 17.4R1-S5 on MX Series; 18.1 versions prior to 18.1R2 on MX Series. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.juniper.net/JSA10890 - http://www.securitytracker.com/id/1041857 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0303.
CVE ID: CVE-2024-0303 Date Updated: 2024-08-01T18:04:48.473Z Date Published: 2024-01-08T07:31:03.703Z Description: A vulnerability, which was classified as critical, was found in Youke365 up to 1.5.3. Affected is an unknown function of the file /app/api/controller/caiji.php of the component Parameter Handler. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-249870 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.249870 - https://vuldb.com/?ctiid.249870 - https://note.zhaoj.in/share/fssH60eQkvSl No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29165.
CVE ID: CVE-2020-29165 Date Updated: 2024-08-04T16:48:01.587Z Date Published: 2021-02-03T12:27:11 Description: PacsOne Server (PACS Server In One Box) below 7.1.1 is affected by incorrect access control, which can result in remotely gaining administrator privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/leommxj/0a32afeeaac960682c5b7c9ca8ed070d - https://pacsone.net/download.htm No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0691.
CVE ID: CVE-2024-0691 Date Updated: 2024-08-01T18:11:35.740Z Date Published: 2024-02-05T21:21:43.434Z Description: The FileBird plugin for WordPress is vulnerable to Stored Cross-Site Scripting via imported folder titles in all versions up to, and including, 5.5.8.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. It may also be possible to socially engineer an administrator into uploading a malicious folder import. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/47f04985-dd9b-449f-8b4c-9811fe7e4a96?source=cve - https://plugins.trac.wordpress.org/changeset/3023924/filebird No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26753.
CVE ID: CVE-2024-26753 Date Updated: 2024-09-11T17:33:15.875Z Date Published: 2024-04-03T17:00:38.148Z Description: In the Linux kernel, the following vulnerability has been resolved: crypto: virtio/akcipher - Fix stack overflow on memcpy sizeof(struct virtio_crypto_akcipher_session_para) is less than sizeof(struct virtio_crypto_op_ctrl_req::u), copying more bytes from stack variable leads stack overflow. Clang reports this issue by commands: make -j CC=clang-14 mrproper >/dev/null 2>&1 make -j O=/tmp/crypto-build CC=clang-14 allmodconfig >/dev/null 2>&1 make -j O=/tmp/crypto-build W=1 CC=clang-14 drivers/crypto/virtio/ virtio_crypto_akcipher_algs.o No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/37077ed16c7793e21b005979d33f8a61565b7e86 - https://git.kernel.org/stable/c/62f361bfea60c6afc3df09c1ad4152e6507f6f47 - https://git.kernel.org/stable/c/b0365460e945e1117b47cf7329d86de752daff63 - https://git.kernel.org/stable/c/ef1e47d50324e232d2da484fe55a54274eeb9bc1 - https://git.kernel.org/stable/c/c0ec2a712daf133d9996a8a1b7ee2d4996080363 - https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0878.
CVE ID: CVE-2013-0878 Date Updated: 2024-08-06T14:41:47.757Z Date Published: 2013-11-23T17:00:00 Description: The advance_line function in libavcodec/targa.c in FFmpeg before 1.1.3 allows remote attackers to have an unspecified impact via crafted Targa image data, related to an out-of-bounds array access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.ffmpeg.org/security.html - https://security.gentoo.org/glsa/201603-06 - http://git.videolan.org/?p=ffmpeg.git%3Ba=commitdiff%3Bh=f5955d9f6f9ffdb81864c3de1c7b801782a55725 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40590.
CVE ID: CVE-2022-40590 Date Updated: 2023-03-27T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33698.
CVE ID: CVE-2021-33698 Date Updated: 2024-08-03T23:58:22.452Z Date Published: 2021-09-15T18:01:53 Description: SAP Business One, version - 10.0, allows an attacker with business authorization to upload any files (including script files) without the proper file format validation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=582222806 - https://launchpad.support.sap.com/#/notes/3071984 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32985.
CVE ID: CVE-2023-32985 Date Updated: 2024-08-02T15:32:46.482Z Date Published: 2023-05-16T16:00:06.702Z Description: Jenkins Sidebar Link Plugin 2.2.1 and earlier does not restrict the path of files in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2023-05-16/#SECURITY-3125 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1189
The MITRE ATT&CK technique T1189: Drive-by Compromise is related to the vulnerability CVE-CVE-2010-1423. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2022-44931.
CVE ID: CVE-2022-44931 Date Updated: 2024-08-03T14:01:31.396Z Date Published: 2022-12-08T00:00:00 Description: Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/z1r00/IOT_Vul/blob/main/Tenda/A18/formWifiBasicSet/readme.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-46330.
CVE ID: CVE-2024-46330 Date Updated: 2024-09-26T14:31:23.200Z Date Published: 2024-09-26T00:00:00 Description: VONETS VAP11G-300 v3.3.23.6.9 was discovered to contain a command injection vulnerability via the iptablesWebsFilterRun object. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hawktesters.com/5519644d-246e-4924-b7c8-8fdf742117be/704b5e66-fee5-4289-aa55-eb7feb5f0edc.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11093.
