instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-20802.
CVE ID: CVE-2021-20802 Date Updated: 2024-08-03T17:53:22.625Z Date Published: 2021-10-13T08:30:58 Description: HTTP header injection vulnerability in Cybozu Remote Service 3.1.8 to 3.1.9 allows a remote attacker to alter the information stored in the product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jvn.jp/en/jp/JVN52694228/index.html - https://kb.cybozu.support/article/37428 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18868.
CVE ID: CVE-2018-18868 Date Updated: 2024-08-05T11:23:08.842Z Date Published: 2018-10-31T06:00:00 Description: No-CMS 1.1.3 is prone to Persistent XSS via a contact_us name parameter, as demonstrated by the VG48Z5PqVWname parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/s-kustm/Subodh/blob/master/CVE-2018-18868.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21026.
CVE ID: CVE-2024-21026 Date Updated: 2024-08-01T22:13:41.892Z Date Published: 2024-04-16T21:26:06.948Z Description: Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9948.
CVE ID: CVE-2014-9948 Date Updated: 2024-08-06T14:02:37.392Z Date Published: 2017-06-06T14:00:00 Description: In TrustZone in all Android releases from CAF using the Linux kernel, an Improper Validation of Array Index vulnerability could potentially exist. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-05-01 - http://www.securityfocus.com/bid/98249 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8547.
CVE ID: CVE-2020-8547 Date Updated: 2024-08-04T10:03:46.119Z Date Published: 2020-02-03T15:52:13 Description: phpList 3.5.0 allows type juggling for admin login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/47989 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1450.
CVE ID: CVE-2015-1450 Date Updated: 2024-09-17T02:10:44.928Z Date Published: 2015-02-02T15:00:00Z Description: SQL injection vulnerability in Restaurant Biller allows remote attackers to execute arbitrary SQL commands via the cid parameter in a category action to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/130122/Restaurantbiller-SQL-Injection-Shell-Upload.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9058.
CVE ID: CVE-2020-9058 Date Updated: 2024-09-16T23:41:50.495Z Date Published: 2022-01-07T04:30:25.088470Z Description: Z-Wave devices based on Silicon Labs 500 series chipsets using CRC-16 encapsulation, including but likely not limited to the Linear LB60Z-1 version 3.5, Dome DM501 version 4.26, and Jasco ZW4201 version 4.05, do not implement encryption or replay protection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.cert.org/vuls/id/142629 - https://ieeexplore.ieee.org/document/9663293 - https://github.com/CNK2100/VFuzz-public - https://doi.org/10.1109/ACCESS.2021.3138768 - https://www.kb.cert.org/vuls/id/142629 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-0705.
CVE ID: CVE-2012-0705 Date Updated: 2024-08-06T18:30:54.179Z Date Published: 2013-01-31T11:00:00 Description: InfoSphere Import Export Manager in InfoSphere Information Server MetaBrokers & Bridges (MBB) in IBM InfoSphere Information Server 8.1, 8.5 before FP3, 8.7, and 9.1 does not validate unspecified input data, which allows remote authenticated users to execute arbitrary commands via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/73292 - http://www-01.ibm.com/support/docview.wss?uid=swg21623501 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2156.
CVE ID: CVE-2014-2156 Date Updated: 2024-08-06T10:06:00.366Z Date Published: 2014-05-02T10:00:00 Description: Cisco TelePresence System MXP Series Software before F9.3.1 allows remote attackers to cause a denial of service (device reload) via crafted SIP packets, aka Bug ID CSCty45739. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140430-mxp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0784.
CVE ID: CVE-2013-0784 Date Updated: 2024-08-06T14:41:47.132Z Date Published: 2013-02-19T23:00:00 Description: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 19.0, Thunderbird before 17.0.3, and SeaMonkey before 2.16 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.mozilla.org/show_bug.cgi?id=790373 - https://bugzilla.mozilla.org/show_bug.cgi?id=801114 - https://bugzilla.mozilla.org/show_bug.cgi?id=766452 - https://bugzilla.mozilla.org/show_bug.cgi?id=830943 - https://bugzilla.mozilla.org/show_bug.cgi?id=799803 - https://bugzilla.mozilla.org/show_bug.cgi?id=809295 - http://www.ubuntu.com/usn/USN-1729-1 - http://www.mozilla.org/security/announce/2013/mfsa2013-21.html - http://www.ubuntu.com/usn/USN-1729-2 - http://www.ubuntu.com/usn/USN-1748-1 - https://bugzilla.mozilla.org/show_bug.cgi?id=810169 - https://bugzilla.mozilla.org/show_bug.cgi?id=819635 - http://lists.opensuse.org/opensuse-updates/2013-02/msg00062.html - https://bugzilla.mozilla.org/show_bug.cgi?id=827687 - https://bugzilla.mozilla.org/show_bug.cgi?id=805294 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17119 - https://bugzilla.mozilla.org/show_bug.cgi?id=799907 - http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00017.html - https://bugzilla.mozilla.org/show_bug.cgi?id=797977 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23517.
CVE ID: CVE-2022-23517 Date Updated: 2024-08-03T03:43:46.454Z Date Published: 2022-12-14T16:10:22.304Z Description: rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. Certain configurations of rails-html-sanitizer < 1.4.4 use an inefficient regular expression that is susceptible to excessive backtracking when attempting to sanitize certain SVG attributes. This may lead to a denial of service through CPU resource consumption. This issue has been patched in version 1.4.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-5x79-w82f-gw8w - https://github.com/rails/rails-html-sanitizer/commit/56c61c0cebd1e493e8ad7bca2a0191609a4a6979 - https://hackerone.com/reports/1684163 - https://lists.debian.org/debian-lts-announce/2023/09/msg00012.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22002.
CVE ID: CVE-2022-22002 Date Updated: 2024-08-03T03:00:54.906Z Date Published: 2022-02-09T16:36:54 Description: Windows User Account Profile Picture Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22002 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43579.
CVE ID: CVE-2021-43579 Date Updated: 2024-08-04T04:03:08.591Z Date Published: 2021-11-12T17:49:37 Description: A stack-based buffer overflow in image_load_bmp() in HTMLDOC <= 1.9.13 results in remote code execution if the victim converts an HTML document linking to a crafted BMP file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/michaelrsweet/htmldoc/issues/453 - https://github.com/michaelrsweet/htmldoc/commit/27d08989a5a567155d506ac870ae7d8cc88fa58b - https://github.com/michaelrsweet/htmldoc/compare/v1.9.12...v1.9.13 - https://github.com/michaelrsweet/htmldoc/issues/456 - https://lists.debian.org/debian-lts-announce/2022/02/msg00022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-7200.
CVE ID: CVE-2023-7200 Date Updated: 2024-08-02T08:57:34.089Z Date Published: 2024-01-29T14:44:26.854Z Description: The EventON WordPress plugin before 4.4.1 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/586cf0a5-515c-43ea-8c03-f2f47ed13c2c/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-3061.
CVE ID: CVE-2014-3061 Date Updated: 2024-08-06T10:28:46.296Z Date Published: 2014-08-26T14:00:00 Description: Cross-site request forgery (CSRF) vulnerability in IBM Emptoris Spend Analysis 9.5.x before 9.5.0.4, 10.0.1.x before 10.0.1.3, and 10.0.2.x before 10.0.2.4 allows remote attackers to hijack the authentication of arbitrary users for requests that insert XSS sequences. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/60480 - http://www-01.ibm.com/support/docview.wss?uid=swg21681277 - https://exchange.xforce.ibmcloud.com/vulnerabilities/93537 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28011.
