instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2021-22774.
CVE ID: CVE-2021-22774 Date Updated: 2024-08-03T18:51:07.443Z Date Published: 2021-07-21T10:45:07 Description: A CWE-759: Use of a One-Way Hash without a Salt vulnerability exists in EVlink City (EVC1S22P4 / EVC1S7P4 all versions prior to R8 V3.4.0.1), EVlink Parking (EVW2 / EVF2 / EV.2 all versions prior to R8 V3.4.0.1), and EVlink Smart Wallbox (EVB1A all versions prior to R8 V3.4.0.1 ) that could lead an attacker to get knowledge of charging station user account credentials using dictionary attacks techniques. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2021-194-06 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-11897
CVE-CVE-2020-11897 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2014-5953.
CVE ID: CVE-2014-5953 Date Updated: 2024-08-06T12:03:00.927Z Date Published: 2014-09-18T10:00:00 Description: The KASKUS (aka com.kaskus.android) application 2.13.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/618929 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0953.
CVE ID: CVE-2010-0953 Date Updated: 2024-08-07T01:06:52.655Z Date Published: 2010-03-09T20:00:00 Description: Directory traversal vulnerability in mod.php in phpCOIN 1.2.1 allows remote attackers to read arbitrary files via a .. (dot dot) in the mod parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/11641 - https://exchange.xforce.ibmcloud.com/vulnerabilities/56721 - http://www.securityfocus.com/bid/38576 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24785.
CVE ID: CVE-2021-24785 Date Updated: 2024-08-03T19:42:17.191Z Date Published: 2021-10-25T13:20:57 Description: The Great Quotes WordPress plugin through 1.0.0 does not sanitise and escape the Quote and Author fields of its Quotes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/3957056c-df25-41f7-ab0d-1d09222f2fa5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12719.
CVE ID: CVE-2017-12719 Date Updated: 2024-08-05T18:43:56.468Z Date Published: 2017-11-06T22:00:00 Description: An Untrusted Pointer Dereference issue was discovered in Advantech WebAccess versions prior to V8.2_20170817. A remote attacker is able to execute code to dereference a pointer within the program causing the application to become unavailable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/101685 - https://ics-cert.us-cert.gov/advisories/ICSA-17-306-02 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6303.
CVE ID: CVE-2015-6303 Date Updated: 2024-08-06T07:15:13.311Z Date Published: 2015-09-24T14:00:00 Description: The Cisco Spark application 2015-07-04 for mobile operating systems does not properly verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate, aka Bug IDs CSCut36742 and CSCut36844. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=41127 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24400.
CVE ID: CVE-2022-24400 Date Updated: 2024-09-12T20:30:58.123Z Date Published: 2023-10-19T09:33:28.366Z Description: A flaw in the TETRA authentication procecure allows a MITM adversary that can predict the MS challenge RAND2 to set session key DCK to zero. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tetraburst.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8607.
CVE ID: CVE-2015-8607 Date Updated: 2024-08-06T08:20:43.434Z Date Published: 2016-01-13T15:00:00 Description: The canonpath function in the File::Spec module in PathTools before 3.62, as used in Perl, does not properly preserve the taint attribute of data, which might allow context-dependent attackers to bypass the taint protection mechanism via a crafted string. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201701-75 - http://www.securityfocus.com/bid/80504 - http://www.securitytracker.com/id/1034772 - http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176228.html - http://www.debian.org/security/2016/dsa-3441 - http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175494.html - http://www.ubuntu.com/usn/USN-2878-1 - http://lists.opensuse.org/opensuse-updates/2016-03/msg00112.html - https://www.oracle.com/security-alerts/cpujul2020.html - http://cpansearch.perl.org/src/RJBS/PathTools-3.62/Changes - https://rt.perl.org/Public/Bug/Display.html?id=126862 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05240731 - http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-29018.