CVE ID: CVE-2020-11093 Date Updated: 2024-08-04T11:21:14.718Z Date Published: 2020-12-24T20:05:15 Description: Hyperledger Indy Node is the server portion of a distributed ledger purpose-built for decentralized identity. In Hyperledger Indy before version 1.12.4, there is lack of signature verification on a specific transaction which enables an attacker to make certain unauthorized alterations to the ledger. Updating a DID with a nym transaction will be written to the ledger if neither ROLE or VERKEY are being changed, regardless of sender. A malicious DID with no particular role can ask an update for another DID (but cannot modify its verkey or role). This is bad because 1) Any DID can write a nym transaction to the ledger (i.e., any DID can spam the ledger with nym transactions), 2) Any DID can change any other DID's alias, 3) The update transaction modifies the ledger metadata associated with a DID. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hyperledger/indy-node/security/advisories/GHSA-wh2w-39f4-rpv2 - https://github.com/hyperledger/indy-node/blob/master/CHANGELOG.md#1124 - https://github.com/hyperledger/indy-node/blob/master/docs/source/auth_rules.md - https://github.com/hyperledger/indy-node/commit/55056f22c83b7c3520488b615e1577e0f895d75a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-31533.
CVE ID: CVE-2022-31533 Date Updated: 2024-08-03T07:19:06.517Z Date Published: 2022-07-11T00:56:51 Description: The decentraminds/umbral repository through 2020-01-15 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/github/securitylab/issues/669#issuecomment-1117265726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6841.
CVE ID: CVE-2023-6841 Date Updated: 2024-10-01T20:20:45.372Z Date Published: 2024-09-10T16:15:32.639Z Description: A denial of service vulnerability was found in keycloak where the amount of attributes per object is not limited,an attacker by sending repeated HTTP requests could cause a resource exhaustion when the application send back rows with long attribute values. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/security/cve/CVE-2023-6841 - https://bugzilla.redhat.com/show_bug.cgi?id=2254714 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20252.
CVE ID: CVE-2022-20252 Date Updated: 2024-08-03T02:02:31.081Z Date Published: 2022-08-11T15:09:46 Description: In PackageManager, there is a possible way to determine whether an app is installed, without query permissions, due to side channel information disclosure. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-13Android ID: A-224547584 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1691.
CVE ID: CVE-2012-1691 Date Updated: 2024-08-06T19:08:37.446Z Date Published: 2012-05-03T22:00:00 Description: Unspecified vulnerability in Oracle Sun Solaris 11 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Kernel/Privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpuapr2012-366314.html - http://www.securitytracker.com/id?1026940 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - http://secunia.com/advisories/48809 - http://www.securityfocus.com/bid/53137 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43944.
CVE ID: CVE-2022-43944 Date Updated: 2022-12-30T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40889.
CVE ID: CVE-2022-40889 Date Updated: 2024-08-03T12:28:42.921Z Date Published: 2022-10-18T00:00:00 Description: Phpok 6.1 has a deserialization vulnerability via framework/phpok_call.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/qinggan/phpok/issues/13 - https://gist.github.com/T4rnRookie/e644c1dd8e025ab10fc3e3e4bfad2161 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14544.
CVE ID: CVE-2018-14544 Date Updated: 2024-08-05T09:29:51.686Z Date Published: 2018-07-23T08:00:00 Description: There exists one invalid memory read bug in AP4_SampleDescription::GetFormat() in Ap4SampleDescription.h in Bento4 1.5.1-624, which can allow attackers to cause a denial-of-service via a crafted mp4 file. This vulnerability can be triggered by the executable mp42ts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/291 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39751.
CVE ID: CVE-2021-39751 Date Updated: 2024-08-04T02:13:38.338Z Date Published: 2022-03-30T16:02:16 Description: In Settings, there is a possible way to read Bluetooth device names without proper permissions due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-172838801 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-12l No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20203.
CVE ID: CVE-2021-20203 Date Updated: 2024-08-03T17:30:07.577Z Date Published: 2021-02-25T19:09:46 Description: An integer overflow issue was found in the vmxnet3 NIC emulator of the QEMU for versions up to v5.2.0. It may occur if a guest was to supply invalid values for rx/tx queue size or other NIC parameters. A privileged guest user may use this flaw to crash the QEMU process on the host resulting in DoS scenario. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1922441 - https://bugs.launchpad.net/qemu/+bug/1913873 - https://lists.debian.org/debian-lts-announce/2021/04/msg00009.html - https://security.gentoo.org/glsa/202208-27 - https://lists.debian.org/debian-lts-announce/2022/09/msg00008.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0433.
CVE ID: CVE-2008-0433 Date Updated: 2024-08-07T07:46:53.951Z Date Published: 2008-01-23T21:00:00 Description: PHP remote file inclusion vulnerability in theme/phpAutoVideo/LightTwoOh/sidebar.php in Agares phpAutoVideo 2.21 and earlier allows remote attackers to execute arbitrary PHP code via a URL in the loadpage parameter, a different vector than CVE-2007-6614. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27346 - http://www.vupen.com/english/advisories/2008/0225 - http://securityreason.com/securityalert/3567 - http://secunia.com/advisories/28580 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39770 - http://www.securityfocus.com/archive/1/486591/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3086.