CVE ID: CVE-2024-28011 Date Updated: 2024-08-02T00:48:47.698Z Date Published: 2024-03-28T00:54:41.107Z Description: Hidden Functionality vulnerability in NEC Corporation Aterm WG1800HP4, WG1200HS3, WG1900HP2, WG1200HP3, WG1800HP3, WG1200HS2, WG1900HP, WG1200HP2, W1200EX(-MS), WG1200HS, WG1200HP, WF300HP2, W300P, WF800HP, WR8165N, WG2200HP, WF1200HP2, WG1800HP2, WF1200HP, WG600HP, WG300HP, WF300HP, WG1800HP, WG1400HP, WR8175N, WR9300N, WR8750N, WR8160N, WR9500N, WR8600N, WR8370N, WR8170N, WR8700N, WR8300N, WR8150N, WR4100N, WR4500N, WR8100N, WR8500N, CR2500P, WR8400N, WR8200N, WR1200H, WR7870S, WR6670S, WR7850S, WR6650S, WR6600H, WR7800H, WM3400RN, WM3450RN, WM3500R, WM3600R, WM3800R, WR8166N, MR01LN MR02LN, WG1810HP(JE) and WG1810HP(MF) all versions allows a attacker to execute an arbitrary OS command with the root privilege via the internet No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://https://jpn.nec.com/security-info/secinfo/nv24-001_en.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1519.
CVE ID: CVE-2022-1519 Date Updated: 2024-09-16T18:12:48.155Z Date Published: 2022-06-24T15:00:13.721889Z Description: LRM does not restrict the types of files that can be uploaded to the affected product. A malicious actor can upload any file type, including executable code that allows for a remote code exploit. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-153-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28313.
CVE ID: CVE-2023-28313 Date Updated: 2024-08-02T12:38:25.316Z Date Published: 2023-04-11T19:13:22.961Z Description: Microsoft Dynamics 365 Customer Voice Cross-Site Scripting Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28313 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15575.
CVE ID: CVE-2017-15575 Date Updated: 2024-08-05T19:57:27.024Z Date Published: 2017-10-18T02:00:00 Description: In Redmine before 3.2.6 and 3.3.x before 3.3.3, Redmine.pm lacks a check for whether the Repository module is enabled in a project's settings, which might allow remote attackers to obtain sensitive differences information or possibly have unspecified other impact. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.redmine.org/projects/redmine/wiki/Security_Advisories - https://www.redmine.org/issues/24307 - https://www.debian.org/security/2018/dsa-4191 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32692.
CVE ID: CVE-2021-32692 Date Updated: 2024-08-03T23:25:31.116Z Date Published: 2022-12-23T00:00:00 Description: Activity Watch is a free and open-source automated time tracker. Versions prior to 0.11.0 allow an attacker to execute arbitrary commands on any macOS machine with ActivityWatch running. The attacker can exploit this vulnerability by having the user visiting a website with the page title set to a malicious string. An attacker could use another application to accomplish the same, but the web browser is the most likely attack vector. This issue is patched in version 0.11.0. As a workaround, users can run the latest version of aw-watcher-window from source, or manually patch the `printAppTitle.scpt` file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ActivityWatch/activitywatch/security/advisories/GHSA-3x6w-q32m-jqf3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4136.
CVE ID: CVE-2021-4136 Date Updated: 2024-08-03T17:16:04.242Z Date Published: 2021-12-19T17:00:10 Description: vim is vulnerable to Heap-based Buffer Overflow No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938 - https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2EY2VFBU3YGGWI5BW4XKT3F37MYGEQUD/ - http://www.openwall.com/lists/oss-security/2022/01/15/1 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3FH2J57GDA2WMBS6J56F6QQRA6BXQQFZ/ - https://support.apple.com/kb/HT213183 - http://seclists.org/fulldisclosure/2022/Mar/29 - https://support.apple.com/kb/HT213256 - http://seclists.org/fulldisclosure/2022/May/35 - https://support.apple.com/kb/HT213343 - http://seclists.org/fulldisclosure/2022/Jul/14 - https://security.gentoo.org/glsa/202208-32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25631.
CVE ID: CVE-2022-25631 Date Updated: 2024-08-03T04:42:50.319Z Date Published: 2023-01-20T00:00:00 Description: Symantec Endpoint Protection, prior to 14.3 RU6 (14.3.9210.6000), may be susceptible to a Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.broadcom.com/external/content/SecurityAdvisories/0/21165 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0751.
CVE ID: CVE-2011-0751 Date Updated: 2024-08-06T22:05:53.747Z Date Published: 2011-03-16T22:00:00 Description: Directory traversal vulnerability in nhttpd (aka Nostromo webserver) before 1.9.4 allows remote attackers to execute arbitrary programs or read arbitrary files via a ..%2f (encoded dot dot slash) in a URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.redteam-pentesting.de/advisories/rt-sa-2011-001 - https://exchange.xforce.ibmcloud.com/vulnerabilities/66103 - http://www.nazgul.ch/dev_nostromo.html - http://www.securityfocus.com/bid/46880 - http://www.securityfocus.com/archive/1/517026/100/0/threaded - http://www.vupen.com/english/advisories/2011/0674 - http://osvdb.org/71235 - http://secunia.com/advisories/43775 - http://securityreason.com/securityalert/8140 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6836.
CVE ID: CVE-2020-6836 Date Updated: 2024-08-04T09:11:05.148Z Date Published: 2020-01-11T00:42:28 Description: grammar-parser.jison in the hot-formula-parser package before 3.0.1 for Node.js is vulnerable to arbitrary code injection. The package fails to sanitize values passed to the parse function and concatenates them in an eval call. If a value of the formula is taken from user-controlled input, it may allow attackers to run arbitrary commands on the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.npmjs.com/advisories/1439 - https://github.com/handsontable/formula-parser/commit/396b089738d4bf30eb570a4fe6a188affa95cd5e - https://blog.truesec.com/2020/01/17/reverse-shell-through-a-node-js-math-parser/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43922.
CVE ID: CVE-2022-43922 Date Updated: 2024-08-03T13:40:06.572Z Date Published: 2023-02-01T17:32:29.171Z Description: IBM App Connect Enterprise Certified Container 4.1, 4.2, 5.0, 5.1, 5.2, 6.0, 6.1, and 6.2 could disclose sensitive information to an attacker due to a weak hash of an API Key in the configuration. IBM X-Force ID: 241583. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6857807 - https://exchange.xforce.ibmcloud.com/vulnerabilities/241583 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6188.
CVE ID: CVE-2008-6188 Date Updated: 2024-08-07T11:20:25.338Z Date Published: 2009-02-19T18:00:00 Description: SQL injection vulnerability in people/editprofile.php in Gforge 4.6 rc1 and earlier allows remote attackers to execute arbitrary SQL commands via the skill_edit[] parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://gforge.org/tracker/index.php?func=detail&aid=5554&group_id=1&atid=105 - http://secunia.com/advisories/32217 - https://exchange.xforce.ibmcloud.com/vulnerabilities/48851 - http://www.securityfocus.com/bid/31674 - https://www.exploit-db.com/exploits/6708 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2356.
