instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2008-0166.
CVE ID: CVE-2008-0166 Date Updated: 2024-08-07T07:39:32.856Z Date Published: 2008-05-13T17:00:00 Description: OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2008/dsa-1576 - https://www.exploit-db.com/exploits/5622 - http://secunia.com/advisories/30221 - http://sourceforge.net/mailarchive/forum.php?thread_name=48367252.7070603%40shemesh.biz&forum_name=rsyncrypto-devel - http://www.debian.org/security/2008/dsa-1571 - http://www.securityfocus.com/bid/29179 - http://www.securityfocus.com/archive/1/492112/100/0/threaded - http://secunia.com/advisories/30239 - http://secunia.com/advisories/30220 - http://www.ubuntu.com/usn/usn-612-7 - http://secunia.com/advisories/30231 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42375 - http://metasploit.com/users/hdm/tools/debian-openssl/ - http://secunia.com/advisories/30249 - http://www.securitytracker.com/id?1020017 - https://www.exploit-db.com/exploits/5632 - http://www.ubuntu.com/usn/usn-612-4 - http://www.ubuntu.com/usn/usn-612-2 - http://www.us-cert.gov/cas/techalerts/TA08-137A.html - http://www.kb.cert.org/vuls/id/925211 - https://www.exploit-db.com/exploits/5720 - http://secunia.com/advisories/30136 - http://www.ubuntu.com/usn/usn-612-3 - http://www.ubuntu.com/usn/usn-612-1 - https://16years.secvuln.info - https://news.ycombinator.com/item?id=40333169 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12751.
CVE ID: CVE-2019-12751 Date Updated: 2024-08-04T23:32:55.191Z Date Published: 2019-07-11T20:01:31 Description: Symantec Messaging Gateway, prior to 10.7.1, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/108925 - https://support.symantec.com/us/en/article.SYMSA1486.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3331.
CVE ID: CVE-2013-3331 Date Updated: 2024-08-06T16:07:37.243Z Date Published: 2013-05-16T10:00:00 Description: Adobe Flash Player before 10.3.183.86 and 11.x before 11.7.700.202 on Windows and Mac OS X, before 10.3.183.86 and 11.x before 11.2.202.285 on Linux, before 11.1.111.54 on Android 2.x and 3.x, and before 11.1.115.58 on Android 4.x; Adobe AIR before 3.7.0.1860; and Adobe AIR SDK & Compiler before 3.7.0.1860 allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2013-2728, CVE-2013-3324, CVE-2013-3325, CVE-2013-3326, CVE-2013-3327, CVE-2013-3328, CVE-2013-3329, CVE-2013-3330, CVE-2013-3332, CVE-2013-3333, CVE-2013-3334, and CVE-2013-3335. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00003.html - http://secunia.com/advisories/53442 - http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00003.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16846 - http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00010.html - http://www.adobe.com/support/security/bulletins/apsb13-14.html - http://rhn.redhat.com/errata/RHSA-2013-0825.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4729.
CVE ID: CVE-2020-4729 Date Updated: 2024-08-04T08:14:57.903Z Date Published: 2023-04-28T01:11:03.737Z Description: IBM Counter Fraud Management for Safer Payments 5.7.0.00 through 5.7.0.10, 6.0.0.00 through 6.0.0.07, 6.1.0.00 through 6.1.0.05, and 6.2.0.00 through 6.2.1.00 could allow an authenticated attacker under special circumstances to send multiple specially crafted API requests that could cause the application to crash. IBM X-Force ID: 188052. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6985595 - https://exchange.xforce.ibmcloud.com/vulnerabilities/188052 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-13746.
CVE ID: CVE-2017-13746 Date Updated: 2024-08-05T19:05:20.259Z Date Published: 2017-08-29T06:00:00 Description: There is a reachable assertion abort in the function jpc_dec_process_siz() in jpc/jpc_dec.c:1297 in JasPer 2.0.12 that will lead to a remote denial of service attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100514 - https://bugzilla.redhat.com/show_bug.cgi?id=1485286 - https://security.gentoo.org/glsa/201908-03 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UPOVZTSIQPW2H4AFLMI3LHJEZGBVEQET/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N4ALB4SXHURLVWKAOKYRNJXPABW3M22M/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4628.
CVE ID: CVE-2008-4628 Date Updated: 2024-08-07T10:24:20.407Z Date Published: 2008-10-21T00:00:00 Description: SQL injection vulnerability in del.php in myWebland miniBloggie 1.0 allows remote attackers to execute arbitrary SQL commands via the post_id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/2864 - https://www.exploit-db.com/exploits/6782 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45980 - http://securityreason.com/securityalert/4442 - http://www.securityfocus.com/bid/31810 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1955.
CVE ID: CVE-2009-1955 Date Updated: 2024-08-07T05:36:19.503Z Date Published: 2009-06-06T18:00:00 Description: The expat XML parser in the apr_xml_* interface in xml/apr_xml.c in Apache APR-util before 1.3.7, as used in the mod_dav and mod_dav_svn modules in the Apache HTTP Server, allows remote attackers to cause a denial of service (memory consumption) via a crafted XML document containing a large number of nested entity references, as demonstrated by a PROPFIND request, a similar issue to CVE-2003-1564. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/35487 - http://www.debian.org/security/2009/dsa-1812 - http://www.apache.org/dist/apr/CHANGES-APR-UTIL-1.3 - http://www.vupen.com/english/advisories/2009/1907 - https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01228.html - http://secunia.com/advisories/35444 - http://marc.info/?l=apr-dev&m=124396021826125&w=2 - http://www.mandriva.com/security/advisories?name=MDVSA-2009:131 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10270 - http://secunia.com/advisories/35360 - http://www.vupen.com/english/advisories/2010/1107 - http://www.openwall.com/lists/oss-security/2009/06/03/4 - http://secunia.com/advisories/35395 - http://www-01.ibm.com/support/docview.wss?uid=swg1PK99478 - http://www.securityfocus.com/archive/1/506053/100/0/threaded - http://lists.opensuse.org/opensuse-security-announce/2010-05/msg00001.html - http://secunia.com/advisories/35284 - http://www-01.ibm.com/support/docview.wss?uid=swg1PK91241 - http://secunia.com/advisories/36473 - http://www-01.ibm.com/support/docview.wss?uid=swg1PK88342 - http://secunia.com/advisories/35843 - https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01173.html - http://www.redhat.com/support/errata/RHSA-2009-1108.html - http://marc.info/?l=bugtraq&m=129190899612998&w=2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12473 - http://secunia.com/advisories/35797 - http://www.oracle.com/technetwork/topics/security/cpuapr2013-1899555.html - http://security.gentoo.org/glsa/glsa-200907-03.xml - http://svn.apache.org/viewvc?view=rev&revision=781403 - https://www.redhat.com/archives/fedora-package-announce/2009-June/msg01201.html - http://www.ubuntu.com/usn/usn-786-1 - http://secunia.com/advisories/34724 - http://secunia.com/advisories/37221 - http://secunia.com/advisories/35565 - http://www.vupen.com/english/advisories/2009/3184 - http://wiki.rpath.com/Advisories:rPSA-2009-0123 - https://www.exploit-db.com/exploits/8842 - http://marc.info/?l=bugtraq&m=129190899612998&w=2 - http://slackware.com/security/viewer.php?l=slackware-security&y=2009&m=slackware-security.538210 - http://www-01.ibm.com/support/docview.wss?uid=swg27014463 - http://lists.apple.com/archives/security-announce/2009/Nov/msg00000.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - http://secunia.com/advisories/35710 - http://www.securityfocus.com/bid/35253 - http://www.redhat.com/support/errata/RHSA-2009-1107.html - http://support.apple.com/kb/HT3937 - http://www.ubuntu.com/usn/usn-787-1 - https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/reb7c64aeea604bf948467d9d1cab8ff23fa7d002be1964bcc275aae7%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r2295080a257bad27ea68ca0af12fc715577f9e84801eae116a33107e%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rc4c53a0d57b2771ecd4b965010580db355e38137c8711311ee1073a8%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3E - https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4408.