CVE ID: CVE-2010-3086 Date Updated: 2024-08-07T02:55:46.647Z Date Published: 2011-01-14T22:00:00 Description: include/asm-x86/futex.h in the Linux kernel before 2.6.25 does not properly implement exception fixup, which allows local users to cause a denial of service (panic) via an invalid application that triggers a page fault. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=633170 - http://securitytracker.com/id?1024709 - http://www.securityfocus.com/archive/1/520102/100/0/threaded - http://secunia.com/advisories/46397 - http://kerneltrap.org/mailarchive/linux-kernel/2008/2/6/752194/thread - https://bugzilla.redhat.com/show_bug.cgi?id=429412 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=9d55b9923a1b7ea8193b8875c57ec940dc2ff027 - http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00004.html - http://www.redhat.com/support/errata/RHSA-2010-0839.html - http://www.vmware.com/security/advisories/VMSA-2011-0012.html - http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25 - http://marc.info/?l=oss-security&m=128935856605589&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4499.
CVE ID: CVE-2017-4499 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7753.
CVE ID: CVE-2016-7753 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1236.
CVE ID: CVE-2015-1236 Date Updated: 2024-08-06T04:33:20.871Z Date Published: 2015-04-19T10:00:00 Description: The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2015-0816.html - http://ubuntu.com/usn/usn-2570-1 - https://src.chromium.org/viewvc/blink?revision=189527&view=revision - http://www.debian.org/security/2015/dsa-3238 - https://code.google.com/p/chromium/issues/detail?id=313939 - http://lists.opensuse.org/opensuse-updates/2015-11/msg00024.html - https://security.gentoo.org/glsa/201506-04 - http://www.securitytracker.com/id/1032209 - http://lists.opensuse.org/opensuse-updates/2015-04/msg00040.html - http://googlechromereleases.blogspot.com/2015/04/stable-channel-update_14.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3476.
CVE ID: CVE-2011-3476 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42269.
CVE ID: CVE-2024-42269 Date Updated: 2024-09-15T17:52:33.988Z Date Published: 2024-08-17T08:54:24.267Z Description: In the Linux kernel, the following vulnerability has been resolved: netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init(). ip6table_nat_table_init() accesses net->gen->ptr[ip6table_nat_net_ops.id], but the function is exposed to user space before the entry is allocated via register_pernet_subsys(). Let's call register_pernet_subsys() before xt_register_template(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/419ee6274c5153b89c4393c1946faa4c3cad4f9e - https://git.kernel.org/stable/c/91b6df6611b7edb28676c4f63f90c56c30d3e601 - https://git.kernel.org/stable/c/e85b9b6a87be4cb3710082038b677e97f2389003 - https://git.kernel.org/stable/c/87dba44e9471b79b255d0736858a897332db9226 - https://git.kernel.org/stable/c/c22921df777de5606f1047b1345b8d22ef1c0b34 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2593.
CVE ID: CVE-2008-2593 Date Updated: 2024-08-07T09:05:30.344Z Date Published: 2008-07-15T23:00:00 Description: Unspecified vulnerability in the Oracle Portal component in Oracle Application Server 10.1.2.3 and 10.1.4.2 has unknown impact and remote attack vectors, a different vulnerability than CVE-2008-2594. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujul2008-090335.html - http://www.vupen.com/english/advisories/2008/2115 - http://www.securitytracker.com/id?1020494 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143 - http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00727143 - http://www.vupen.com/english/advisories/2008/2109/references - http://secunia.com/advisories/31087 - http://secunia.com/advisories/31113 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4197.
CVE ID: CVE-2017-4197 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4384.
CVE ID: CVE-2022-4384 Date Updated: 2024-08-03T01:41:44.451Z Date Published: 2023-02-06T19:59:16.563Z Description: The Stream WordPress plugin before 3.9.2 does not prevent users with little privileges on the site (like subscribers) from using its alert creation functionality, which may enable them to leak sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/2b506252-6f37-439e-8984-7316d5cca2e5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29836.
CVE ID: CVE-2024-29836 Date Updated: 2024-08-02T01:17:57.373Z Date Published: 2024-04-14T23:47:13.849Z Description: The Web interface of Evolution Controller Versions 2.04.560.31.03.2024 and below contains poorly configured access control, allowing for an unauthenticated attacker to update and add user profiles within the application, and gain full access of the site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://directcyber.com.au/sa/CVE-2024-29836-to-29844-evolution-controller-multiple-vulnerabilities.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-23075.
CVE ID: CVE-2023-23075 Date Updated: 2024-08-02T10:28:40.822Z Date Published: 2023-02-01T00:00:00 Description: Cross Site Scripting (XSS) vulnerability in Zoho Asset Explorer 6.9 via the credential name when creating a new Assets Workstation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugbounty.zohocorp.com/bb/#/bug/101000006463045?tab=originator No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33923.
CVE ID: CVE-2023-33923 Date Updated: 2024-08-02T15:54:13.428Z Date Published: 2024-03-25T04:46:03.396Z Description: Missing Authorization vulnerability in HashThemes Viral News, HashThemes Viral, HashThemes HashOne.This issue affects Viral News: from n/a through 1.4.5; Viral: from n/a through 1.8.0; HashOne: from n/a through 1.3.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/viral-news/wordpress-viral-news-theme-1-4-5-authenticated-arbitrary-plugin-activation-vulnerability?_s_id=cve - https://patchstack.com/database/vulnerability/viral/wordpress-viral-theme-1-8-0-broken-access-control-vulnerability?_s_id=cve - https://patchstack.com/database/vulnerability/hashone/wordpress-hashone-theme-1-3-0-broken-access-control-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37994.