CVE ID: CVE-2011-2356 Date Updated: 2024-08-06T23:00:33.582Z Date Published: 2011-10-12T18:00:00 Description: WebKit, as used in Apple iTunes before 10.5, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other CVEs listed in APPLE-SA-2011-10-11-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT4981 - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00001.html - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00000.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/70500 - http://lists.apple.com/archives/Security-announce/2011//Oct/msg00004.html - http://www.securityfocus.com/bid/50066 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17340 - http://support.apple.com/kb/HT4999 - http://support.apple.com/kb/HT5000 - http://osvdb.org/76341 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7757.
CVE ID: CVE-2017-7757 Date Updated: 2024-08-05T16:12:28.358Z Date Published: 2018-06-11T21:00:00 Description: A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/99057 - https://www.mozilla.org/security/advisories/mfsa2017-15/ - https://www.debian.org/security/2017/dsa-3918 - http://www.securitytracker.com/id/1038689 - https://www.debian.org/security/2017/dsa-3881 - https://access.redhat.com/errata/RHSA-2017:1440 - https://access.redhat.com/errata/RHSA-2017:1561 - https://www.mozilla.org/security/advisories/mfsa2017-17/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1356824 - https://www.mozilla.org/security/advisories/mfsa2017-16/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6229.
CVE ID: CVE-2023-6229 Date Updated: 2024-08-02T08:21:17.992Z Date Published: 2024-02-06T00:20:48.446Z Description: Buffer overflow in CPCA PDL Resource Download process of Office Multifunction Printers and Laser Printers(*) which may allow an attacker on the network segment to trigger the affected product being unresponsive or to execute arbitrary code.*: Satera LBP670C Series/Satera MF750C Series firmware v03.07 and earlier sold in Japan. Color imageCLASS LBP674C/Color imageCLASS X LBP1333C/Color imageCLASS MF750C Series/Color imageCLASS X MF1333C Series firmware v03.07 and earlier sold in US. i-SENSYS LBP673Cdw/C1333P/i-SENSYS MF750C Series/C1333i Series firmware v03.07 and earlier sold in Europe. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.canon/advisory-information/cp2024-001/ - https://canon.jp/support/support-info/240205vulnerability-response - https://www.usa.canon.com/support/canon-product-advisories/Service-Notice-Regarding-Vulnerability-Measure-Against-Buffer-Overflow-for-Laser-Printers-and-Small-Office-Multifunctional-Printers - https://www.canon-europe.com/support/product-security-latest-news/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6363.
CVE ID: CVE-2014-6363 Date Updated: 2024-08-06T12:10:13.301Z Date Published: 2014-12-11T00:00:00 Description: vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080 - https://www.exploit-db.com/exploits/40721/ - https://www.verisign.com/en_US/security-services/security-intelligence/vulnerability-reports/articles/index.xhtml?id=1075 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-084 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18709.
CVE ID: CVE-2019-18709 Date Updated: 2019-11-04T20:17:38 Date Published: 2019-11-04T20:17:38 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20181.
CVE ID: CVE-2023-20181 Date Updated: 2024-08-02T09:05:36.968Z Date Published: 2023-08-03T21:22:47.480Z Description: A vulnerability in the web-based management interface of Cisco Small Business SPA500 Series IP Phones could allow an unauthenticated, remote attacker to conduct XSS attacks. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-spa-web-multi-7kvPmu2F No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3617.
CVE ID: CVE-2012-3617 Date Updated: 2024-08-06T20:13:51.325Z Date Published: 2012-09-13T10:00:00 Description: WebKit, as used in Apple iTunes before 10.7, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-09-12-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce/2012/Sep/msg00005.html - http://support.apple.com/kb/HT5485 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78547 - http://support.apple.com/kb/HT5502 - http://www.securityfocus.com/bid/55534 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17184 - http://osvdb.org/85410 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-18581.
CVE ID: CVE-2018-18581 Date Updated: 2024-08-05T11:15:59.923Z Date Published: 2018-10-22T22:00:00 Description: An issue has been found in LuPng through 2017-03-10. It is a heap-based buffer over-read in internalPrintf in miniz/lupng.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jansol/LuPng/issues/7 - https://github.com/grandnew/software-vulnerabilities/tree/master/LuPng#heap-buffer-overflow-in-function-internalprintf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2491.
CVE ID: CVE-2017-2491 Date Updated: 2024-08-05T13:55:06.115Z Date Published: 2017-06-27T20:00:00 Description: Use after free vulnerability in the String.replace method JavaScriptCore in Apple Safari in iOS before 10.3 allows remote attackers to execute arbitrary code via a crafted web page, or a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT207617 - https://www.exploit-db.com/exploits/41964/ - http://www.zerodayinitiative.com/advisories/ZDI-17-321 - http://www.securityfocus.com/bid/98316 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11548.
CVE ID: CVE-2017-11548 Date Updated: 2024-08-05T18:12:40.315Z Date Published: 2017-07-31T13:00:00 Description: The _tokenize_matrix function in audio_out.c in Xiph.Org libao 1.2.0 allows remote attackers to cause a denial of service (memory corruption) via a crafted MP3 file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2017/Jul/84 - https://www.exploit-db.com/exploits/42400/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6795.
CVE ID: CVE-2016-6795 Date Updated: 2024-09-17T02:33:08.731Z Date Published: 2017-09-20T17:00:00Z Description: In the Convention plugin in Apache Struts 2.3.x before 2.3.31, and 2.5.x before 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93773 - https://struts.apache.org/docs/s2-042.html - https://security.netapp.com/advisory/ntap-20180629-0003/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41038.
CVE ID: CVE-2023-41038 Date Updated: 2024-08-13T16:44:27.739Z Date Published: 2024-03-20T14:22:50.484Z Description: Firebird is a relational database. Versions 4.0.0 through 4.0.3 and version 5.0 beta1 are vulnerable to a server crash when a user uses a specific form of SET BIND statement. Any non-privileged user with minimum access to a server may type a statement with a long `CHAR` length, which causes the server to crash due to stack corruption. Versions 4.0.4.2981 and 5.0.0.117 contain fixes for this issue. No known workarounds are available. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-6fv8-8rwr-9692 - https://firebirdsql.org/en/snapshot-builds No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23401.
CVE ID: CVE-2022-23401 Date Updated: 2024-08-03T03:43:45.875Z Date Published: 2022-03-11T09:10:51 Description: The following Yokogawa Electric products contain insecure DLL loading issues. CENTUM CS 3000 versions from R3.08.10 to R3.09.00, CENTUM VP versions from R4.01.00 to R4.03.00, from R5.01.00 to R5.04.20, and from R6.01.00 to R6.08.00, Exaopc versions from R3.72.00 to R3.79.00. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://web-material3.yokogawa.com/1/32094/files/YSAR-22-0001-E.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2206.
CVE ID: CVE-2009-2206 Date Updated: 2024-08-07T05:44:54.962Z Date Published: 2009-09-10T21:00:00 Description: Multiple heap-based buffer overflows in the AudioCodecs library in the CoreAudio component in Apple iPhone OS before 3.1, and iPhone OS before 3.1.1 for iPod touch, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted (1) AAC or (2) MP3 file, as demonstrated by a ringtone with malformed entries in the sample size table. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1022869 - http://www.securityfocus.com/archive/1/506464/100/0/threaded - http://www.trapkit.de/advisories/TKADV2009-007.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/53180 - http://www.securityfocus.com/bid/36338 - http://lists.apple.com/archives/security-announce/2009/Sep/msg00001.html - http://secunia.com/advisories/36677 - http://support.apple.com/kb/HT3860 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17206.