CVE ID: CVE-2010-4408 Date Updated: 2024-08-07T03:43:14.705Z Date Published: 2010-12-06T20:00:00 Description: Apache Archiva 1.0 through 1.0.3, 1.1 through 1.1.4, 1.2 through 1.2.2, and 1.3 through 1.3.1 does not require entry of the administrator's password at the time of modifying a user account, which makes it easier for context-dependent attackers to gain privileges by leveraging a (1) unattended workstation or (2) cross-site request forgery (CSRF) vulnerability, a related issue to CVE-2010-3449. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archiva.apache.org/security.html - http://mail-archives.apache.org/mod_mbox/archiva-users/201011.mbox/ajax/%3CAANLkTimXejHAuXdoUKLN=GkNty1_XnRCbv0YA0T2cS_2%40mail.gmail.com%3E - http://www.securityfocus.com/archive/1/514937/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39223.
CVE ID: CVE-2023-39223 Date Updated: 2024-08-02T18:02:06.698Z Date Published: 2024-03-18T00:32:44.762Z Description: Stored cross-site scripting vulnerability exists in CGIs included in A.K.I Software's PMailServer/PMailServer2 products. If this vulnerability is exploited, an arbitrary script may be executed on a logged-in user's web browser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://akisoftware.com/Vulnerability202301.html - https://jvn.jp/en/jp/JVN92720882/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33281.
CVE ID: CVE-2022-33281 Date Updated: 2024-08-03T08:01:20.538Z Date Published: 2023-05-02T05:08:44.233Z Description: Memory corruption due to improper validation of array index in computer vision while testing EVA kernel without sending any frames. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/may-2023-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32297.
CVE ID: CVE-2021-32297 Date Updated: 2024-08-03T23:17:29.382Z Date Published: 2021-09-20T15:26:51 Description: An issue was discovered in LIEF through 0.11.4. A heap-buffer-overflow exists in the function main located in pe_reader.c. It allows an attacker to cause code Execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/lief-project/LIEF/issues/449 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3991.
CVE ID: CVE-2009-3991 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9978.
CVE ID: CVE-2019-9978 Date Updated: 2024-08-04T22:10:08.719Z Date Published: 2019-03-24T14:47:26 Description: The social-warfare plugin before 3.5.3 for WordPress has stored XSS via the wp-admin/admin-post.php?swp_debug=load_options swp_url parameter, as exploited in the wild in March 2019. This affects Social Warfare and Social Warfare Pro. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpvulndb.com/vulnerabilities/9238 - https://www.cybersecurity-help.cz/vdb/SB2019032105 - https://blog.sucuri.net/2019/03/zero-day-stored-xss-in-social-warfare.html - https://www.wordfence.com/blog/2019/03/unpatched-zero-day-vulnerability-in-social-warfare-plugin-exploited-in-the-wild/ - https://www.pluginvulnerabilities.com/2019/03/21/full-disclosure-of-settings-change-persistent-cross-site-scripting-xss-vulnerability-in-social-warfare/ - https://wordpress.org/plugins/social-warfare/#developers - https://twitter.com/warfareplugins/status/1108852747099652099 - https://www.exploit-db.com/exploits/46794/ - http://packetstormsecurity.com/files/152722/Wordpress-Social-Warfare-Remote-Code-Execution.html - http://packetstormsecurity.com/files/163680/WordPress-Social-Warfare-3.5.2-Remote-Code-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-14630.
CVE ID: CVE-2018-14630 Date Updated: 2024-08-05T09:29:51.675Z Date Published: 2018-09-17T18:00:00 Description: moodle before versions 3.5.2, 3.4.5, 3.3.8, 3.1.14 is vulnerable to an XML import of ddwtos could lead to intentional remote code execution. When importing legacy 'drag and drop into text' (ddwtos) type quiz questions, it was possible to inject and execute PHP code from within the imported questions, either intentionally or by importing questions from an untrusted source. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/105354 - http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-62880 - https://moodle.org/mod/forum/discuss.php?d=376023 - https://seclists.org/fulldisclosure/2018/Sep/28 - https://www.sec-consult.com/en/blog/advisories/remote-code-execution-php-unserialize-moodle-open-source-learning-platform-cve-2018-14630/ - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14630 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12535.
CVE ID: CVE-2020-12535 Date Updated: 2022-12-30T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8877.
CVE ID: CVE-2015-8877 Date Updated: 2024-08-06T08:29:22.081Z Date Published: 2016-05-22T01:00:00 Description: The gdImageScaleTwoPass function in gd_interpolation.c in the GD Graphics Library (aka libgd) before 2.2.0, as used in PHP before 5.6.12, uses inconsistent allocate and free approaches, which allows remote attackers to cause a denial of service (memory consumption) via a crafted call, as demonstrated by a call to the PHP imagescale function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libgd/libgd/issues/173 - http://rhn.redhat.com/errata/RHSA-2016-2750.html - https://github.com/libgd/libgd/commit/4751b606fa38edc456d627140898a7ec679fcc24 - http://www.php.net/ChangeLog-5.php - https://bugs.php.net/bug.php?id=70064 - http://www.ubuntu.com/usn/USN-2987-1 - http://www.debian.org/security/2016/dsa-3587 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-21899.
CVE ID: CVE-2022-21899 Date Updated: 2024-08-03T02:53:36.403Z Date Published: 2022-01-11T20:23:02 Description: Windows Extensible Firmware Interface Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21899 - https://www.zerodayinitiative.com/advisories/ZDI-22-052/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36736.
CVE ID: CVE-2020-36736 Date Updated: 2024-08-04T17:37:06.428Z Date Published: 2023-07-01T03:30:11.536Z Description: The WooCommerce Checkout & Funnel Builder by CartFlows plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.5.15. This is due to missing or incorrect nonce validation on the export_json, import_json, and status_logs_file functions. This makes it possible for unauthenticated attackers to import/export settings and trigger logs showing via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/0d98c849-4178-4cee-846b-2c136bc56daf?source=cve - https://blog.nintechnet.com/25-wordpress-plugins-vulnerable-to-csrf-attacks/ - https://blog.nintechnet.com/more-wordpress-plugins-and-themes-vulnerable-to-csrf-attacks/ - https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-3/ - https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-2/ - https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-1/ - https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-5/ - https://blog.nintechnet.com/multiple-wordpress-plugins-fixed-csrf-vulnerabilities-part-4/ - https://plugins.trac.wordpress.org/changeset/2368446/cartflows/trunk/classes/class-cartflows-importer.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4543.
CVE ID: CVE-2008-4543 Date Updated: 2024-08-07T10:17:09.819Z Date Published: 2008-10-13T18:00:00 Description: Cisco Unity 4.x before 4.2(1)ES161, 5.x before 5.0(1)ES53, and 7.x before 7.0(2)ES8, when using anonymous authentication (aka native Unity authentication), allows remote attackers to cause a denial of service (session exhaustion) via a large number of connections. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32187 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45743 - http://securitytracker.com/id?1021013 - http://www.securityfocus.com/bid/31642 - http://www.vupen.com/english/advisories/2008/2771 - http://www.cisco.com/en/US/products/products_security_response09186a0080a0d861.html - http://www.voipshield.com/research-details.php?id=128 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6565.