CVE ID: CVE-2023-29018 Date Updated: 2024-08-02T14:00:14.661Z Date Published: 2023-04-14T18:47:03.747Z Description: The OpenFeature Operator allows users to expose feature flags to applications. Assuming the pre-existence of a vulnerability that allows for arbitrary code execution, an attacker could leverage the lax permissions configured on `open-feature-operator-controller-manager` to escalate the privileges of any SA in the cluster. The increased privileges could be used to modify cluster state, leading to DoS, or read sensitive data, including secrets. Version 0.2.32 mitigates this issue by restricting the resources the `open-feature-operator-controller-manager` can modify. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/open-feature/open-feature-operator/security/advisories/GHSA-cwf6-xj49-wp83 - https://github.com/open-feature/open-feature-operator/releases/tag/v0.2.32 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1901.
CVE ID: CVE-2010-1901 Date Updated: 2024-08-07T02:17:13.303Z Date Published: 2010-08-11T18:00:00 Description: Microsoft Office Word 2002 SP3, 2003 SP3, and 2007 SP2; Microsoft Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Word Viewer; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly handle unspecified properties in rich text data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Word RTF Parsing Engine Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.us-cert.gov/cas/techalerts/TA10-222A.html - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-056 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11612 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8575.
CVE ID: CVE-2020-8575 Date Updated: 2024-08-04T10:03:45.981Z Date Published: 2020-08-03T16:55:52 Description: Active IQ Unified Manager for VMware vSphere and Windows versions prior to 9.5 are susceptible to a vulnerability which allows administrative users to cause Denial of Service (DoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.netapp.com/advisory/ntap-20200803-0002/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11211.
CVE ID: CVE-2017-11211 Date Updated: 2024-09-16T16:53:41.727Z Date Published: 2017-08-11T19:00:00Z Description: Adobe Acrobat Reader 2017.009.20058 and earlier, 2017.008.30051 and earlier, 2015.006.30306 and earlier, and 11.0.20 and earlier has an exploitable heap overflow vulnerability in the JPEG parser. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/100180 - https://helpx.adobe.com/security/products/acrobat/apsb17-24.html - http://www.securitytracker.com/id/1039098 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37491.
CVE ID: CVE-2023-37491 Date Updated: 2024-09-28T22:05:33.015Z Date Published: 2023-08-08T00:46:40.819Z Description: The ACL (Access Control List) of SAP Message Server - versions KERNEL 7.22, KERNEL 7.53, KERNEL 7.54, KERNEL 7.77, RNL64UC 7.22, RNL64UC 7.22EXT, RNL64UC 7.53, KRNL64NUC 7.22, KRNL64NUC 7.22EXT, can be bypassed in certain conditions, which may enable an authenticated malicious user to enter the network of the SAP systems served by the attacked SAP Message server. This may lead to unauthorized read and write of data as well as rendering the system unavailable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3344295 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6652.
CVE ID: CVE-2016-6652 Date Updated: 2024-08-06T01:36:29.349Z Date Published: 2016-10-05T16:00:00 Description: SQL injection vulnerability in Pivotal Spring Data JPA before 1.9.6 (Gosling SR6) and 1.10.x before 1.10.4 (Hopper SR4), when used with a repository that defines a String query using the @Query annotation, allows attackers to execute arbitrary JPQL commands via a sort instance with a function call. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93276 - https://jira.spring.io/browse/DATAJPA-965 - https://pivotal.io/security/cve-2016-6652 - https://security.gentoo.org/glsa/201701-01 - https://github.com/spring-projects/spring-data-jpa/commit/b8e7fe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14407.
CVE ID: CVE-2017-14407 Date Updated: 2024-09-16T21:57:32.957Z Date Published: 2017-09-13T03:00:00Z Description: A stack-based buffer over-read was discovered in filterYule in gain_analysis.c in MP3Gain version 1.5.2. The vulnerability causes an application crash, which leads to remote denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blogs.gentoo.org/ago/2017/09/08/mp3gain-stack-based-buffer-overflow-in-filteryule-gain_analysis-c/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16403.