CVE ID: CVE-2019-17206 Date Updated: 2024-08-05T01:33:17.281Z Date Published: 2019-10-05T22:01:24 Description: Uncontrolled deserialization of a pickled object in models.py in Frost Ming rediswrapper (aka Redis Wrapper) before 0.3.0 allows attackers to execute arbitrary scripts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/frostming/rediswrapper/pull/1 - https://github.com/frostming/rediswrapper/compare/v0.2.1...v0.3.0 - https://github.com/frostming/rediswrapper/releases/tag/v0.3.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2808.
CVE ID: CVE-2011-2808 Date Updated: 2024-08-06T23:15:31.048Z Date Published: 2019-11-06T20:12:34 Description: A stale layout root is set as an input element in WebKit in Google Chrome before Blink M13 when a child of a keygen with autofocus is accessed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.chromium.org/p/chromium/issues/detail?id=83672 - http://trac.webkit.org/changeset/86976 - http://trac.webkit.org/browser/trunk/Source/WebCore/rendering/RenderObject.h?rev=86705#L1044 - http://code.google.com/p/chromium/issues/detail?id=82063 - https://bugs.webkit.org/show_bug.cgi?id=57091 - http://trac.webkit.org/changeset/90568 - http://trac.webkit.org/changeset/90848 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42404.
CVE ID: CVE-2022-42404 Date Updated: 2024-08-03T13:10:40.286Z Date Published: 2023-01-26T00:00:00 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of EMF files. Crafted data in an EMF file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18273. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1330/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20791.
CVE ID: CVE-2022-20791 Date Updated: 2024-09-16T23:31:56.838Z Date Published: 2022-07-06T20:30:23.819159Z Description: A vulnerability in the database user privileges of Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), and Cisco Unified Communications Manager IM &amp; Presence Service (Unified CM IM&amp;P) could allow an authenticated, remote attacker to read arbitrary files on the underlying operating system of an affected device. This vulnerability is due to insufficient file permission restrictions. An attacker could exploit this vulnerability by sending a crafted command from the API to the application. A successful exploit could allow the attacker to read arbitrary files on the underlying operating system of the affected device. The attacker would need valid user credentials to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-imp-afr-YBFLNyzd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18664.
CVE ID: CVE-2019-18664 Date Updated: 2024-08-05T01:54:14.559Z Date Published: 2019-11-02T14:28:21 Description: The Log module in SECUDOS DOMOS before 5.6 allows XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.secudos.de/news-und-events/aktuelle-news/domos-release-5-6 - https://atomic111.github.io/article/secudos-domos-reflected-xss No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40885.
CVE ID: CVE-2022-40885 Date Updated: 2024-08-03T12:28:42.953Z Date Published: 2022-10-19T00:00:00 Description: Bento4 v1.6.0-639 has a memory allocation issue that can cause denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/761 - https://github.com/yangfar/CVE/blob/main/CVE-2022-40885.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-34470.
CVE ID: CVE-2022-34470 Date Updated: 2024-08-03T09:15:15.186Z Date Published: 2022-12-22T00:00:00 Description: Session history navigations may have led to a use-after-free and potentially exploitable crash. This vulnerability affects Firefox < 102, Firefox ESR < 91.11, Thunderbird < 102, and Thunderbird < 91.11. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2022-24/ - https://www.mozilla.org/security/advisories/mfsa2022-26/ - https://www.mozilla.org/security/advisories/mfsa2022-25/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1765951 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-36919.
CVE ID: CVE-2023-36919 Date Updated: 2024-09-28T22:01:23.697Z Date Published: 2023-07-11T02:54:02.039Z Description: In SAP Enable Now - versions WPB_MANAGER 1.0, WPB_MANAGER_CE 10, WPB_MANAGER_HANA 10, ENABLE_NOW_CONSUMP_DEL 1704, the Referrer-Policy response header is not implemented, allowing an unauthenticated attacker to obtain referrer details, resulting in information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/3326769 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6494.
CVE ID: CVE-2012-6494 Date Updated: 2024-08-06T21:28:39.951Z Date Published: 2020-01-25T18:41:34 Description: Rapid7 Nexpose before 5.5.4 contains a session hijacking vulnerability which allows remote attackers to capture a user's session and gain unauthorized access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/57150 - https://exchange.xforce.ibmcloud.com/vulnerabilities/80982 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7777.
CVE ID: CVE-2016-7777 Date Updated: 2024-08-06T02:04:55.996Z Date Published: 2016-10-07T14:00:00 Description: Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.citrix.com/article/CTX217363 - http://xenbits.xen.org/xsa/advisory-190.html - http://www.securityfocus.com/bid/93344 - https://security.gentoo.org/glsa/201611-09 - http://www.securitytracker.com/id/1036942 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0700.
CVE ID: CVE-2008-0700 Date Updated: 2024-09-17T04:25:37.744Z Date Published: 2008-02-12T00:00:00Z Description: Cross-site scripting (XSS) vulnerability in search.php in Crux Software CruxCMS 3.0 allows remote attackers to inject arbitrary web script or HTML via the search parameter. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27588 - http://downloads.securityfocus.com/vulnerabilities/exploits/27588.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19111.
CVE ID: CVE-2018-19111 Date Updated: 2024-08-05T11:30:04.023Z Date Published: 2018-11-08T08:00:00 Description: The Google Cardboard application 1.8 for Android and 1.2 for iOS sends potentially private cleartext information to the Unity 3D Stats web site, as demonstrated by device make, model, and OS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.info-sec.ca/advisories/Google-Cardboard.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33723.
CVE ID: CVE-2021-33723 Date Updated: 2024-08-03T23:58:22.810Z Date Published: 2021-10-12T09:49:24 Description: A vulnerability has been identified in SINEC NMS (All versions < V1.0 SP2 Update 1). An authenticated attacker could change the user profile of any user without proper authorization. With this, the attacker could change the password of any user in the affected system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-163251.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39505.
CVE ID: CVE-2023-39505 Date Updated: 2024-08-02T18:10:21.130Z Date Published: 2024-05-03T02:11:04.524Z Description: PDF-XChange Editor Net.HTTP.requests Exposed Dangerous Function Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the Net.HTTP.requests method. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to disclose information in the context of the current user. Was ZDI-CAN-20211. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1143/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-21130.
CVE ID: CVE-2020-21130 Date Updated: 2024-08-04T14:22:25.462Z Date Published: 2021-06-21T15:16:52 Description: Cross Site Scripting (XSS) vulnerability in HisiPHP 2.0.8 via the group name in addgroup.html. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hisiphp/hisiphp/issues/7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-8470.
CVE ID: CVE-2024-8470 Date Updated: 2024-09-05T13:12:37.209Z Date Published: 2024-09-05T12:56:02.047Z Description: SQL injection vulnerability, by which an attacker could send a specially designed query through CATEGORY parameter in /jobportal/admin/vacancy/controller.php, and retrieve all the information stored in it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-job-portal No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8666.