CVE ID: CVE-2021-37994 Date Updated: 2024-08-04T01:30:09.026Z Date Published: 2021-11-02T21:05:51 Description: Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2021/10/stable-channel-update-for-desktop_19.html - https://crbug.com/1100761 - https://www.debian.org/security/2022/dsa-5046 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6316.
CVE ID: CVE-2023-6316 Date Updated: 2024-08-02T08:28:21.777Z Date Published: 2024-01-11T08:32:51.833Z Description: The MW WP Form plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the '_single_file_upload' function in versions up to, and including, 5.0.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/b2c03142-be30-4173-a140-14d73a16dd2b?source=cve - https://plugins.trac.wordpress.org/browser/mw-wp-form/tags/5.0.1/classes/models/class.file.php#L60 - https://plugins.trac.wordpress.org/changeset/3003065/mw-wp-form#file15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4892.
CVE ID: CVE-2011-4892 Date Updated: 2018-07-16T14:57:01 Date Published: 2018-07-16T15:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6000.
CVE ID: CVE-2013-6000 Date Updated: 2024-08-06T17:29:42.867Z Date Published: 2013-12-05T11:00:00 Description: Directory traversal vulnerability in Tattyan HP TOWN before 5_10_1 allows remote attackers to read arbitrary files via a .. (dot dot) in a request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www2s.biglobe.ne.jp/~tatsuji/souko/Guidance1.html - http://jvndb.jvn.jp/jvndb/JVNDB-2013-000112 - http://jvn.jp/en/jp/JVN41703192/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37389.
CVE ID: CVE-2022-37389 Date Updated: 2024-08-03T10:29:20.986Z Date Published: 2023-03-29T00:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader 11.2.2.53575. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17545. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxit.com/support/security-bulletins.html - https://www.zerodayinitiative.com/advisories/ZDI-22-1061/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29683.
CVE ID: CVE-2021-29683 Date Updated: 2024-09-17T00:02:12.555Z Date Published: 2021-05-20T15:10:30.105925Z Description: IBM Security Identity Manager 7.0.2 stores user credentials in plain clear text which can be read by an authenticated user. IBM X-Force ID: 199998. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6454587 - https://exchange.xforce.ibmcloud.com/vulnerabilities/199998 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0995.
CVE ID: CVE-2013-0995 Date Updated: 2024-08-06T14:49:19.873Z Date Published: 2013-05-19T10:00:00 Description: WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT5785 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17561 - http://secunia.com/advisories/54886 - http://support.apple.com/kb/HT5934 - http://lists.apple.com/archives/security-announce/2013/Jun/msg00001.html - http://support.apple.com/kb/HT5766 - http://lists.apple.com/archives/security-announce/2013/May/msg00000.html - http://lists.apple.com/archives/security-announce/2013/Sep/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4458.
CVE ID: CVE-2013-4458 Date Updated: 2024-08-06T16:45:14.820Z Date Published: 2013-12-12T18:00:00 Description: Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in GNU C Library (aka glibc or libc6) 2.18 and earlier allows remote attackers to cause a denial of service (crash) via a (1) hostname or (2) IP address that triggers a large number of AF_INET6 address results. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-1914. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceware.org/ml/libc-alpha/2013-10/msg00733.html - http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00036.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:284 - https://security.gentoo.org/glsa/201503-04 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:283 - https://sourceware.org/bugzilla/show_bug.cgi?id=16072 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0423.
CVE ID: CVE-2020-0423 Date Updated: 2024-08-04T06:02:51.790Z Date Published: 2020-10-14T13:07:13 Description: In binder_release_work of binder.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-161151868References: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2020-10-01 - https://lists.debian.org/debian-lts-announce/2020/12/msg00015.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-25588.
CVE ID: CVE-2020-25588 Date Updated: 2022-07-07T19:31:28 Date Published: 2022-07-07T19:31:28 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29539.
CVE ID: CVE-2020-29539 Date Updated: 2024-08-04T16:55:10.444Z Date Published: 2020-12-08T12:52:38 Description: A Cross-Site Scripting (XSS) issue in WebUI Translation in Systran Pure Neural Server before 9.7.0 allows a threat actor to have a remote authenticated user run JavaScript from a malicious site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.systransoft.com/translation-products/systran-pure-neural-server/ - https://grave-rose.medium.com/two-systran-vulnerabilities-and-their-exploits-8bc83ba29e14 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25211.
CVE ID: CVE-2023-25211 Date Updated: 2024-08-02T11:18:35.978Z Date Published: 2023-04-07T00:00:00 Description: Tenda AC5 US_AC5V1.0RTL_V15.03.06.28 was discovered to contain a stack overflow via the R7WebsSecurityHandler function. This vulnerability allows attackers to cause a Denial of Service (DoS) or execute arbitrary code via a crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/DrizzlingSun/Tenda/blob/main/AC5/2/2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22677.