CVE ID: CVE-2018-16403 Date Updated: 2024-08-05T10:24:32.190Z Date Published: 2018-09-03T19:00:00 Description: libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=6983e59b727458a6c64d9659c85f08218bc4fcda - https://sourceware.org/bugzilla/show_bug.cgi?id=23529 - https://usn.ubuntu.com/4012-1/ - http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00052.html - https://access.redhat.com/errata/RHSA-2019:2197 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9818.
CVE ID: CVE-2020-9818 Date Updated: 2024-08-04T10:43:05.159Z Date Published: 2020-06-09T16:12:39 Description: An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 13.5 and iPadOS 13.5, iOS 12.4.7, watchOS 6.2.5. Processing a maliciously crafted mail message may lead to unexpected memory modification or application termination. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT211168 - https://support.apple.com/HT211175 - https://support.apple.com/HT211169 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-4698.
CVE ID: CVE-2014-4698 Date Updated: 2024-08-06T11:27:36.561Z Date Published: 2014-07-10T10:00:00 Description: Use-after-free vulnerability in ext/spl/spl_array.c in the SPL component in PHP through 5.5.14 allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via crafted ArrayIterator usage within applications in certain web-hosting environments. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT204659 - http://www-01.ibm.com/support/docview.wss?uid=swg21683486 - http://secunia.com/advisories/54553 - http://rhn.redhat.com/errata/RHSA-2014-1766.html - https://bugs.php.net/bug.php?id=67539 - http://rhn.redhat.com/errata/RHSA-2014-1326.html - http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html - http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html - http://rhn.redhat.com/errata/RHSA-2014-1327.html - http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - http://rhn.redhat.com/errata/RHSA-2014-1765.html - http://secunia.com/advisories/59831 - http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3456.
CVE ID: CVE-2022-3456 Date Updated: 2024-08-03T01:07:06.721Z Date Published: 2022-10-13T00:00:00 Description: Allocation of Resources Without Limits or Throttling in GitHub repository ikus060/rdiffweb prior to 2.5.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/b34412ca-50c5-4615-b7e3-5d07d33acfce - https://github.com/ikus060/rdiffweb/commit/b78ec09f4582e363f6f449df6f987127e126c311 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49551.
CVE ID: CVE-2023-49551 Date Updated: 2024-09-06T17:57:41.504Z Date Published: 2024-01-02T00:00:00 Description: An issue in Cesanta mjs 2.20.0 allows a remote attacker to cause a denial of service via the mjs_op_json_parse function in the msj.c file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/cesanta/mjs/issues/257 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47142.
CVE ID: CVE-2021-47142 Date Updated: 2024-09-11T17:33:15.288Z Date Published: 2024-03-25T09:07:40.374Z Description: In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix a use-after-free looks like we forget to set ttm->sg to NULL. Hit panic below [ 1235.844104] general protection fault, probably for non-canonical address 0x6b6b6b6b6b6b7b4b: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI [ 1235.989074] Call Trace: [ 1235.991751] sg_free_table+0x17/0x20 [ 1235.995667] amdgpu_ttm_backend_unbind.cold+0x4d/0xf7 [amdgpu] [ 1236.002288] amdgpu_ttm_backend_destroy+0x29/0x130 [amdgpu] [ 1236.008464] ttm_tt_destroy+0x1e/0x30 [ttm] [ 1236.013066] ttm_bo_cleanup_memtype_use+0x51/0xa0 [ttm] [ 1236.018783] ttm_bo_release+0x262/0xa50 [ttm] [ 1236.023547] ttm_bo_put+0x82/0xd0 [ttm] [ 1236.027766] amdgpu_bo_unref+0x26/0x50 [amdgpu] [ 1236.032809] amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x7aa/0xd90 [amdgpu] [ 1236.040400] kfd_ioctl_alloc_memory_of_gpu+0xe2/0x330 [amdgpu] [ 1236.046912] kfd_ioctl+0x463/0x690 [amdgpu] No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/0707c3fea8102d211631ba515ef2159707561b0d - https://git.kernel.org/stable/c/3293cf3513d69f00c14d43e2020826d45ea0e46a - https://git.kernel.org/stable/c/952ab3f9f48eb0e8050596d41951cf516be6b122 - https://git.kernel.org/stable/c/a849e218556f932576c0fb1c5a88714b61709a17 - https://git.kernel.org/stable/c/7398c2aab4da960761ec182d04d6d5abbb4a226e - https://git.kernel.org/stable/c/f98cdf084405333ee2f5be548a91b2d168e49276 - https://git.kernel.org/stable/c/d4ea141fd4b40636a8326df5a377d9c5cf9b3faa - https://git.kernel.org/stable/c/1e5c37385097c35911b0f8a0c67ffd10ee1af9a2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3487.