CVE ID: CVE-2015-8666 Date Updated: 2024-08-06T08:29:20.198Z Date Published: 2017-04-11T19:00:00 Description: Heap-based buffer overflow in QEMU, when built with the Q35-chipset-based PC system emulator. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2015/12/24/1 - https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html - https://bugzilla.redhat.com/show_bug.cgi?id=1283722 - http://git.qemu-project.org/?p=qemu.git%3Ba=commit%3Bh=d9a3b33d2c9f996537b7f1d0246dee2d0120cefb - http://www.securityfocus.com/bid/79670 - https://security.gentoo.org/glsa/201602-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43519.
CVE ID: CVE-2022-43519 Date Updated: 2024-08-03T13:32:59.651Z Date Published: 2023-01-03T18:37:10.315Z Description: Multiple vulnerabilities in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the Aruba EdgeConnect Enterprise Orchestrator instance. An attacker could exploit these vulnerabilities to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the Aruba EdgeConnect Enterprise Orchestrator host in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19064.
CVE ID: CVE-2018-19064 Date Updated: 2024-08-05T11:30:04.171Z Date Published: 2018-11-07T18:00:00 Description: An issue was discovered on Foscam C2 devices with System Firmware 1.11.1.8 and Application Firmware 2.72.1.32, and Opticam i5 devices with System Firmware 1.5.2.11 and Application Firmware 2.21.1.128. The ftpuser1 account has a blank password, which cannot be changed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sintonen.fi/advisories/foscam-ip-camera-multiple-vulnerabilities.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47062.
CVE ID: CVE-2021-47062 Date Updated: 2024-08-04T05:24:39.873Z Date Published: 2024-02-29T22:37:36.468Z Description: In the Linux kernel, the following vulnerability has been resolved: KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs Use the kvm_for_each_vcpu() helper to iterate over vCPUs when encrypting VMSAs for SEV, which effectively switches to use online_vcpus instead of created_vcpus. This fixes a possible null-pointer dereference as created_vcpus does not guarantee a vCPU exists, since it is updated at the very beginning of KVM_CREATE_VCPU. created_vcpus exists to allow the bulk of vCPU creation to run in parallel, while still correctly restricting the max number of max vCPUs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/bd0cced2ae93195668f983d443f7f17e8efd24d2 - https://git.kernel.org/stable/c/ba7bf5d6336aa9c0d977b161bfa420c56d46ee40 - https://git.kernel.org/stable/c/c36b16d29f3af5f32fc1b2a3401bf48f71cabee1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14105.
CVE ID: CVE-2019-14105 Date Updated: 2024-08-05T00:12:42.599Z Date Published: 2020-04-16T10:46:14 Description: Kernel was reading the CSL defined reserved field as uint16 instead of uint32 which could lead to memory overflow in Snapdragon Industrial IOT, Snapdragon Mobile in SDA845, SDM845, SM8150 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/april-2020-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2601.
CVE ID: CVE-2014-2601 Date Updated: 2024-08-06T10:21:35.190Z Date Published: 2014-04-24T23:00:00 Description: The server in HP Integrated Lights-Out 2 (aka iLO 2) 2.23 and earlier allows remote attackers to cause a denial of service via crafted HTTPS traffic, as demonstrated by traffic from a CVE-2014-0160 vulnerability-assessment tool. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://isc.sans.edu/forums/diary/Be+Careful+what+you+Scan+for/18017/ - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04244787 - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04244787 - http://www.securitytracker.com/id/1030148 - http://h20565.www2.hp.com/portal/site/hpsc/template.PAGE/public/kb/docDisplay/?docId=emr_na-c04249852-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1529.
CVE ID: CVE-2020-1529 Date Updated: 2024-08-04T06:39:10.526Z Date Published: 2020-08-17T19:13:28 Description: An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1529 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28646.
CVE ID: CVE-2020-28646 Date Updated: 2024-08-04T16:40:59.935Z Date Published: 2021-02-26T14:51:57 Description: ownCloud owncloud/client before 2.7 allows DLL Injection. The desktop client loaded development plugins from certain directories when they were present. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://owncloud.com/security-advisories/feed/ - https://owncloud.com/security-advisories/cve-2020-28646/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35949.
CVE ID: CVE-2024-35949 Date Updated: 2024-08-02T03:21:48.957Z Date Published: 2024-05-20T09:17:38.893Z Description: In the Linux kernel, the following vulnerability has been resolved: btrfs: make sure that WRITTEN is set on all metadata blocks We previously would call btrfs_check_leaf() if we had the check integrity code enabled, which meant that we could only run the extended leaf checks if we had WRITTEN set on the header flags. This leaves a gap in our checking, because we could end up with corruption on disk where WRITTEN isn't set on the leaf, and then the extended leaf checks don't get run which we rely on to validate all of the item pointers to make sure we don't access memory outside of the extent buffer. However, since 732fab95abe2 ("btrfs: check-integrity: remove CONFIG_BTRFS_FS_CHECK_INTEGRITY option") we no longer call btrfs_check_leaf() from btrfs_mark_buffer_dirty(), which means we only ever call it on blocks that are being written out, and thus have WRITTEN set, or that are being read in, which should have WRITTEN set. Add checks to make sure we have WRITTEN set appropriately, and then make sure __btrfs_check_leaf() always does the item checking. This will protect us from file systems that have been corrupted and no longer have WRITTEN set on some of the blocks. This was hit on a crafted image tweaking the WRITTEN bit and reported by KASAN as out-of-bound access in the eb accessors. The example is a dir item at the end of an eb. [2.042] BTRFS warning (device loop1): bad eb member start: ptr 0x3fff start 30572544 member offset 16410 size 2 [2.040] general protection fault, probably for non-canonical address 0xe0009d1000000003: 0000 [#1] PREEMPT SMP KASAN NOPTI [2.537] KASAN: maybe wild-memory-access in range [0x0005088000000018-0x000508800000001f] [2.729] CPU: 0 PID: 2587 Comm: mount Not tainted 6.8.2 #1 [2.729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014 [2.621] RIP: 0010:btrfs_get_16+0x34b/0x6d0 [2.621] RSP: 0018:ffff88810871fab8 EFLAGS: 00000206 [2.621] RAX: 0000a11000000003 RBX: ffff888104ff8720 RCX: ffff88811b2288c0 [2.621] RDX: dffffc0000000000 RSI: ffffffff81dd8aca RDI: ffff88810871f748 [2.621] RBP: 000000000000401a R08: 0000000000000001 R09: ffffed10210e3ee9 [2.621] R10: ffff88810871f74f R11: 205d323430333737 R12: 000000000000001a [2.621] R13: 000508800000001a R14: 1ffff110210e3f5d R15: ffffffff850011e8 [2.621] FS: 00007f56ea275840(0000) GS:ffff88811b200000(0000) knlGS:0000000000000000 [2.621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [2.621] CR2: 00007febd13b75c0 CR3: 000000010bb50000 CR4: 00000000000006f0 [2.621] Call Trace: [2.621] <TASK> [2.621] ? show_regs+0x74/0x80 [2.621] ? die_addr+0x46/0xc0 [2.621] ? exc_general_protection+0x161/0x2a0 [2.621] ? asm_exc_general_protection+0x26/0x30 [2.621] ? btrfs_get_16+0x33a/0x6d0 [2.621] ? btrfs_get_16+0x34b/0x6d0 [2.621] ? btrfs_get_16+0x33a/0x6d0 [2.621] ? __pfx_btrfs_get_16+0x10/0x10 [2.621] ? __pfx_mutex_unlock+0x10/0x10 [2.621] btrfs_match_dir_item_name+0x101/0x1a0 [2.621] btrfs_lookup_dir_item+0x1f3/0x280 [2.621] ? __pfx_btrfs_lookup_dir_item+0x10/0x10 [2.621] btrfs_get_tree+0xd25/0x1910 [ copy more details from report ] No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/ef3ba8ce8cf7075b716aa4afcefc3034215878ee - https://git.kernel.org/stable/c/e03418abde871314e1a3a550f4c8afb7b89cb273 - https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OTB4HWU2PTVW5NEYHHLOCXDKG3PYA534/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0334.