CVE ID: CVE-2008-6565 Date Updated: 2024-08-07T11:34:47.156Z Date Published: 2009-03-31T17:00:00 Description: Cross-site scripting (XSS) vulnerability in Invision Power Board 2.3.1 and earlier allows remote attackers to inject arbitrary web script or HTML via an IFRAME tag in the signature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/28466 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41502 - http://www.securityfocus.com/archive/1/490115/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45363.
CVE ID: CVE-2023-45363 Date Updated: 2024-08-02T20:21:16.463Z Date Published: 2023-10-09T00:00:00 Description: An issue was discovered in ApiPageSet.php in MediaWiki before 1.35.12, 1.36.x through 1.39.x before 1.39.5, and 1.40.x before 1.40.1. It allows attackers to cause a denial of service (unbounded loop and RequestTimeoutException) when querying pages redirected to other variants with redirects and converttitles set. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://phabricator.wikimedia.org/T333050 - https://www.debian.org/security/2023/dsa-5520 - https://lists.debian.org/debian-lts-announce/2023/11/msg00027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20080.
CVE ID: CVE-2023-20080 Date Updated: 2024-08-02T08:57:35.867Z Date Published: 2023-03-23T00:00:00 Description: A vulnerability in the IPv6 DHCP version 6 (DHCPv6) relay and server features of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a denial of service (DoS) condition. This vulnerability is due to insufficient validation of data boundaries. An attacker could exploit this vulnerability by sending crafted DHCPv6 messages to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-dhcpv6-dos-44cMvdDK No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-38711.
CVE ID: CVE-2024-38711 Date Updated: 2024-08-02T04:19:20.243Z Date Published: 2024-07-20T07:27:50.300Z Description: Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yannick Lefebvre Link Library allows Reflected XSS.This issue affects Link Library: from n/a through 7.7.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/link-library/wordpress-link-library-plugin-7-7-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36255.
CVE ID: CVE-2022-36255 Date Updated: 2024-08-03T10:00:04.310Z Date Published: 2022-09-12T03:06:49 Description: A SQL injection vulnerability in SupplierDAO.java in sazanrjb InventoryManagementSystem 1.0 allows attackers to execute arbitrary SQL commands via the parameters such as "searchTxt". No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sazanrjb/InventoryManagementSystem/issues/14 - https://github.com/sazanrjb/InventoryManagementSystem - https://gist.github.com/ziyishen97/268678bca3034c64861b135946ee9fc3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0181.
CVE ID: CVE-2011-0181 Date Updated: 2024-09-17T03:13:30.748Z Date Published: 2011-03-23T01:00:00Z Description: Integer overflow in ImageIO in Apple Mac OS X before 10.6.7 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted XBM image. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html - http://support.apple.com/kb/HT4581 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3849.
CVE ID: CVE-2024-3849 Date Updated: 2024-08-01T20:26:56.921Z Date Published: 2024-05-02T16:52:54.634Z Description: The Click to Chat – HoliThemes plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.35. This makes it possible for authenticated attackers, with contributor access or above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/fe25bfef-34f0-4d57-9cba-9dcbf58281c6?source=cve - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/tools/woo/class-ht-ctc-woo.php#L284 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/admin/admin_demo/class-ht-ctc-admin-demo.php#L280 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/inc/chat/class-ht-ctc-chat-shortcode.php#L207 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/inc/chat/class-ht-ctc-chat.php#L291 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/inc/group/class-ht-ctc-group-shortcode.php#L160 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/inc/group/class-ht-ctc-group.php#L118 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/inc/share/class-ht-ctc-share-shortcode.php#L181 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/new/inc/share/class-ht-ctc-share.php#L135 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/prev/inc/class-ccw-shortcode.php#L277 - https://plugins.trac.wordpress.org/browser/click-to-chat-for-whatsapp/tags/3.35/prev/inc/commons/styles.php#L93 - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3072112%40click-to-chat-for-whatsapp%2Ftrunk&old=3064395%40click-to-chat-for-whatsapp%2Ftrunk&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11210.
CVE ID: CVE-2017-11210 Date Updated: 2024-09-16T18:40:00.974Z Date Published: 2017-08-11T19:00:00Z Description: Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable memory corruption vulnerability in the font parsing, where the font is embedded in the XML Paper Specification (XPS) file. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100184 - https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - http://www.securitytracker.com/id/1039098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4384.
CVE ID: CVE-2014-4384 Date Updated: 2024-08-06T11:12:35.572Z Date Published: 2014-09-18T10:00:00 Description: Directory traversal vulnerability in the App Installation feature in Apple iOS before 8 allows local users to install unverified apps by triggering code-signature validation of an unintended bundle. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT6441 - http://www.securitytracker.com/id/1030866 - http://www.securityfocus.com/bid/69940 - http://www.securityfocus.com/bid/69882 - https://exchange.xforce.ibmcloud.com/vulnerabilities/96087 - http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6380.
CVE ID: CVE-2023-6380 Date Updated: 2024-08-28T13:44:40.334Z Date Published: 2023-12-13T10:54:35.693Z Description: Open redirect vulnerability has been found in the Open CMS product affecting versions 14 and 15 of the 'Mercury' template. An attacker could create a specially crafted URL and send it to a specific user to redirect them to a malicious site and compromise them. Exploitation of this vulnerability is possible due to the fact that there is no proper sanitization of the 'URI' parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-alkacon-software-opencms No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4678.
CVE ID: CVE-2018-4678 Date Updated: 2023-09-14T18:42:50.781Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1092.
CVE ID: CVE-2021-1092 Date Updated: 2024-08-03T15:55:18.526Z Date Published: 2021-07-22T04:25:31 Description: NVIDIA GPU Display Driver for Windows contains a vulnerability in the NVIDIA Control Panel application where it is susceptible to a Windows file system symbolic link attack where an unprivileged attacker can cause the applications to overwrite privileged files, resulting in potential denial of service or data loss. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5211 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4601.
CVE ID: CVE-2008-4601 Date Updated: 2024-08-07T10:24:20.556Z Date Published: 2008-10-17T22:00:00 Description: Cross-site scripting (XSS) vulnerability in the login feature in Habari CMS 0.5.1 allows remote attackers to inject arbitrary web script or HTML via the habari_username parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/31794 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45951 - http://packetstorm.linuxsecurity.com/0810-exploits/habaricms-xss.txt - http://secunia.com/advisories/32311 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30417.
CVE ID: CVE-2024-30417 Date Updated: 2024-08-02T01:32:07.443Z Date Published: 2024-04-07T08:16:15.889Z Description: Path traversal vulnerability in the Bluetooth-based sharing module. Impact: Successful exploitation of this vulnerability may affect service confidentiality. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2024/4/ - https://device.harmonyos.com/en/docs/security/update/security-bulletins-202404-0000001880501689 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2516.
CVE ID: CVE-2013-2516 Date Updated: 2024-08-06T15:44:31.990Z Date Published: 2019-02-15T21:00:00 Description: Vulnerability in FileUtils v0.7, Ruby Gem Fileutils <= v0.7 Command Injection vulnerability in user supplied url variable that is passed to the shell. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vapidlabs.com/advisory.php?v=36 - http://rubygems.org/gems/fileutils No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2939.
CVE ID: CVE-2014-2939 Date Updated: 2024-08-06T10:28:46.176Z Date Published: 2014-06-02T19:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Alfresco Enterprise before 4.1.6.13 allow remote attackers to inject arbitrary web script or HTML via (1) an XHTML document, (2) a <% tag, or (3) the taskId parameter to share/page/task-edit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/537684 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24189.