CVE ID: CVE-2012-3487 Date Updated: 2024-09-17T03:42:57.974Z Date Published: 2012-08-26T19:00:00Z Description: Race condition in Tunnelblick 3.3beta20 and earlier allows local users to kill unintended processes by waiting for a specific PID value to be assigned to a target process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2012/08/14/1 - http://code.google.com/p/tunnelblick/issues/detail?id=212 - http://archives.neohapsis.com/archives/fulldisclosure/2012-08/0122.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26952.
CVE ID: CVE-2021-26952 Date Updated: 2024-08-03T20:33:41.463Z Date Published: 2021-02-09T22:07:42 Description: An issue was discovered in the ms3d crate before 0.1.3 for Rust. It might allow attackers to obtain sensitive information from uninitialized memory locations via IoReader::read. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://rustsec.org/advisories/RUSTSEC-2021-0016.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23584.
CVE ID: CVE-2024-23584 Date Updated: 2024-08-01T23:06:25.296Z Date Published: 2024-04-08T23:05:11.528Z Description: The NMAP Importer service​ may expose data store credentials to authorized users of the Windows Registry. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0112264 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-21503.
CVE ID: CVE-2021-21503 Date Updated: 2024-09-17T03:43:52.638Z Date Published: 2021-03-08T21:44:46.106447Z Description: PowerScale OneFS 8.1.2,8.2.2 and 9.1.0 contains an improper input sanitization issue in a command. The Compadmin user could potentially exploit this vulnerability, leading to potential privileges escalation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/000183717 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6858.
CVE ID: CVE-2014-6858 Date Updated: 2024-08-06T12:31:47.142Z Date Published: 2014-10-02T10:00:00 Description: The Mostafa Shemeas (aka com.mostafa.shemeas.website) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/873337 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27954.
CVE ID: CVE-2023-27954 Date Updated: 2024-08-02T12:23:30.566Z Date Published: 2023-05-08T00:00:00 Description: The issue was addressed by removing origin information. This issue is fixed in macOS Ventura 13.3, Safari 16.4, iOS 16.4 and iPadOS 16.4, iOS 15.7.4 and iPadOS 15.7.4, tvOS 16.4, watchOS 9.4. A website may be able to track sensitive user information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT213670 - https://support.apple.com/en-us/HT213671 - https://support.apple.com/en-us/HT213676 - https://support.apple.com/en-us/HT213678 - https://support.apple.com/en-us/HT213674 - https://support.apple.com/en-us/HT213673 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1563
The MITRE ATT&CK technique T1563: Remote Service Session Hijacking is related to the vulnerability CVE-CVE-2019-16782. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
Provide detailed information about CVE-2009-2096.
CVE ID: CVE-2009-2096 Date Updated: 2024-08-07T05:36:20.986Z Date Published: 2009-06-17T17:00:00 Description: SQL injection vulnerability in house/listing_view.php in phpCollegeExchange 0.1.5c allows remote attackers to execute arbitrary SQL commands via the itemnr parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/8962 - http://secunia.com/advisories/35452 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21092.