CVE ID: CVE-2021-22677 Date Updated: 2024-08-03T18:51:05.995Z Date Published: 2021-05-07T15:11:44 Description: An integer overflow exists in the APIs of the host MCU while trying to connect to a WIFI network may lead to issues such as a denial-of-service condition or code execution on the SimpleLink Wi-Fi (MSP432E4 SDK: v4.20.00.12 and prior, CC32XX SDK v4.30.00.06 and prior, CC13X0 SDK versions prior to v4.10.03, CC13X2 and CC26XX SDK versions prior to v4.40.00, CC3200 SDK v1.5.0 and prior, CC3100 SDK v1.3.0 and prior). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://us-cert.cisa.gov/ics/advisories/icsa-21-119-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22886.
CVE ID: CVE-2020-22886 Date Updated: 2024-08-04T14:51:11.046Z Date Published: 2021-07-13T14:44:21 Description: Buffer overflow vulnerability in function jsG_markobject in jsgc.c in mujs before 1.0.8, allows remote attackers to cause a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ccxvii/mujs/issues/134 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43142.
CVE ID: CVE-2021-43142 Date Updated: 2024-08-04T03:47:13.623Z Date Published: 2022-03-30T21:05:37 Description: An XML External Entity (XXE) vulnerability exists in wuta jox 1.16 in the readObject method in JOXSAXBeanInput. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://novysodope.github.io/2021/10/29/64/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41667.
CVE ID: CVE-2023-41667 Date Updated: 2024-09-18T20:39:42.745Z Date Published: 2023-10-09T17:38:02.705Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Ulf Benjaminsson WP-dTree plugin <= 4.4.5 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-dtree-30/wordpress-wp-dtree-plugin-4-4-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1312.
CVE ID: CVE-2014-1312 Date Updated: 2024-08-06T09:34:41.109Z Date Published: 2014-04-02T15:00:00 Description: WebKit, as used in Apple Safari before 6.1.3 and 7.x before 7.0.3, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2014-04-01-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2014-04/0136.html - https://support.apple.com/kb/HT6537 - http://archives.neohapsis.com/archives/bugtraq/2014-04/0135.html - http://archives.neohapsis.com/archives/bugtraq/2014-04/0009.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9592.
CVE ID: CVE-2014-9592 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5501.
CVE ID: CVE-2015-5501 Date Updated: 2024-08-06T06:50:02.790Z Date Published: 2015-08-18T17:00:00 Description: The Hostmaster (Aegir) module 6.x-2.x before 6.x-2.4 and 7.x-3.x before 7.x-3.0-beta2 for Drupal allows remote attackers to execute arbitrary PHP code via a crafted file in the directory used to write Apache vhost files for hosted sites in a multi-site environment. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.drupal.org/node/2492317 - http://www.securityfocus.com/bid/74759 - http://community.aegirproject.org/3.0-beta2 - http://www.openwall.com/lists/oss-security/2015/07/04/4 - http://community.aegirproject.org/2.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36203.
CVE ID: CVE-2020-36203 Date Updated: 2024-08-04T17:23:09.590Z Date Published: 2021-01-22T09:07:40 Description: An issue was discovered in the reffers crate through 2020-12-01 for Rust. ARefss can contain a !Send,!Sync object, leading to a data race and memory corruption. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2020-0094.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5789.
CVE ID: CVE-2008-5789 Date Updated: 2024-08-07T11:04:44.567Z Date Published: 2008-12-31T11:00:00 Description: Multiple PHP remote file inclusion vulnerabilities in the Recly Interactive Feederator (com_feederator) component 1.0.5 for Joomla! allow remote attackers to execute arbitrary PHP code via a URL in the (1) mosConfig_absolute_path parameter to (a) add_tmsp.php, (b) edit_tmsp.php and (c) tmsp.php in includes/tmsp/; and the (2) GLOBALS[mosConfig_absolute_path] parameter to (d) includes/tmsp/subscription.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/32194 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46438 - http://securityreason.com/securityalert/4827 - https://www.exploit-db.com/exploits/7040 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12767.
CVE ID: CVE-2018-12767 Date Updated: 2024-08-05T08:45:01.159Z Date Published: 2018-07-20T19:00:00 Description: Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb18-21.html - http://www.securityfocus.com/bid/104699 - http://www.securitytracker.com/id/1041250 - https://research.checkpoint.com/2018/50-adobe-cves-in-50-days/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17104.
CVE ID: CVE-2017-17104 Date Updated: 2024-08-05T20:43:59.896Z Date Published: 2017-12-04T08:00:00 Description: Fiyo CMS 2.0.7 has an arbitrary file read vulnerability in dapur/apps/app_theme/libs/check_file.php via $_GET['src'] or $_GET['name']. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/FiyoCMS/FiyoCMS/issues/11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3571.
CVE ID: CVE-2013-3571 Date Updated: 2024-08-06T16:14:56.235Z Date Published: 2014-05-08T14:00:00 Description: socat 1.2.0.0 before 1.7.2.2 and 2.0.0-b1 before 2.0.0-b6, when used for a listen type address and the fork option is enabled, allows remote attackers to cause a denial of service (file descriptor consumption) via multiple request that are refused based on the (1) sourceport, (2) lowport, (3) range, or (4) tcpwrap restrictions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.dest-unreach.org/socat/contrib/socat-secadv4.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:169 - http://www.openwall.com/lists/oss-security/2013/05/26/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46001.