CVE ID: CVE-2021-0334 Date Updated: 2024-08-03T15:39:59.570Z Date Published: 2021-02-10T16:49:21 Description: In onTargetSelected of ResolverActivity.java, there is a possible settings bypass allowing an app to become the default handler for arbitrary domains. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-8.1 Android-9 Android-10 Android-11Android ID: A-163358811 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2021-02-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18785.
CVE ID: CVE-2017-18785 Date Updated: 2024-08-05T21:37:44.208Z Date Published: 2020-04-22T14:23:04 Description: Certain NETGEAR devices are affected by XSS. This affects D3600 before 1.0.0.67, D6000 before 1.0.0.67, D6100 before 1.0.0.56, D6200 before 1.1.00.24, D6220 before 1.0.0.32, D6400 before 1.0.0.66, D7000 before 1.0.1.52, D7000v2 before 1.0.0.44, D7800 before 1.0.1.30, D8500 before 1.0.3.35, DGN2200v4 before 1.0.0.96, DGN2200Bv4 before 1.0.0.96, EX2700 before 1.0.1.28, EX6100v2 before 1.0.1.54, EX6150v2 before 1.0.1.54, EX6200v2 before 1.0.1.52, EX6400 before 1.0.1.72, EX7300 before 1.0.1.72, EX8000 before 1.0.0.102, JNR1010v2 before 1.1.0.44, JWNR2010v5 before 1.1.0.44, PR2000 before 1.0.0.20, R6020 before 1.0.0.26, R6080 before 1.0.0.26, R6100 before 1.0.1.20, R6250 before 1.0.4.16, R6300v2 before 1.0.4.18, R6400 before 1.0.1.32, R6400v2 before 1.0.2.46, R6700 before 1.0.1.36, R6800 before 1.2.0.12, R6900v2 before 1.2.0.12, R6700v2 before 1.2.0.12, R6900 before 1.0.1.34, R6900P before 1.3.0.8, R7000 before 1.0.9.18, R7000P before 1.3.0.8, R7100LG before 1.0.0.34, R7300DST before 1.0.0.58, R7500 before 1.0.0.118, R7500v2 before 1.0.3.24, R7800 before 1.0.2.40, R7900 before 1.0.2.4, R7900P before 1.1.5.14, R8000 before 1.0.4.4, R8000P before 1.1.5.14, R8500 before 1.0.2.110, R8300 before 1.0.2.110, R9000 before 1.0.2.52, WN2000RPTv3 before 1.0.1.8, WN3000RPv3 before 1.0.2.50, WN3100RPv2 before 1.0.0.42, WNDR3400v3 before 1.0.1.16, WNDR3700v4 before 1.0.2.94, WNDR4300 before 1.0.2.96, WNDR4300v2 before 1.0.0.50, WNDR4500v3 before 1.0.0.50, WNR1000v4 before 1.1.0.44, WNR2000v5 before 1.0.0.62, WNR2020 before 1.1.0.44, WNR2050 before 1.1.0.44, and WNR3500Lv2 before 1.2.0.46. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000049534/Security-Advisory-for-Cross-Site-Scripting-on-Some-Routers-Gateways-and-Extenders-PSV-2017-2950 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26313.
CVE ID: CVE-2020-26313 Date Updated: 2022-12-02T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36028.
CVE ID: CVE-2022-36028 Date Updated: 2024-08-03T09:51:59.902Z Date Published: 2024-04-25T20:36:37.543Z Description: Greenlight is an end-user interface for BigBlueButton servers. Versions prior to 2.13.0 have an open redirect vulnerability in the Login page due to unchecked the value of the `return_to` cookie. Versions 2.13.0 contains a patch for the issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/ba5834bd-1f04-4936-8e93-2442d45403bahttps:// - https://github.com/bigbluebutton/greenlight/commit/20fe1ee71b5703fcc4ed698a959ad224fed19623 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-44168.
CVE ID: CVE-2024-44168 Date Updated: 2024-09-17T13:49:11.656Z Date Published: 2024-09-16T23:23:15.311Z Description: A library injection issue was addressed with additional restrictions. This issue is fixed in macOS Ventura 13.7, macOS Sonoma 14.7, macOS Sequoia 15. An app may be able to modify protected parts of the file system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/121234 - https://support.apple.com/en-us/121238 - https://support.apple.com/en-us/121247 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14319.
CVE ID: CVE-2020-14319 Date Updated: 2024-08-04T12:39:36.228Z Date Published: 2020-08-03T16:50:39 Description: It was found that the AMQ Online console is vulnerable to a Cross-Site Request Forgery (CSRF) which is exploitable in cases where preflight checks are not instigated or bypassed. For example authorised users using an older browser with Adobe Flash are vulnerable when targeted by an attacker. This flaw affects all versions of AMQ-Online prior to 1.5.2 and Enmasse versions 0.31.0-rc1 up until but not including 0.32.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1854373 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33325.
CVE ID: CVE-2023-33325 Date Updated: 2024-09-24T19:23:03.007Z Date Published: 2023-08-30T12:34:49.770Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Teplitsa of social technologies Leyka plugin <= 3.30.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/leyka/wordpress-leyka-plugin-3-29-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42427.
CVE ID: CVE-2023-42427 Date Updated: 2024-08-02T19:16:51.029Z Date Published: 2024-06-03T03:44:54.434Z Description: Cross-site scripting vulnerability exists in UNIVERSAL PASSPORT RX versions 1.0.0 to 1.0.7, which may allow a remote authenticated attacker to execute an arbitrary script on the web browser of the user who is using the product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jast-gakuen.com/products/unipa/ - https://jvn.jp/en/jp/JVN43215077/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34215.
CVE ID: CVE-2024-34215 Date Updated: 2024-08-02T02:51:10.897Z Date Published: N/A Description: TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the setUrlFilterRules function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/n0wstr/IOTVuln/tree/main/CP450/SetUrlFilterRules No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37986.
CVE ID: CVE-2024-37986 Date Updated: 2024-09-19T17:36:04.702Z Date Published: 2024-07-09T17:02:21.083Z Description: Secure Boot Security Feature Bypass Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37986 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17215.
CVE ID: CVE-2017-17215 Date Updated: 2024-08-05T20:43:59.888Z Date Published: 2018-03-20T15:00:00 Description: Huawei HG532 with some customized versions has a remote code execution vulnerability. An authenticated attacker could send malicious packets to port 37215 to launch attacks. Successful exploit could lead to the remote execution of arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/102344 - http://www.huawei.com/en/psirt/security-notices/huawei-sn-20171130-01-hg532-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-3652.
CVE ID: CVE-2016-3652 Date Updated: 2024-08-06T00:03:34.381Z Date Published: 2016-06-30T23:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in management scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160628_01 - http://www.securitytracker.com/id/1036196 - https://www.exploit-db.com/exploits/40041/ - http://www.securityfocus.com/bid/91444 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2032.