CVE ID: CVE-2021-24189 Date Updated: 2024-08-03T19:21:18.661Z Date Published: 2021-05-14T11:38:16 Description: Low privileged users can use the AJAX action 'cp_plugins_do_button_job_later_callback' in the Captchinoo, Google recaptcha for admin login page WordPress plugin before 2.4, to install any plugin (including a specific version) from the WordPress repository, as well as activate arbitrary plugin from then blog, which helps attackers install vulnerable plugins and could lead to more critical vulnerabilities like RCE. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/74889e29-5349-43d1-baf5-1622493be90c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1381.
CVE ID: CVE-2014-1381 Date Updated: 2024-08-06T09:42:34.985Z Date Published: 2014-07-01T10:00:00 Description: Thunderbolt in Apple OS X before 10.9.4 does not properly restrict IOThunderBoltController API calls, which allows attackers to execute arbitrary code or cause a denial of service (out-of-bounds memory access and application crash) via a crafted call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT6296 - http://www.securitytracker.com/id/1030505 - http://archives.neohapsis.com/archives/bugtraq/2014-06/0172.html - http://secunia.com/advisories/59475 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6293.
CVE ID: CVE-2023-6293 Date Updated: 2024-08-02T08:28:21.695Z Date Published: 2023-11-24T19:51:55.099Z Description: Prototype Pollution in GitHub repository robinbuschmann/sequelize-typescript prior to 2.1.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/36a7ecbf-4d3d-462e-86a3-cda7b1ec64e2 - https://github.com/robinbuschmann/sequelize-typescript/commit/5ce8afdd1671b08c774ce106b000605ba8fccf78 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18471.
CVE ID: CVE-2017-18471 Date Updated: 2024-08-05T21:20:51.166Z Date Published: 2019-08-05T12:42:13 Description: cPanel before 62.0.4 allows self XSS on the paper_lantern password-change screen (SEC-197). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://documentation.cpanel.net/display/CL/62+Change+Log No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-9155.
CVE ID: CVE-2018-9155 Date Updated: 2024-08-05T07:17:51.475Z Date Published: 2018-04-12T15:00:00 Description: Cross-site scripting (XSS) vulnerability in Open-AudIT Professional 2.1.1 allows remote attackers to inject arbitrary web script or HTML via a crafted name of a component, as demonstrated by the Admin->Logs section (with a logs?logs.type= URI) and the Manage->Attributes section (via the "Name (display)" field to the attributes/create URI). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/44612/ - https://docs.google.com/document/d/1ZG1qiwpECbVnv92yNckDn7yyuluKoC2_ON-eLhAY97Q/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19748.
CVE ID: CVE-2019-19748 Date Updated: 2024-08-05T02:25:12.628Z Date Published: 2019-12-12T02:36:13 Description: The Work Time Calendar app before 4.7.1 for Jira allows XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://marketplace.atlassian.com/apps/1213545/work-time-calendar-for-jira/version-history No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42573.
CVE ID: CVE-2024-42573 Date Updated: 2024-08-22T14:03:51.106Z Date Published: 2024-08-20T00:00:00 Description: School Management System commit bae5aa was discovered to contain a SQL injection vulnerability via the medium parameter at dtmarks.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/topsky979/d44aabca29c1a6a9845fde465b924e79 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-23426.
CVE ID: CVE-2020-23426 Date Updated: 2024-08-04T14:58:14.971Z Date Published: 2021-04-08T14:27:47 Description: zzcms 201910 contains an access control vulnerability through escalation of privileges in /user/adv.php, which allows an attacker to modify data for further attacks such as CSRF. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Ling-Yizhou/zzcms-vuln/blob/master/Privilege%20Escalation/priviege%20escalation.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26931.
CVE ID: CVE-2021-26931 Date Updated: 2024-08-03T20:33:41.548Z Date Published: 2021-02-17T00:00:00 Description: An issue was discovered in the Linux kernel 2.6.39 through 5.10.16, as used in Xen. Block, net, and SCSI backends consider certain errors a plain bug, deliberately causing a kernel crash. For errors potentially being at least under the influence of guests (such as out of memory conditions), it isn't correct to assume a plain bug. Memory allocations potentially causing such crashes occur only when Linux is running in PV mode, though. This affects drivers/block/xen-blkback/blkback.c and drivers/xen/xen-scsiback.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://xenbits.xen.org/xsa/advisory-362.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2XQR52ICKRK3GC4HDWLMWF2U55YGAR63/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GWQWPWYZRXVFJI5M3VCM72X27IB7CKOB/ - https://lists.debian.org/debian-lts-announce/2021/03/msg00010.html - https://security.netapp.com/advisory/ntap-20210326-0001/ - https://lists.debian.org/debian-lts-announce/2021/03/msg00035.html - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=7c77474b2d22176d2bfb592ec74e0f2cb71352c9 - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5a264285ed1cd32e26d9de4f3c8c6855e467fd63 - https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=3194a1746e8aabe86075fd3c5e7cf1f4632d7f16 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32129.
CVE ID: CVE-2022-32129 Date Updated: 2024-08-03T07:32:55.969Z Date Published: 2022-06-22T18:42:06 Description: 74cmsSE v3.5.1 was discovered to contain a reflective cross-site scripting (XSS) vulnerability via the path /company/account/safety/trade. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PAINCLOWN/74cmsSE-Arbitrary-File-Reading/issues/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-8725.
CVE ID: CVE-2019-8725 Date Updated: 2024-08-04T21:24:29.605Z Date Published: 2019-12-18T17:33:22 Description: The issue was addressed with improved handling of service worker lifetime. This issue is fixed in Safari 13.0.1. Service workers may leak private browsing history. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT210605 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18641.
CVE ID: CVE-2018-18641 Date Updated: 2024-08-05T11:15:59.991Z Date Published: 2018-12-04T23:00:00 Description: An issue was discovered in GitLab Community and Enterprise Edition before 11.2.7, 11.3.x before 11.3.8, and 11.4.x before 11.4.3. It has Cleartext Storage of Sensitive Information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab-ce/issues/51113 - https://about.gitlab.com/2018/10/29/security-release-gitlab-11-dot-4-dot-3-released/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4379.
CVE ID: CVE-2015-4379 Date Updated: 2024-08-06T06:11:12.900Z Date Published: 2015-06-15T14:00:00 Description: Cross-site request forgery (CSRF) vulnerability in the Webform Multiple File Upload module 6.x-1.x before 6.x-1.3 and 7.x-1.x before 7.x-1.3 for Drupal allows remote attackers to hijack the authentication of certain users for requests that delete files via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74343 - http://www.openwall.com/lists/oss-security/2015/04/25/6 - https://www.drupal.org/node/2459035 - https://www.drupal.org/node/2459031 - https://www.drupal.org/node/2459323 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20043.
CVE ID: CVE-2023-20043 Date Updated: 2024-08-02T08:57:35.585Z Date Published: 2023-01-19T01:36:37.287Z Description: A vulnerability in Cisco CX Cloud Agent of could allow an authenticated, local attacker to elevate their privileges. This vulnerability is due to insecure file permissions. An attacker could exploit this vulnerability by calling the script with sudo. A successful exploit could allow the attacker to take complete control of the affected device. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cxagent-gOq9QjqZ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36222.
CVE ID: CVE-2023-36222 Date Updated: 2024-08-02T16:45:56.092Z Date Published: 2023-07-03T00:00:00 Description: Cross Site Scripting vulnerability in mlogclub bbs-go v. 3.5.5. and before allows a remote attacker to execute arbitrary code via a crafted payload to the comment parameter in the article function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bbs-go.com - https://github.com/mlogclub/bbs-go - https://github.com/mlogclub/bbs-go/issues/206 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28780.