CVE ID: CVE-2024-21092 Date Updated: 2024-08-01T22:13:42.508Z Date Published: 2024-04-16T21:26:29.408Z Description: Vulnerability in the Oracle Agile Product Lifecycle Management for Process product of Oracle Supply Chain (component: Product Quality Management). The supported version that is affected is 6.2.4.2. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Agile Product Lifecycle Management for Process. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Agile Product Lifecycle Management for Process accessible data as well as unauthorized access to critical data or complete access to all Oracle Agile Product Lifecycle Management for Process accessible data. CVSS 3.1 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-3379
CVE-CVE-2020-3379 is a vulnerability in Cisco SD-WAN Solution. It is related to the MITRE ATT&CK technique T1608: Stage Capabilities. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2023-38751.
CVE ID: CVE-2023-38751 Date Updated: 2024-08-02T17:54:38.324Z Date Published: 2023-08-09T03:29:37.666Z Description: Improper authorization vulnerability in Special Interest Group Network for Analysis and Liaison versions 4.4.0 to 4.7.7 allows the authorized API users to view the organization information of the information receiver that is set as "non-disclosure" in the information provision operation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jpcert.or.jp/press/2023/PR20230807_notice.html - https://jvn.jp/en/jp/JVN83334799/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19455.
CVE ID: CVE-2019-19455 Date Updated: 2024-08-05T02:16:47.368Z Date Published: 2020-08-03T13:25:19 Description: Wowza Streaming Engine before 4.8.5 has Insecure Permissions which may allow a local attacker to escalate privileges in / usr / local / WowzaStreamingEngine / manager / bin / in the Linux version of the server by writing arbitrary commands in any file and execute them as root. This issue was resolved in Wowza Streaming Engine 4.8.5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.gruppotim.it/redteam - https://www.wowza.com/docs/wowza-streaming-engine-4-8-5-release-notes - https://raw.githubusercontent.com/WowzaMediaSystems/public_cve/main/wowza-streaming-engine/CVE-2019-19455.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22121.
CVE ID: CVE-2023-22121 Date Updated: 2024-09-13T16:09:30.817Z Date Published: 2023-10-17T21:03:11.270Z Description: Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). Supported versions that are affected are 14.5-14.7. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Banking Trade Finance accessible data as well as unauthorized read access to a subset of Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 5.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuoct2023.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6548.
CVE ID: CVE-2013-6548 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-51386.
CVE ID: CVE-2023-51386 Date Updated: 2024-08-02T22:32:09.383Z Date Published: 2023-12-22T21:58:58.714Z Description: Sandbox Accounts for Events provides multiple, temporary AWS accounts to a number of authenticated users simultaneously via a browser-based GUI. Authenticated users could potentially read data from the events table by sending request payloads to the events API, collecting information on planned events, timeframes, budgets and owner email addresses. This data access may allow users to get insights into upcoming events and join events which they have not been invited to. This issue has been patched in version 1.10.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/awslabs/sandbox-accounts-for-events/security/advisories/GHSA-p7w3-j66h-m7mx - https://github.com/awslabs/sandbox-accounts-for-events/commit/f30a0662f0a28734eb33c5868cccc1c319eb6e79 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-26693.
CVE ID: CVE-2024-26693 Date Updated: 2024-08-02T00:14:12.896Z Date Published: 2024-04-03T14:54:54.165Z Description: In the Linux kernel, the following vulnerability has been resolved: wifi: iwlwifi: mvm: fix a crash when we run out of stations A DoS tool that injects loads of authentication frames made our AP crash. The iwl_mvm_is_dup() function couldn't find the per-queue dup_data which was not allocated. The root cause for that is that we ran out of stations in the firmware and we didn't really add the station to the firmware, yet we didn't return an error to mac80211. Mac80211 was thinking that we have the station and because of that, sta_info::uploaded was set to 1. This allowed ieee80211_find_sta_by_ifaddr() to return a valid station object, but that ieee80211_sta didn't have any iwl_mvm_sta object initialized and that caused the crash mentioned earlier when we got Rx on that station. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/00f4eb31b8193f6070ce24df636883f9c104ca95 - https://git.kernel.org/stable/c/c12f0f4d4caf23b1bfdc2602b6b70d56bdcd6aa7 - https://git.kernel.org/stable/c/b7198383ef2debe748118996f627452281cf27d7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29474.