CVE ID: CVE-2008-2032 Date Updated: 2024-08-07T08:49:56.882Z Date Published: 2008-04-30T15:00:00 Description: The FTP service in Acritum Femitter Server 1.03 allows remote attackers to cause a denial of service (crash) by sending multiple crafted RETR commands. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/42075 - http://www.securityfocus.com/bid/28973 - http://secunia.com/advisories/29967 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1293.
CVE ID: CVE-2019-1293 Date Updated: 2024-08-04T18:13:30.256Z Date Published: 2019-09-11T21:25:01 Description: An information disclosure vulnerability exists in Windows when the Windows SMB Client kernel-mode driver fails to properly handle objects in memory, aka 'Windows SMB Client Driver Information Disclosure Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1293 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-17274.
CVE ID: CVE-2017-17274 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30354.
CVE ID: CVE-2021-30354 Date Updated: 2024-08-03T22:32:41.028Z Date Published: 2021-09-01T17:43:38 Description: Amazon Kindle e-reader prior to and including version 5.13.4 contains an Integer Overflow that leads to a Heap-Based Buffer Overflow in function CJBig2Image::expand() and results in a memory corruption that leads to code execution when parsing a crafted PDF book. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://research.checkpoint.com/2021/i-can-take-over-your-kindle/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-4047.
CVE ID: CVE-2021-4047 Date Updated: 2024-08-03T17:16:03.305Z Date Published: 2022-04-11T19:38:31 Description: The release of OpenShift 4.9.6 included four CVE fixes for the haproxy package, however the patch for CVE-2021-39242 was missing. This issue only affects Red Hat OpenShift 4.9. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=2027881 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44005.
CVE ID: CVE-2021-44005 Date Updated: 2024-08-04T04:10:17.117Z Date Published: 2021-12-14T12:06:43 Description: A vulnerability has been identified in JT2Go (All versions < V13.2.0.5), Teamcenter Visualization (All versions < V13.2.0.5). The Tiff_Loader.dll contains an out of bounds write past the end of an allocated structure while parsing specially crafted TIFF files. This could allow an attacker to execute code in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/pdf/ssa-595101.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44259.
CVE ID: CVE-2022-44259 Date Updated: 2024-08-03T13:47:05.564Z Date Published: 2022-11-23T00:00:00 Description: TOTOLINK LR350 V9.3.5u.6369_B20220309 contains a post-authentication buffer overflow via parameter week, sTime, and eTime in the setParentalRules function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://brief-nymphea-813.notion.site/LR350-bof-setParentalRules-fe0c0cc8b9bd44b48c527f76e69d402a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-7216.
CVE ID: CVE-2013-7216 Date Updated: 2024-08-06T18:01:20.013Z Date Published: 2013-12-24T22:00:00 Description: Multiple SQL injection vulnerabilities in Classifieds Creator 2.0 allow remote attackers to execute arbitrary SQL commands via the (1) ID parameter to demo/classifieds/product.asp, or (2) UserID or (3) Password field to demo/classifieds/admin.asp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/101074 - https://exchange.xforce.ibmcloud.com/vulnerabilities/89772 - http://osvdb.org/101073 - http://www.securityfocus.com/bid/64330 - http://packetstormsecurity.com/files/124442 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36773.
CVE ID: CVE-2024-36773 Date Updated: 2024-08-22T18:34:55.526Z Date Published: N/A Description: A cross-site scripting (XSS) vulnerability in Monstra CMS v3.0.4 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Themes parameter at index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/OoLs5/VulDiscovery/blob/main/cve-2024-36773.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1189.
CVE ID: CVE-2023-1189 Date Updated: 2024-08-02T05:40:59.792Z Date Published: 2023-03-06T07:11:52.584Z Description: A vulnerability was found in WiseCleaner Wise Folder Hider 4.4.3.202. It has been declared as problematic. Affected by this vulnerability is the function 0x222400/0x222404/0x222410 in the library WiseFs64.sys of the component IoControlCode Handler. The manipulation leads to denial of service. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier VDB-222361 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.222361 - https://vuldb.com/?ctiid.222361 - https://github.com/zeze-zeze/WindowsKernelVuln/tree/master/CVE-2023-1189 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42740.
CVE ID: CVE-2021-42740 Date Updated: 2024-08-04T03:38:50.098Z Date Published: 2021-10-21T14:46:08 Description: The shell-quote package before 1.7.3 for Node.js allows command injection. An attacker can inject unescaped shell metacharacters through a regex designed to support Windows drive letters. If the output of this package is passed to a real shell as a quoted argument to a command with exec(), an attacker can inject arbitrary commands. This is because the Windows drive letter regex character class is {A-z] instead of the correct {A-Za-z]. Several shell metacharacters exist in the space between capital letter Z and lower case letter a, such as the backtick character. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.npmjs.com/package/shell-quote - https://github.com/substack/node-shell-quote/blob/master/CHANGELOG.md#173 - https://github.com/substack/node-shell-quote/commit/5799416ed454aa4ec9afafc895b4e31760ea1abe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47214.
CVE ID: CVE-2021-47214 Date Updated: 2024-08-04T05:32:07.447Z Date Published: 2024-04-10T19:01:54.543Z Description: In the Linux kernel, the following vulnerability has been resolved: hugetlb, userfaultfd: fix reservation restore on userfaultfd error Currently in the is_continue case in hugetlb_mcopy_atomic_pte(), if we bail out using "goto out_release_unlock;" in the cases where idx >= size, or !huge_pte_none(), the code will detect that new_pagecache_page == false, and so call restore_reserve_on_error(). In this case I see restore_reserve_on_error() delete the reservation, and the following call to remove_inode_hugepages() will increment h->resv_hugepages causing a 100% reproducible leak. We should treat the is_continue case similar to adding a page into the pagecache and set new_pagecache_page to true, to indicate that there is no reservation to restore on the error path, and we need not call restore_reserve_on_error(). Rename new_pagecache_page to page_in_pagecache to make that clear. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/b5069d44e2fbc4a9093d005b3ef0949add3dd27e - https://git.kernel.org/stable/c/cc30042df6fcc82ea18acf0dace831503e60a0b7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43947.
CVE ID: CVE-2021-43947 Date Updated: 2024-09-17T00:45:50.288Z Date Published: 2022-01-06T01:05:10.045123Z Description: Affected versions of Atlassian Jira Server and Data Center allow remote attackers with administrator privileges to execute arbitrary code via a Remote Code Execution (RCE) vulnerability in the Email Templates feature. This issue bypasses the fix of https://jira.atlassian.com/browse/JSDSERVER-8665. The affected versions are before version 8.13.15, and from version 8.14.0 before 8.20.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.atlassian.com/browse/JRASERVER-73067 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47353.