CVE ID: CVE-2023-46001 Date Updated: 2024-09-05T14:26:29.235Z Date Published: 2023-11-07T00:00:00 Description: Buffer Overflow vulnerability in gpac MP4Box v.2.3-DEV-rev573-g201320819-master allows a local attacker to cause a denial of service via the gpac/src/isomedia/isom_read.c:2807:51 function in gf_isom_get_user_data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gpac/gpac/issues/2629 - https://github.com/gpac/gpac/commit/e79b0cf7e72404750630bc01340e999f3940dbc4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-6202.
CVE ID: CVE-2024-6202 Date Updated: 2024-08-08T13:43:27.833Z Date Published: 2024-08-06T06:01:41.415Z Description: HaloITSM versions up to 2.146.1 are affected by a SAML XML Signature Wrapping (XSW) vulnerability. When having a SAML integration configured, anonymous actors could impersonate arbitrary HaloITSM users by just knowing their email address. HaloITSM versions past 2.146.1 (and patches starting from 2.143.61 ) fix the mentioned vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://haloitsm.com/guides/article/?kbid=2154 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3716.
CVE ID: CVE-2015-3716 Date Updated: 2024-08-06T05:56:15.150Z Date Published: 2015-07-03T01:00:00 Description: Spotlight in Apple OS X before 10.10.4 allows attackers to execute arbitrary commands via a crafted name of a photo file within the local photo library. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html - http://www.securityfocus.com/bid/75493 - http://www.securitytracker.com/id/1032760 - http://support.apple.com/kb/HT204942 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7283.
CVE ID: CVE-2020-7283 Date Updated: 2024-08-04T09:25:48.525Z Date Published: 2020-07-03T13:30:17 Description: Privilege Escalation vulnerability in McAfee Total Protection (MTP) before 16.0.R26 allows local users to create and edit files via symbolic link manipulation in a location they would otherwise not have access to. This is achieved through running a malicious script or program on the target machine. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS103062 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4255.
CVE ID: CVE-2023-4255 Date Updated: 2024-08-02T07:24:03.587Z Date Published: 2023-12-21T16:08:39.691Z Description: An out-of-bounds write issue has been discovered in the backspace handling of the checkType() function in etc.c within the W3M application. This vulnerability is triggered by supplying a specially crafted HTML file to the w3m binary. Exploitation of this flaw could lead to application crashes, resulting in a denial of service condition. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2255207 - https://github.com/tats/w3m/commit/edc602651c506aeeb60544b55534dd1722a340d3 - https://github.com/tats/w3m/issues/268 - https://github.com/tats/w3m/pull/273 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AULOBQJLXE2KCT5UVQMKGEFL4GFIAOED/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TODROGVCWZ435HQIZE6ARQC5LPQLIA5C/ - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MKFZQUK7FPWWJQYICDZZ4YWIPUPQ2D3R/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-20106.
CVE ID: CVE-2017-20106 Date Updated: 2024-08-05T21:45:25.786Z Date Published: 2022-06-28T06:40:29 Description: A vulnerability, which was classified as critical, has been found in Lithium Forum 2017 Q1. This issue affects some unknown processing of the component Compose Message Handler. The manipulation of the argument upload_url leads to server-side request forgery. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.vulnerability-lab.com/get_content.php?id=2030 - https://vuldb.com/?id.97265 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12997.
CVE ID: CVE-2019-12997 Date Updated: 2024-08-04T23:41:10.226Z Date Published: 2019-06-28T10:28:14 Description: In Loopchain through 2.2.1.3, an attacker can escalate privileges from a low-privilege shell by changing the environment (aka injection in the DEFAULT_SCORE_HOST environment variable). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/icon-project/loopchain/issues/231 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4957.
CVE ID: CVE-2023-4957 Date Updated: 2024-09-05T18:06:06.703Z Date Published: 2023-10-11T13:21:32.613Z Description: A vulnerability of authentication bypass has been found on a Zebra Technologies ZTC ZT410-203dpi ZPL printer. This vulnerability allows an attacker that is in the same network as the printer, to change the username and password for the Web Page by sending a specially crafted POST request to the setvarsResults.cgi file. For this vulnerability to be exploitable, the printers protected mode must be disabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso-sci/authentication-bypass-zebra-ztc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26853.
CVE ID: CVE-2020-26853 Date Updated: 2022-10-13T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38330.
CVE ID: CVE-2021-38330 Date Updated: 2024-09-17T04:23:48.920Z Date Published: 2021-09-10T13:32:21.877017Z Description: The Yet Another bol.com Plugin WordPress plugin is vulnerable to Reflected Cross-Site Scripting due to a reflected $_SERVER["PHP_SELF"] value in the ~/yabp.php file which allows attackers to inject arbitrary web scripts, in versions up to and including 1.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/vulnerability-advisories/#CVE-2021-38330 - https://plugins.trac.wordpress.org/browser/yabp/tags/1.4/yabp.php#L454 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28477.
CVE ID: CVE-2022-28477 Date Updated: 2024-08-03T05:56:15.478Z Date Published: 2022-04-28T19:41:21 Description: WBCE CMS 1.5.2 is vulnerable to Cross Site Scripting (XSS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/APTX-4879/CVE - https://github.com/APTX-4879/CVE/blob/main/CVE-2022-28477..pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11772.