CVE ID: CVE-2021-29474 Date Updated: 2024-08-03T22:11:05.268Z Date Published: 2021-04-26T21:37:29 Description: HedgeDoc (formerly known as CodiMD) is an open-source collaborative markdown editor. An attacker can read arbitrary `.md` files from the server's filesystem due to an improper input validation, which results in the ability to perform a relative path traversal. To verify if you are affected, you can try to open the following URL: `http://localhost:3000/..%2F..%2FREADME#` (replace `http://localhost:3000` with your instance's base-URL e.g. `https://demo.hedgedoc.org/..%2F..%2FREADME#`). If you see a README page being rendered, you run an affected version. The attack works due the fact that the internal router passes the url-encoded alias to the `noteController.showNote`-function. This function passes the input directly to findNote() utility function, that will pass it on the the parseNoteId()-function, that tries to make sense out of the noteId/alias and check if a note already exists and if so, if a corresponding file on disk was updated. If no note exists the note creation-function is called, which pass this unvalidated alias, with a `.md` appended, into a path.join()-function which is read from the filesystem in the follow up routine and provides the pre-filled content of the new note. This allows an attacker to not only read arbitrary `.md` files from the filesystem, but also observes changes to them. The usefulness of this attack can be considered limited, since mainly markdown files are use the file-ending `.md` and all markdown files contained in the hedgedoc project, like the README, are public anyway. If other protections such as a chroot or container or proper file permissions are in place, this attack's usefulness is rather limited. On a reverse-proxy level one can force a URL-decode, which will prevent this attack because the router will not accept such a path. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hedgedoc/hedgedoc/security/advisories/GHSA-p528-555r-pf87 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28686.
CVE ID: CVE-2022-28686 Date Updated: 2024-08-03T06:03:51.989Z Date Published: 2023-03-29T00:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of AVEVA Edge 2020 SP2 Patch 0(4201.2111.1802.0000). User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of APP files. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-17114. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.aveva.com/content/dam/aveva/documents/support/cyber-security-updates/SecurityBulletin_AVEVA-2022-005.pdf - https://www.zerodayinitiative.com/advisories/ZDI-22-1125/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2287.
CVE ID: CVE-2012-2287 Date Updated: 2024-08-06T19:26:08.991Z Date Published: 2012-09-25T10:00:00 Description: The authentication functionality in EMC RSA Authentication Agent 7.1 and RSA Authentication Client 3.5 on Windows XP and Windows Server 2003, when an unspecified configuration exists, allows remote authenticated users to bypass an intended token-authentication step, and establish a login session to a remote host, by leveraging Windows credentials for that host. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/55662 - https://exchange.xforce.ibmcloud.com/vulnerabilities/78802 - http://archives.neohapsis.com/archives/bugtraq/2012-09/0102.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-2765.
CVE ID: CVE-2011-2765 Date Updated: 2024-09-16T19:00:40.969Z Date Published: 2018-08-20T13:00:00Z Description: pyro before 3.15 unsafely handles pid files in temporary directory locations and opening the pid file as root. An attacker can use this flaw to overwrite arbitrary files via symlinks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/irmen/Pyro3/commit/554e095a62c4412c91f981e72fd34a936ac2bf1e - https://pythonhosted.org/Pyro/12-changes.html - https://bugs.debian.org/631912 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4342.
CVE ID: CVE-2015-4342 Date Updated: 2024-08-06T06:11:12.775Z Date Published: 2015-06-17T18:00:00 Description: SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=934187 - http://lists.opensuse.org/opensuse-updates/2015-06/msg00052.html - http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183449.html - https://www.suse.com/security/cve/CVE-2015-4342.html - http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html - http://www.cacti.net/release_notes_0_8_8d.php - http://bugs.cacti.net/view.php?id=2571 - http://www.securitytracker.com/id/1032672 - http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183919.html - http://www.securityfocus.com/bid/75108 - http://www.debian.org/security/2015/dsa-3295 - http://seclists.org/fulldisclosure/2015/Jun/19 - http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183454.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25074.