CVE ID: CVE-2021-47353 Date Updated: 2024-08-04T05:32:08.447Z Date Published: 2024-05-21T14:35:57.122Z Description: In the Linux kernel, the following vulnerability has been resolved: udf: Fix NULL pointer dereference in udf_symlink function In function udf_symlink, epos.bh is assigned with the value returned by udf_tgetblk. The function udf_tgetblk is defined in udf/misc.c and returns the value of sb_getblk function that could be NULL. Then, epos.bh is used without any check, causing a possible NULL pointer dereference when sb_getblk fails. This fix adds a check to validate the value of epos.bh. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/2f3d9ddd32a28803baa547e6274983b67d5e287c - https://git.kernel.org/stable/c/371566f63cbd0bb6fbb25b8fe9d5798268d35af9 - https://git.kernel.org/stable/c/baea588a42d675e35daeaddd10fbc9700550bc4d - https://git.kernel.org/stable/c/3638705ecd5ad2785e996f820121c0ad15ce64b5 - https://git.kernel.org/stable/c/80d505aee6398cf8beb72475c7edcf1733c1c68b - https://git.kernel.org/stable/c/21bf1414580c36ffc8d8de043beb3508cf812238 - https://git.kernel.org/stable/c/aebed6b19e51a34003d998da5ebb1dfdd2cb1d02 - https://git.kernel.org/stable/c/5150877e4d99f85057a458daac7cd7c01005d5c6 - https://git.kernel.org/stable/c/fa236c2b2d4436d9f19ee4e5d5924e90ffd7bb43 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0622.
CVE ID: CVE-2017-0622 Date Updated: 2024-08-05T13:11:06.823Z Date Published: 2017-05-12T15:00:00 Description: An elevation of privilege vulnerability in the Goodix touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-32749036. References: QC-CR#1098602. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/98198 - https://source.android.com/security/bulletin/2017-05-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-5809.
CVE ID: CVE-2017-5809 Date Updated: 2024-09-16T17:17:52.004Z Date Published: 2018-02-15T22:00:00Z Description: A Remote Arbitrary Code Execution vulnerability in HPE Data Protector version prior to 8.17 and 9.09 was found. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://labs.mwrinfosecurity.com/assets/BlogFiles/mwri-setuid-bit-set-omniresolve-2017-08-02.pdf - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03732en_us - http://www.securityfocus.com/bid/100088 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4137.
CVE ID: CVE-2015-4137 Date Updated: 2024-08-06T06:04:02.927Z Date Published: 2015-05-29T14:00:00 Description: SQL injection vulnerability in related.php in Milw0rm Clone Script 1.0 allows remote attackers to execute arbitrary SQL commands via the program parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/131981/Milw0rm-Clone-Script-1.0-SQL-Injection.html - http://www.securityfocus.com/bid/74745 - http://seclists.org/fulldisclosure/2015/May/76 - https://www.exploit-db.com/exploits/37248/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-27597.
CVE ID: CVE-2021-27597 Date Updated: 2024-08-03T21:26:09.711Z Date Published: 2021-06-09T00:00:00 Description: SAP NetWeaver AS for ABAP (RFC Gateway), versions - KRNL32NUC - 7.22,7.22EXT, KRNL64NUC - 7.22,7.22EXT,7.49, KRNL64UC - 8.04,7.22,7.22EXT,7.49,7.53,7.73, KERNEL - 7.22,8.04,7.49,7.53,7.73,7.77,7.81,7.82,7.83, allows an unauthenticated attacker without specific knowledge of the system to send a specially crafted packet over a network which will trigger an internal error in the system due to improper input validation in method memmove() causing the system to crash and rendering it unavailable. In this attack, no data in the system can be viewed or modified. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=578125999 - https://launchpad.support.sap.com/#/notes/3020209 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4297.
CVE ID: CVE-2022-4297 Date Updated: 2024-08-03T01:34:49.994Z Date Published: 2023-01-02T21:49:08.397Z Description: The WP AutoComplete Search WordPress plugin through 1.0.4 does not sanitise and escape a parameter before using it in a SQL statement via an AJAX available to unauthenticated users, leading to an unauthenticated SQL injection No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/e2dcc76c-65ac-4cd6-a5c9-6d813b5ac26d - http://packetstormsecurity.com/files/173293/WordPress-WP-AutoComplete-Search-1.0.4-SQL-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49106.
CVE ID: CVE-2023-49106 Date Updated: 2024-08-02T21:46:28.738Z Date Published: 2024-01-16T00:58:50.428Z Description: Missing Password Field Masking vulnerability in Hitachi Device Manager on Windows, Linux (Device Manager Agent component).This issue affects Hitachi Device Manager: before 8.8.5-04. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-101/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2960.
CVE ID: CVE-2008-2960 Date Updated: 2024-08-07T09:21:34.545Z Date Published: 2008-07-02T17:00:00 Description: Cross-site scripting (XSS) vulnerability in phpMyAdmin before 2.11.7, when register_globals is enabled and .htaccess support is disabled, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors involving scripts in libraries/. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/43320 - http://www.phpmyadmin.net/home_page/downloads.php?relnotes=0 - http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00000.html - http://secunia.com/advisories/30813 - http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2008-4 - http://secunia.com/advisories/30816 - http://www.vupen.com/english/advisories/2008/1904/references - http://secunia.com/advisories/33822 - http://www.openwall.com/lists/oss-security/2008/07/16/11 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:131 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15095.
CVE ID: CVE-2017-15095 Date Updated: 2024-09-16T22:57:07.488Z Date Published: 2018-02-06T15:00:00Z Description: A deserialization flaw was discovered in the jackson-databind in versions before 2.8.10 and 2.9.1, which could allow an unauthenticated user to perform code execution by sending the maliciously crafted input to the readValue method of the ObjectMapper. This issue extends the previous flaw CVE-2017-7525 by blacklisting more classes that could be used maliciously. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:1448 - http://www.securityfocus.com/bid/103880 - https://access.redhat.com/errata/RHSA-2018:0479 - https://access.redhat.com/errata/RHSA-2018:0481 - https://access.redhat.com/errata/RHSA-2018:1449 - https://access.redhat.com/errata/RHSA-2018:1450 - https://access.redhat.com/errata/RHSA-2018:0577 - https://access.redhat.com/errata/RHSA-2018:0576 - https://access.redhat.com/errata/RHSA-2017:3190 - https://access.redhat.com/errata/RHSA-2018:1451 - https://access.redhat.com/errata/RHSA-2017:3189 - https://access.redhat.com/errata/RHSA-2018:2927 - http://www.securitytracker.com/id/1039769 - https://access.redhat.com/errata/RHSA-2018:0342 - https://access.redhat.com/errata/RHSA-2018:0480 - https://access.redhat.com/errata/RHSA-2018:1447 - https://access.redhat.com/errata/RHSA-2018:0478 - https://www.debian.org/security/2017/dsa-4037 - https://access.redhat.com/errata/RHSA-2019:2858 - https://access.redhat.com/errata/RHSA-2019:3149 - https://access.redhat.com/errata/RHSA-2019:3892 - https://lists.apache.org/thread.html/f095a791bda6c0595f691eddd0febb2d396987eec5cbd29120d8c629%40%3Csolr-user.lucene.apache.org%3E - https://lists.debian.org/debian-lts-announce/2020/01/msg00037.html - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html - https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html - https://www.oracle.com/security-alerts/cpuoct2020.html - https://security.netapp.com/advisory/ntap-20171214-0003/ - https://github.com/FasterXML/jackson-databind/issues/1737 - https://github.com/FasterXML/jackson-databind/issues/1680 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15860.
CVE ID: CVE-2019-15860 Date Updated: 2024-08-05T01:03:30.897Z Date Published: 2019-09-03T06:39:23 Description: Xpdf 2.00 allows a SIGSEGV in XRef::constructXRef in XRef.cc. NOTE: 2.00 is a version from November 2002. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/RootUp/b5de893bb2e51a4c846c5a0caa13b666 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.