CVE ID: CVE-2018-11772 Date Updated: 2024-08-05T08:17:09.112Z Date Published: 2019-07-29T18:32:36 Description: Apache VCL versions 2.1 through 2.5 do not properly validate cookie input when determining what node (if any) was previously selected in the privilege tree. The cookie data is then used in an SQL statement. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/a468c473b4c418307b9866fe4c613630a2efc46bed53438b6af1f55c%40%3Cdev.vcl.apache.org%3E - https://lists.apache.org/thread.html/ffde9f87d0730ba6d4e1242eda56c1f1d6d0802ee4eda36fc1be3aaa%40%3Cannounce.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2483.
CVE ID: CVE-2011-2483 Date Updated: 2024-08-06T23:00:34.040Z Date Published: 2011-08-25T14:00:00 Description: crypt_blowfish before 1.1, as used in PHP before 5.3.7 on certain platforms, PostgreSQL before 8.4.9, and other products, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/crypt/ - http://www.mandriva.com/security/advisories?name=MDVSA-2011:180 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69319 - http://support.apple.com/kb/HT5130 - http://php.net/security/crypt_blowfish - http://www.securityfocus.com/bid/49241 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:165 - http://www.debian.org/security/2012/dsa-2399 - http://www.debian.org/security/2011/dsa-2340 - http://www.redhat.com/support/errata/RHSA-2011-1378.html - http://www.postgresql.org/docs/8.4/static/release-8-4-9.html - http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html - http://lists.opensuse.org/opensuse-security-announce/2011-08/msg00015.html - http://www.mandriva.com/security/advisories?name=MDVSA-2011:178 - http://www.redhat.com/support/errata/RHSA-2011-1377.html - http://www.redhat.com/support/errata/RHSA-2011-1423.html - http://www.php.net/ChangeLog-5.php#5.3.7 - http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 - http://www.php.net/archive/2011.php#id2011-08-18-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:179 - http://freshmeat.net/projects/crypt_blowfish - http://www.ubuntu.com/usn/USN-1229-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16768.
CVE ID: CVE-2017-16768 Date Updated: 2024-08-05T20:35:20.927Z Date Published: 2017-12-27T17:00:00 Description: Cross-site scripting (XSS) vulnerability in User Policy editor in Synology MailPlus Server before 1.4.0-0415 allows remote authenticated users to inject arbitrary HTML via the name parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synology.com/en-global/support/security/Synology_SA_17_81 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1543.
CVE ID: CVE-2022-1543 Date Updated: 2024-08-03T00:10:03.981Z Date Published: 2022-04-29T18:10:09 Description: Improper handling of Length parameter in GitHub repository erudika/scoold prior to 1.49.4. When the text size is large enough the service results in a momentary outage in a production environment. That can lead to memory corruption on the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/9889d435-3b9c-4e9d-93bc-5272e0723f9f - https://github.com/erudika/scoold/commit/62a0e92e1486ddc17676a7ead2c07ff653d167ce No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0225.
CVE ID: CVE-2012-0225 Date Updated: 2024-08-06T18:16:19.763Z Date Published: 2012-04-02T20:00:00 Description: Cross-site scripting (XSS) vulnerability in Invensys Wonderware Information Server 4.0 SP1 and 4.5 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1026886 - http://secunia.com/advisories/48603 - http://www.securityfocus.com/bid/52851 - http://www.us-cert.gov/control_systems/pdf/ICSA-12-062-01.pdf - http://www.securitytracker.com/id?1026887 - https://exchange.xforce.ibmcloud.com/vulnerabilities/74549 - http://osvdb.org/80888 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19728.
CVE ID: CVE-2018-19728 Date Updated: 2024-08-05T11:44:20.066Z Date Published: 2019-01-28T18:00:00 Description: Adobe Acrobat and Reader versions 2019.008.20081 and earlier, 2019.008.20080 and earlier, 2019.008.20081 and earlier, 2017.011.30106 and earlier version, 2017.011.30105 and earlier version, 2015.006.30457 and earlier, and 2015.006.30456 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb18-41.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0435.
CVE ID: CVE-2023-0435 Date Updated: 2024-08-02T05:10:56.243Z Date Published: 2023-01-22T00:00:00 Description: Excessive Attack Surface in GitHub repository pyload/pyload prior to 0.5.0b3.dev41. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/a3e32ad5-caee-4f43-b10a-4a876d4e3f1d - https://github.com/pyload/pyload/commit/431ea6f0371d748df66b344a05ca1a8e0310cff3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6516.
CVE ID: CVE-2008-6516 Date Updated: 2024-08-07T11:34:47.028Z Date Published: 2009-03-25T18:00:00 Description: Multiple directory traversal vulnerabilities in phpKF-Portal 1.10 allow remote attackers to include arbitrary files via a .. (dot dot) in the (1) tema_dizin parameter to baslik.php and (2) portal_ayarlarportal_dili parameter to anket_yonetim.php. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/44263 - http://www.securityfocus.com/bid/30566 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8137.
CVE ID: CVE-2020-8137 Date Updated: 2024-08-04T09:48:25.646Z Date Published: 2020-03-20T18:26:37 Description: Code injection vulnerability in blamer 1.0.0 and earlier may result in remote code execution when the input can be controlled by an attacker. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/772448 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40133.