CVE ID: CVE-2023-28780 Date Updated: 2024-08-02T13:51:38.209Z Date Published: 2023-11-18T22:45:05.817Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Yoast Yoast Local Premium.This issue affects Yoast Local Premium: from n/a through 14.8. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wpseo-local/wordpress-yoast-seo-local-plugin-14-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5572.
CVE ID: CVE-2023-5572 Date Updated: 2024-09-17T13:48:19.195Z Date Published: 2023-10-13T09:55:53.916Z Description: Server-Side Request Forgery (SSRF) in GitHub repository vriteio/vrite prior to 0.3.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/db649f1b-8578-4ef0-8df3-d320ab33f1be - https://github.com/vriteio/vrite/commit/1877683b932bb33fb20d688e476284b70bb9fe23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2540.
CVE ID: CVE-2017-2540 Date Updated: 2024-08-05T13:55:06.208Z Date Published: 2017-05-22T04:54:00 Description: An issue was discovered in certain Apple products. macOS before 10.12.5 is affected. The issue involves the "WindowServer" component. It allows attackers to bypass intended memory-read restrictions via a crafted app. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1038484 - https://support.apple.com/HT207797 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-39468.
CVE ID: CVE-2024-39468 Date Updated: 2024-09-11T17:34:41.922Z Date Published: 2024-06-25T14:28:54.897Z Description: In the Linux kernel, the following vulnerability has been resolved: smb: client: fix deadlock in smb2_find_smb_tcon() Unlock cifs_tcp_ses_lock before calling cifs_put_smb_ses() to avoid such deadlock. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/b055752675cd1d1db4ac9c2750db3dc3e89ea261 - https://git.kernel.org/stable/c/21f5dd36e655d25a7b45b61c1e537198b671f720 - https://git.kernel.org/stable/c/b09b556e48968317887a11243a5331a7bc00ece5 - https://git.kernel.org/stable/c/225de871ddf994f69a57f035709cad9c0ab8615a - https://git.kernel.org/stable/c/8d0f5f1ccf675454a833a573c53830a49b7d1a47 - https://git.kernel.org/stable/c/02c418774f76a0a36a6195c9dbf8971eb4130a15 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2377.
CVE ID: CVE-2008-2377 Date Updated: 2024-08-07T08:58:02.218Z Date Published: 2008-08-08T19:00:00 Description: Use-after-free vulnerability in the _gnutls_handshake_hash_buffers_clear function in lib/gnutls_handshake.c in libgnutls in GnuTLS 2.3.5 through 2.4.0 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via TLS transmission of data that is improperly used when the peer calls gnutls_handshake within a normal session, leading to attempted access to a deallocated libgcrypt handle. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://article.gmane.org/gmane.comp.encryption.gpg.gnutls.devel/2947 - https://issues.rpath.com/browse/RPL-2650 - http://www.gnu.org/software/gnutls/security.html - http://www.nabble.com/Details-on-the-gnutls_handshake-local-crash-problem--GNUTLS-SA-2008-2--td18205022.html - http://www.vupen.com/english/advisories/2008/2398 - http://www.securityfocus.com/bid/30713 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44486 - http://secunia.com/advisories/31505 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35665.
CVE ID: CVE-2022-35665 Date Updated: 2024-09-16T22:08:38.630Z Date Published: 2022-08-11T14:43:59.645419Z Description: Adobe Acrobat Reader versions 22.001.20169 (and earlier), 20.005.30362 (and earlier) and 17.012.30249 (and earlier) are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb22-39.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2506.
CVE ID: CVE-2011-2506 Date Updated: 2024-08-06T23:00:34.178Z Date Published: 2011-07-14T23:00:00 Description: setup/lib/ConfigGenerator.class.php in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not properly restrict the presence of comment closing delimiters, which allows remote attackers to conduct static code injection attacks by leveraging the ability to modify the SESSION superglobal array. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.xxor.se/advisories/phpMyAdmin_3.x_Multiple_Remote_Code_Executions.txt - http://www.openwall.com/lists/oss-security/2011/06/28/2 - http://typo3.org/teams/security/security-bulletins/typo3-sa-2011-008/ - http://www.phpmyadmin.net/home_page/security/PMASA-2011-6.php - http://secunia.com/advisories/45292 - http://www.openwall.com/lists/oss-security/2011/06/28/6 - http://www.openwall.com/lists/oss-security/2011/06/28/8 - http://www.mandriva.com/security/advisories?name=MDVSA-2011:124 - http://securityreason.com/securityalert/8306 - http://phpmyadmin.git.sourceforge.net/git/gitweb.cgi?p=phpmyadmin/phpmyadmin%3Ba=commit%3Bh=0fbedaf5fd7a771d0885c6b7385d934fc90d0d7f - http://secunia.com/advisories/45139 - http://www.exploit-db.com/exploits/17514/ - http://www.debian.org/security/2011/dsa-2286 - http://www.securityfocus.com/archive/1/518804/100/0/threaded - http://www.osvdb.org/73612 - http://www.openwall.com/lists/oss-security/2011/06/29/11 - http://ha.xxor.se/2011/07/phpmyadmin-3x-multiple-remote-code.html - http://secunia.com/advisories/45315 - http://lists.fedoraproject.org/pipermail/package-announce/2011-July/062719.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6146.
CVE ID: CVE-2016-6146 Date Updated: 2024-08-06T01:22:20.529Z Date Published: 2016-09-27T15:00:00 Description: The NameServer in SAP TREX 7.10 Revision 63 allows remote attackers to obtain sensitive TNS information via an unspecified query, aka SAP Security Note 2234226. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://onapsis.com/research/security-advisories/sap-trex-tns-information-disclosure-nameserver - http://scn.sap.com/community/security/blog/2015/12/09/sap-security-notes-december-2015--review - https://layersevensecurity.com/wp-content/uploads/2016/03/Layer-Seven-Security_SAP-Security-Notes_February-2016.pdf - http://packetstormsecurity.com/files/138445/SAP-TREX-7.10-Revision-63-NameServer-TNS-Information-Disclosure.html - http://seclists.org/fulldisclosure/2016/Aug/93 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32820.
CVE ID: CVE-2022-32820 Date Updated: 2024-08-03T07:54:02.332Z Date Published: 2022-09-23T18:59:47 Description: An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 15.6 and iPadOS 15.6, macOS Big Sur 11.6.8, watchOS 8.7, tvOS 15.6, macOS Monterey 12.5, Security Update 2022-005 Catalina. An app may be able to execute arbitrary code with kernel privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213345 - https://support.apple.com/en-us/HT213340 - https://support.apple.com/en-us/HT213342 - https://support.apple.com/en-us/HT213346 - https://support.apple.com/en-us/HT213344 - https://support.apple.com/en-us/HT213343 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20096.
CVE ID: CVE-2021-20096 Date Updated: 2024-08-03T17:30:07.337Z Date Published: 2021-05-25T11:31:10 Description: Cross-site request forgery in OpenOversight 0.6.4 allows a remote attacker to perform sensitive application actions by tricking legitimate users into clicking a crafted link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-18 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1027.012 : LNK Icon Smuggling
Name: LNK Icon Smuggling ID: T1027.012 URL: https://attack.mitre.org/techniques/T1027/012 Platforms: Windows Kill Chain Phases: Defense Evasion Description: Adversaries may smuggle commands to download malicious payloads past content filters by hiding them within otherwise seemingly benign windows shortcut files. Windows shortcut files (.LNK) include many metadata fields, including an icon location field (also known as the `IconEnvironmentDataBlock`) designed to specify the path to an icon file that is to be displayed for the LNK file within a host directory. Adversaries may abuse this LNK metadata to download malicious payloads. For example, adversaries have been observed using LNK files as phishing payloads to deliver malware. Once invoked (e.g., [Malicious File](T1204.002)), payloads referenced via external URLs within the LNK icon location field may be downloaded. These files may also then be invoked by [Command and Scripting Interpreter](T1059)/[System Binary Proxy Execution](T1218) arguments within the target path field of the LNK.(Citation: Unprotect Shortcut)(Citation: Booby Trap Shortcut 2017) LNK Icon Smuggling may also be utilized post compromise, such as malicious scripts executing an LNK on an infected host to download additional malicious payloads. Data Sources: File: File Metadata, File: File Creation Detection:
Provide detailed information about CVE-2020-36238.
CVE ID: CVE-2020-36238 Date Updated: 2024-09-17T00:30:53.159Z Date Published: 2021-04-01T02:30:14.029329Z Description: The /rest/api/1.0/render resource in Jira Server and Data Center before version 8.5.13, from version 8.6.0 before version 8.13.5, and from version 8.14.0 before version 8.15.1 allows remote anonymous attackers to determine if a username is valid or not via a missing permissions check. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.atlassian.com/browse/JRASERVER-72249 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2723.
CVE ID: CVE-2011-2723 Date Updated: 2024-08-06T23:08:23.800Z Date Published: 2011-09-06T15:00:00 Description: The skb_gro_header_slow function in include/linux/netdevice.h in the Linux kernel before 2.6.39.4, when Generic Receive Offload (GRO) is enabled, resets certain fields in incorrect situations, which allows remote attackers to cause a denial of service (system crash) via crafted network traffic. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=726552 - http://www.redhat.com/support/errata/RHSA-2011-1321.html - http://openwall.com/lists/oss-security/2011/07/29/1 - http://securitytracker.com/id?1025876 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=17dd759c67f21e34f2156abcf415e1f60605a188 - http://openwall.com/lists/oss-security/2011/07/28/13 - http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.4 - http://www.securityfocus.com/bid/48929 - http://marc.info/?l=bugtraq&m=139447903326211&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8495.
CVE ID: CVE-2016-8495 Date Updated: 2024-08-06T02:27:39.640Z Date Published: 2017-02-13T15:00:00 Description: An improper certificate validation vulnerability in Fortinet FortiManager 5.0.6 through 5.2.7 and 5.4.0 through 5.4.1 allows remote attacker to spoof a trusted entity by using a man-in-the-middle (MITM) attack via the Fortisandbox devices probing feature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1037805 - https://fortiguard.com/advisory/FG-IR-16-055 - http://www.securityfocus.com/bid/96157 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6930.
CVE ID: CVE-2017-6930 Date Updated: 2024-09-16T17:48:09.907Z Date Published: 2018-03-01T22:00:00Z Description: In Drupal versions 8.4.x versions before 8.4.5 when using node access controls with a multilingual site, Drupal marks the untranslated version of a node as the default fallback for access queries. This fallback is used for languages that do not yet have a translated version of the created node. This can result in an access bypass vulnerability. This issue is mitigated by the fact that it only applies to sites that a) use the Content Translation module; and b) use a node access module such as Domain Access which implement hook_node_access_records(). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.drupal.org/sa-core-2018-001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27999.
CVE ID: CVE-2023-27999 Date Updated: 2024-08-02T12:23:30.863Z Date Published: 2023-05-03T21:26:40.680Z Description: An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in FortiADC 7.2.0, 7.1.0 through 7.1.1 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://fortiguard.com/psirt/FG-IR-22-297 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21997.
CVE ID: CVE-2023-21997 Date Updated: 2024-09-13T18:28:54.087Z Date Published: 2023-04-18T19:54:43.951Z Description: Vulnerability in the Oracle User Management product of Oracle E-Business Suite (component: Proxy User Delegation). Supported versions that are affected are 12.2.3-12.2.12. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle User Management. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle User Management accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7140.
CVE ID: CVE-2020-7140 Date Updated: 2024-08-04T09:18:03.105Z Date Published: 2020-07-08T13:39:13 Description: A security vulnerability in HPE IceWall SSO Dfw and Dgfw (Domain Gateway Option) could be exploited remotely to cause a remote cross-site scripting (XSS). HPE has provided the following information to resolve this vulnerability in HPE IceWall SSO DFW and Dgfw: https://www.hpe.com/jp/icewall_patchaccess No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbmu04011en_us No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2648.
CVE ID: CVE-2017-2648 Date Updated: 2024-08-05T14:02:07.222Z Date Published: 2018-07-27T20:00:00 Description: It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96985 - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2648 - https://jenkins.io/security/advisory/2017-03-20/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3612.
CVE ID: CVE-2016-3612 Date Updated: 2024-08-06T00:03:34.095Z Date Published: 2016-07-21T10:00:00 Description: Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 5.0.22 allows remote attackers to affect confidentiality via vectors related to Core. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/91860 - http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html - http://www.securitytracker.com/id/1036384 - http://www.securityfocus.com/bid/91787 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12356.
CVE ID: CVE-2018-12356 Date Updated: 2024-08-05T08:30:59.776Z Date Published: 2018-06-15T02:00:00 Description: An issue was discovered in password-store.sh in pass in Simple Password Store 1.7.x before 1.7.2. The signature verification routine parses the output of GnuPG with an incomplete regular expression, which allows remote attackers to spoof file signatures on configuration files and extension scripts. Modifying the configuration file allows the attacker to inject additional encryption keys under their control, thereby disclosing passwords to the attacker. Modifying the extension scripts allows the attacker arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.zx2c4.com/password-store/commit/?id=8683403b77f59c56fcb1f05c61ab33b9fd61a30d - http://openwall.com/lists/oss-security/2018/06/14/3 - https://lists.zx2c4.com/pipermail/password-store/2018-June/003308.html - http://www.openwall.com/lists/oss-security/2019/04/30/4 - http://seclists.org/fulldisclosure/2019/Apr/38 - http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html - https://github.com/RUB-NDS/Johnny-You-Are-Fired - https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1690.
CVE ID: CVE-2022-1690 Date Updated: 2024-08-03T00:10:03.752Z Date Published: 2022-06-06T08:51:26 Description: The Note Press WordPress plugin through 0.1.10 does not sanitise and escape the ids from the bulk actions before using them in a SQL statement in an admin page, leading to an SQL injection No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/54e16f0a-667c-44ea-98ad-0306c4a35d9d - https://bulletin.iese.de/post/note-press_0-1-10_3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32773.
CVE ID: CVE-2021-32773 Date Updated: 2024-08-03T23:33:55.527Z Date Published: 2021-07-19T23:55:11 Description: Racket is a general-purpose programming language and an ecosystem for language-oriented programming. In versions prior to 8.2, code evaluated using the Racket sandbox could cause system modules to incorrectly use attacker-created modules instead of their intended dependencies. This could allow system functions to be controlled by the attacker, giving access to facilities intended to be restricted. This problem is fixed in Racket version 8.2. A workaround is available, depending on system settings. For systems that provide arbitrary Racket evaluation, external sandboxing such as containers limit the impact of the problem. For multi-user evaluation systems, such as the `handin-server` system, it is not possible to work around this problem and upgrading is required. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/racket/racket/security/advisories/GHSA-cgrw-p7p7-937c - https://github.com/racket/racket/commit/6ca4ffeca1e5877d44f835760ad89f18488d97e1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21466.
CVE ID: CVE-2024-21466 Date Updated: 2024-08-01T22:20:40.840Z Date Published: 2024-07-01T14:17:14.036Z Description: Information disclosure while parsing sub-IE length during new IE generation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4236.