CVE ID: CVE-2022-40133 Date Updated: 2024-09-17T03:49:24.624Z Date Published: 2022-09-09T14:39:51.501308Z Description: A use-after-free(UAF) vulnerability was found in function 'vmw_execbuf_tie_context' in drivers/gpu/vmxgfx/vmxgfx_execbuf.c in Linux kernel's vmwgfx driver with device file '/dev/dri/renderD128 (or Dxxx)'. This flaw allows a local attacker with a user account on the system to gain privilege, causing a denial of service(DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.openanolis.cn/show_bug.cgi?id=2075 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6735.
CVE ID: CVE-2019-6735 Date Updated: 2024-08-04T20:31:04.188Z Date Published: 2019-03-19T19:56:01 Description: This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Foxit Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the current process. Was ZDI-CAN-7355. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php - https://www.zerodayinitiative.com/advisories/ZDI-19-141/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51397.
CVE ID: CVE-2023-51397 Date Updated: 2024-08-02T22:32:09.363Z Date Published: 2023-12-29T10:23:43.091Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Brainstorm Force WP Remote Site Search allows Stored XSS.This issue affects WP Remote Site Search: from n/a through 1.0.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-remote-site-search/wordpress-wp-remote-site-search-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27999.
CVE ID: CVE-2024-27999 Date Updated: 2024-08-02T00:41:55.986Z Date Published: 2024-03-28T06:50:52.701Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Digamber Pradhan Preview E-mails for WooCommerce allows Reflected XSS.This issue affects Preview E-mails for WooCommerce: from n/a through 2.2.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woo-preview-emails/wordpress-preview-e-mails-for-woocommerce-plugin-2-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-3511.
CVE ID: CVE-2017-3511 Date Updated: 2024-08-05T14:30:57.983Z Date Published: 2017-04-24T19:00:00 Description: Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 7u131 and 8u121; Java SE Embedded: 8u121; JRockit: R28.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded, JRockit executes to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 7.7 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:1221 - https://security.gentoo.org/glsa/201705-03 - https://access.redhat.com/errata/RHSA-2017:1220 - https://access.redhat.com/errata/RHSA-2017:1117 - http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html - http://www.securityfocus.com/bid/97731 - https://access.redhat.com/errata/RHSA-2017:1109 - http://www.securitytracker.com/id/1038286 - http://www.debian.org/security/2017/dsa-3858 - https://access.redhat.com/errata/RHSA-2017:1108 - https://access.redhat.com/errata/RHSA-2017:1204 - https://access.redhat.com/errata/RHSA-2017:1118 - https://security.gentoo.org/glsa/201707-01 - https://access.redhat.com/errata/RHSA-2017:3453 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36620.
CVE ID: CVE-2023-36620 Date Updated: 2024-09-05T15:03:54.184Z Date Published: 2023-11-03T00:00:00 Description: An issue was discovered in the Boomerang Parental Control application before 13.83 for Android. The app is missing the android:allowBackup="false" attribute in the manifest. This allows the user to backup the internal memory of the app to a PC. This gives the user access to the API token that is used to authenticate requests to the API. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec-consult.com/blog/detail/the-hidden-costs-of-parental-control-apps/ - https://useboomerang.com/ - https://seclists.org/fulldisclosure/2023/Jul/12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32993.
CVE ID: CVE-2024-32993 Date Updated: 2024-08-02T02:27:53.477Z Date Published: 2024-05-11T09:56:03.872Z Description: Out-of-bounds access vulnerability in the memory module Impact: Successful exploitation of this vulnerability will affect availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2024/5/ - https://device.harmonyos.com/cn/docs/security/update/security-bulletins-phones-202405-0000001902628049 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4379.
CVE ID: CVE-2011-4379 Date Updated: 2024-09-17T01:42:01.541Z Date Published: 2013-10-01T00:00:00Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4896.
CVE ID: CVE-2018-4896 Date Updated: 2024-08-05T05:18:26.739Z Date Published: 2018-02-27T05:00:00 Description: An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that handles Enhanced Metafile Format Plus (EMF+) data. A successful attack can lead to sensitive data exposure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102996 - https://helpx.adobe.com/security/products/acrobat/apsb18-02.html - http://www.securitytracker.com/id/1040364 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9236.
CVE ID: CVE-2019-9236 Date Updated: 2024-08-04T21:38:46.655Z Date Published: 2019-09-27T18:05:12 Description: In NFC, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122322613 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/android-10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4368.
CVE ID: CVE-2013-4368 Date Updated: 2024-08-06T16:38:02.062Z Date Published: 2013-10-17T23:00:00 Description: The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information (hypervisor stack content) via unspecified vectors related to stale data in a segment register. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html - http://security.gentoo.org/glsa/glsa-201407-03.xml - http://www.openwall.com/lists/oss-security/2013/10/10/10 - https://exchange.xforce.ibmcloud.com/vulnerabilities/87799 - http://rhn.redhat.com/errata/RHSA-2013-1449.html - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html - http://www.debian.org/security/2014/dsa-3006 - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html - http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9224.
CVE ID: CVE-2017-9224 Date Updated: 2024-08-05T17:02:43.859Z Date Published: 2017-05-24T15:00:00 Description: An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kkos/oniguruma/commit/690313a061f7a4fa614ec5cc8368b4f2284e059b - https://access.redhat.com/errata/RHSA-2018:1296 - https://github.com/kkos/oniguruma/issues/57 - http://www.securityfocus.com/bid/101244 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.