CVE ID: CVE-2021-4236 Date Updated: 2024-08-03T17:23:10.220Z Date Published: 2022-12-27T21:13:45.711Z Description: Web Sockets do not execute any AuthenticateMethod methods which may be set, leading to a nil pointer dereference if the returned UserData pointer is assumed to be non-nil, or authentication bypass. This issue only affects WebSockets with an AuthenticateMethod hook. Request handlers that do not explicitly use WebSockets are not vulnerable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ecnepsnai/web/commit/5a78f8d5c41ce60dcf9f61aaf47a7a8dc3e0002f - https://pkg.go.dev/vuln/GO-2021-0107 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0370.
CVE ID: CVE-2021-0370 Date Updated: 2024-08-03T15:40:01.237Z Date Published: 2021-03-10T15:54:01 Description: In Write of NxpMfcReader.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege in the NFC server with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-169259605 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2021-03-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27867.
CVE ID: CVE-2024-27867 Date Updated: 2024-08-02T00:41:55.744Z Date Published: 2024-06-26T03:12:26.594Z Description: An authentication issue was addressed with improved state management. This issue is fixed in AirPods Firmware Update 6A326, AirPods Firmware Update 6F8, and Beats Firmware Update 6F8. When your headphones are seeking a connection request to one of your previously paired devices, an attacker in Bluetooth range might be able to spoof the intended source device and gain access to your headphones. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214111 - https://support.apple.com/kb/HT214111 - http://seclists.org/fulldisclosure/2024/Jul/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9714.
CVE ID: CVE-2014-9714 Date Updated: 2024-08-06T13:55:04.129Z Date Published: 2015-04-13T14:00:00 Description: Cross-site scripting (XSS) vulnerability in the WddxPacket::recursiveAddVar function in HHVM (aka the HipHop Virtual Machine) before 3.5.0 allows remote attackers to inject arbitrary web script or HTML via a crafted string to the wddx_serialize_value function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/74061 - https://phabricator.wikimedia.org/T85851 - https://github.com/facebook/hhvm/commit/324701c9fd31beb4f070f1b7ef78b115fbdfec34 - https://github.com/facebook/hhvm/issues/4283 - http://www.openwall.com/lists/oss-security/2015/04/07/3 - http://www.openwall.com/lists/oss-security/2015/04/01/1 - https://lists.wikimedia.org/pipermail/mediawiki-announce/2015-March/000175.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-37144.
CVE ID: CVE-2022-37144 Date Updated: 2024-08-03T10:21:33.180Z Date Published: 2022-09-08T00:27:59 Description: The PlexTrac platform prior to API version 1.17.0 does not restrict excessive MFA TOTP submission attempts. An unauthenticated remote attacker in possession of a valid username and password can bruteforce their way past MFA protections to login as the targeted user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://plextrac.com - https://www.controlgap.com/blog/a-plextrac-story No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44714.
CVE ID: CVE-2021-44714 Date Updated: 2024-09-16T16:22:52.449Z Date Published: 2022-01-14T19:05:41.281496Z Description: Acrobat Reader DC version 21.007.20099 (and earlier), 20.004.30017 (and earlier) and 17.011.30204 (and earlier) are affected by a Violation of Secure Design Principles that could lead to a Security feature bypass. Acrobat Reader DC displays a warning message when a user clicks on a PDF file, which could be used by an attacker to mislead the user. In affected versions, this warning message does not include custom protocols when used by the sender. User interaction is required to abuse this vulnerability as they would need to click 'allow' on the warning message of a malicious file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb22-01.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21323.
CVE ID: CVE-2024-21323 Date Updated: 2024-08-01T22:20:40.085Z Date Published: 2024-04-09T17:00:39.428Z Description: Microsoft Defender for IoT Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21323 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9842.
CVE ID: CVE-2019-9842 Date Updated: 2024-08-04T22:01:54.985Z Date Published: 2019-06-14T19:14:39 Description: madskristensen MiniBlog through 2018-05-18 allows remote attackers to execute arbitrary ASPX code via an IMG element with a data: URL, because SaveFilesToDisk in app_code/handlers/PostHandler.cs writes a decoded base64 string to a file without validating the extension. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/madskristensen/MiniBlog/blob/1a7ae45ddba484e2c8f808e288e018748c9ddb57/Website/app_code/handlers/PostHandler.cs#L85 - https://rastating.github.io/miniblog-remote-code-execution/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43234.
CVE ID: CVE-2022-43234 Date Updated: 2024-08-03T13:26:02.674Z Date Published: 2022-11-16T00:00:00 Description: An arbitrary file upload vulnerability in the /attachments component of Hoosk v1.8 allows attackers to execute arbitrary code via a crafted PHP file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/havok89/Hoosk/issues/64 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43466.
CVE ID: CVE-2021-43466 Date Updated: 2024-08-04T03:55:29.288Z Date Published: 2021-11-09T00:00:00 Description: In the thymeleaf-spring5:3.0.12 component, thymeleaf combined with specific scenarios in template injection may lead to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/wayne_wwang/wayne_wwang/blob/master/2021/10/31/ruoyi+thymeleaf-rce/index.html - https://vuldb.com/?id.186365 - https://security.netapp.com/advisory/ntap-20221014-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-0510.
CVE ID: CVE-2018-0510 Date Updated: 2024-08-05T03:28:10.826Z Date Published: 2018-02-01T14:00:00 Description: Buffer overflow in epg search result viewer (kkcald) 0.7.19 and earlier allows remote attackers to perform unintended operations or execute DoS (denial of service) attacks via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://dbit.web.fc2.com/ - https://jvn.jp/en/jp/JVN91393903/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-9261.
CVE ID: CVE-2015-9261 Date Updated: 2024-08-06T08:43:42.398Z Date Published: 2018-07-26T19:00:00 Description: huft_build in archival/libarchive/decompress_gunzip.c in BusyBox before 1.27.2 misuses a pointer, causing segfaults and an application crash during an unzip operation on a specially crafted ZIP file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.busybox.net/busybox/commit/?id=1de25a6e87e0e627aa34298105a3d17c60a1f44e - https://lists.debian.org/debian-lts-announce/2018/07/msg00037.html - http://www.openwall.com/lists/oss-security/2015/10/25/3 - https://bugs.debian.org/803097 - https://usn.ubuntu.com/3935-1/ - http://seclists.org/fulldisclosure/2019/Jun/18 - https://seclists.org/bugtraq/2019/Jun/14 - http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html - http://seclists.org/fulldisclosure/2019/Sep/7 - https://seclists.org/bugtraq/2019/Sep/7 - http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html - http://seclists.org/fulldisclosure/2020/Aug/20 - https://lists.debian.org/debian-lts-announce/2021/02/msg00020.html - http://seclists.org/fulldisclosure/2022/Jun/36 - http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9904.
CVE ID: CVE-2019-9904 Date Updated: 2024-08-04T22:01:55.186Z Date Published: 2019-03-21T17:43:15 Description: An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/graphviz/graphviz/issues/1512 - https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/ - https://security.gentoo.org/glsa/202107-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42202.
CVE ID: CVE-2022-42202 Date Updated: 2024-08-03T13:03:45.750Z Date Published: 2022-10-18T00:00:00 Description: TP-Link TL-WR841N 8.0 4.17.16 Build 120201 Rel.54750n is vulnerable to Cross Site Scripting (XSS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.yuque.com/docs/share/b85b8c6f-60ea-4d5c-acc5-3c4285806328 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18263.
CVE ID: CVE-2017-18263 Date Updated: 2024-09-16T20:07:40.797Z Date Published: 2018-04-28T01:00:00Z Description: Seagate Media Server in Seagate Personal Cloud before 4.3.18.4 has directory traversal in getPhotoPlaylistPhotos.psp via a parameter named url. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sumofpwn.nl/advisory/2017/seagate-media-server-path-traversal-vulnerability.html - https://packetstormsecurity.com/files/147274/Seagate-Media-Server-Path-Traversal.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5154.
CVE ID: CVE-2016-5154 Date Updated: 2024-08-06T00:53:47.952Z Date Published: 2016-09-11T10:00:00 Description: Multiple heap-based buffer overflows in PDFium, as used in Google Chrome before 53.0.2785.89 on Windows and OS X and before 53.0.2785.92 on Linux, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted JBig2 image. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00003.html - https://googlechromereleases.blogspot.com/2016/08/stable-channel-update-for-desktop_31.html - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00004.html - http://www.securityfocus.com/bid/92717 - https://codereview.chromium.org/2202013002/ - http://www.securitytracker.com/id/1036729 - http://lists.opensuse.org/opensuse-updates/2016-09/msg00073.html - https://crbug.com/633002 - http://www.debian.org/security/2016/dsa-3660 - https://security.gentoo.org/glsa/201610-09 - http://lists.opensuse.org/opensuse-security-announce/2016-09/msg00008.html - http://rhn.redhat.com/errata/RHSA-2016-1854.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4163.
CVE ID: CVE-2009-4163 Date Updated: 2024-09-16T18:23:38.778Z Date Published: 2009-12-02T17:00:00Z Description: SQL injection vulnerability in the TW Productfinder (tw_productfinder) extension 0.0.2 and earlier for TYPO3 allows remote attackers to execute arbitrary SQL commands via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://typo3.org/teams/security/security-bulletins/typo3-sa-2009-017/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1454.
CVE ID: CVE-2010-1454 Date Updated: 2024-08-07T01:21:19.185Z Date Published: 2010-05-19T18:13:00 Description: com.springsource.tcserver.serviceability.rmi.JmxSocketListener in VMware SpringSource tc Server Runtime 6.0.19 and 6.0.20 before 6.0.20.D, and 6.0.25.A before 6.0.25.A-SR01, does not properly enforce the requirement for an encrypted (aka s2enc) password, which allows remote attackers to obtain JMX interface access via a blank password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/58684 - http://secunia.com/advisories/39778 - http://www.springsource.com/security/cve-2010-1454 - http://www.securityfocus.com/archive/1/511307/100/0/threaded - http://www.securityfocus.com/bid/40205 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2012-0158
CVE-CVE-2012-0158 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1491: Defacement. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2012 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2021-1777.
CVE ID: CVE-2021-1777 Date Updated: 2024-08-03T16:25:04.588Z Date Published: 2021-04-02T17:58:42 Description: This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.2, Security Update 2021-001 Catalina, Security Update 2021-001 Mojave, watchOS 7.3, tvOS 14.4, iOS 14.4 and iPadOS 14.4. Processing a maliciously crafted image may lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212147 - https://support.apple.com/en-us/HT212146 - https://support.apple.com/en-us/HT212148 - https://support.apple.com/en-us/HT212149 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2137.
CVE ID: CVE-2009-2137 Date Updated: 2024-08-07T05:36:21.043Z Date Published: 2009-06-19T19:00:00 Description: Memory leak in the Ultra-SPARC T2 crypto provider device driver (aka n2cp) in Sun Solaris 10, and OpenSolaris snv_54 through snv_112, allows context-dependent attackers to cause a denial of service (memory consumption) via unspecified vectors related to a large keylen value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://sunsolve.sun.com/search/document.do?assetkey=1-66-258828-1 - http://sunsolve.sun.com/search/document.do?assetkey=1-21-140386-03-1 - http://osvdb.org/55234 - http://secunia.com/advisories/35403 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-36314.
CVE ID: CVE-2021-36314 Date Updated: 2024-09-16T17:48:01.370Z Date Published: 2021-11-23T20:00:40.411472Z Description: Dell EMC CloudLink 7.1 and all prior versions contain an Arbitrary File Creation Vulnerability. A remote unauthenticated attacker, may potentially exploit this vulnerability, leading to the execution of arbitrary files on the end user system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000193031/https-dellservices-lightning-force-com-one-one-app No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7002.
CVE ID: CVE-2016-7002 Date Updated: 2024-08-06T01:50:46.643Z Date Published: 2016-10-13T19:00:00 Description: Adobe Reader and Acrobat before 11.0.18, Acrobat and Acrobat Reader DC Classic before 15.006.30243, and Acrobat and Acrobat Reader DC Continuous before 15.020.20039 on Windows and OS X allow attackers to execute arbitrary code or cause a denial of service (memory corruption) via unspecified vectors, a different vulnerability than CVE-2016-6940, CVE-2016-6941, CVE-2016-6942, CVE-2016-6943, CVE-2016-6947, CVE-2016-6948, CVE-2016-6950, CVE-2016-6951, CVE-2016-6954, CVE-2016-6955, CVE-2016-6956, CVE-2016-6959, CVE-2016-6960, CVE-2016-6966, CVE-2016-6970, CVE-2016-6972, CVE-2016-6973, CVE-2016-6974, CVE-2016-6975, CVE-2016-6976, CVE-2016-6977, CVE-2016-6978, CVE-2016-6995, CVE-2016-6996, CVE-2016-6997, CVE-2016-6998, CVE-2016-7000, CVE-2016-7001, CVE-2016-7003, CVE-2016-7004, CVE-2016-7005, CVE-2016-7006, CVE-2016-7007, CVE-2016-7008, CVE-2016-7009, CVE-2016-7010, CVE-2016-7011, CVE-2016-7012, CVE-2016-7013, CVE-2016-7014, CVE-2016-7015, CVE-2016-7016, CVE-2016-7017, CVE-2016-7018, and CVE-2016-7019. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1036986 - https://helpx.adobe.com/security/products/acrobat/apsb16-33.html - http://www.securityfocus.com/bid/93496 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28099.
CVE ID: CVE-2024-28099 Date Updated: 2024-08-08T19:16:52.084Z Date Published: 2024-04-15T10:31:34.198Z Description: VT STUDIO Ver.8.32 and earlier contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with the privileges of the running application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.keyence.com/vt_vulnerability240329_en - https://jvn.jp/en/vu/JVNVU92825069/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16020.
CVE ID: CVE-2019-16020 Date Updated: 2024-09-16T17:58:33.911Z Date Published: 2020-01-26T04:30:57.751382Z Description: Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1442.
CVE ID: CVE-2012-1442 Date Updated: 2024-08-06T19:01:00.427Z Date Published: 2012-03-21T10:00:00 Description: The ELF file parser in Quick Heal (aka Cat QuickHeal) 11.00, McAfee Anti-Virus Scanning Engine 5.400.0.1158, McAfee Gateway (formerly Webwasher) 2010.1C, eSafe 7.0.17.0, Kaspersky Anti-Virus 7.0.0.125, F-Secure Anti-Virus 9.0.16160.0, Sophos Anti-Virus 4.61.0, Antiy Labs AVL SDK 2.0.3.7, Rising Antivirus 22.83.00.03, Fortinet Antivirus 4.2.254.0, and Panda Antivirus 10.0.2.7 allows remote attackers to bypass malware detection via an ELF file with a modified class field. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different ELF parser implementations. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/522005 - http://osvdb.org/80427 - http://www.securityfocus.com/bid/52598 - http://www.ieee-security.org/TC/SP2012/program.html - http://osvdb.org/80428 - http://osvdb.org/80426 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.