CVE ID: CVE-2022-25074 Date Updated: 2024-08-03T04:29:01.691Z Date Published: 2022-02-22T22:44:06 Description: TP-Link TL-WR902AC(US)_V3_191209 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/EPhaha/IOT_vuln/tree/main/TP-Link/TL-WR902AC No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1590.
CVE ID: CVE-2022-1590 Date Updated: 2024-08-03T00:10:03.659Z Date Published: 2022-05-05T09:20:10 Description: A vulnerability was found in Bludit 3.13.1. It has been declared as problematic. This vulnerability affects the endpoint /admin/new-content of the New Content module. The manipulation of the argument content with the input <script>alert(1)</script> leads to cross site scripting. The attack can be initiated remotely but requires an authentication. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/joinia/webray.com.cn/blob/main/Bludit/Bluditreadme.md - https://vuldb.com/?id.199060 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22394.
CVE ID: CVE-2020-22394 Date Updated: 2024-08-04T14:51:10.268Z Date Published: 2020-11-19T17:55:40 Description: In YzmCMS v5.5 the member contribution function in the editor contains a cross-site scripting (XSS) vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/yzmcms/yzmcms/issues/42 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19324.
CVE ID: CVE-2019-19324 Date Updated: 2024-08-05T02:16:46.888Z Date Published: 2020-03-20T17:26:52 Description: Xmidt cjwt through 1.0.1 before 2019-11-25 maps unsupported algorithms to alg=none, which sometimes leads to untrusted accidental JWT acceptance. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xmidt-org/cjwt/commit/9304d3e94242c1a6df77b21bde0e949392e1040a - https://github.com/xmidt-org/cjwt/pull/29#issuecomment-558356866 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1957.
CVE ID: CVE-2008-1957 Date Updated: 2024-08-07T08:41:00.244Z Date Published: 2008-04-25T14:00:00 Description: SQL injection vulnerability in news.php in Tr Script News 2.1 allows remote attackers to execute arbitrary SQL commands via the nb parameter in voir mode. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/41946 - http://www.vupen.com/english/advisories/2008/1319/references - http://www.securityfocus.com/bid/28876 - http://secunia.com/advisories/29814 - https://www.exploit-db.com/exploits/5483 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8960.
CVE ID: CVE-2020-8960 Date Updated: 2024-08-04T10:19:18.177Z Date Published: 2020-02-20T22:03:05 Description: Western Digital mycloud.com before Web Version 2.2.0-134 allows XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.wdc.com/downloads.aspx?g=907&lang=en#downloads - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-xss-vulnerability - https://www.westerndigital.com/support/productsecurity/wdc-20003-mycloud-site-version-2-2-0-134 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5649.
CVE ID: CVE-2020-5649 Date Updated: 2024-08-04T08:39:25.660Z Date Published: 2020-11-06T02:06:31 Description: Resource management error vulnerability in TCP/IP function included in the firmware of GT14 Model of GOT 1000 series (GT1455-QTBDE CoreOS version "05.65.00.BD" and earlier, GT1450-QMBDE CoreOS version "05.65.00.BD" and earlier, GT1450-QLBDE CoreOS version "05.65.00.BD" and earlier, GT1455HS-QTBDE CoreOS version "05.65.00.BD" and earlier, and GT1450HS-QMBDE CoreOS version "05.65.00.BD" and earlier) allows a remote unauthenticated attacker to stop the network functions of the products via a specially crafted packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://us-cert.cisa.gov/ics/advisories/icsa-20-310-02 - https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2020-014_en.pdf - https://www.mitsubishielectric.co.jp/psirt/vulnerability/pdf/2020-014.pdf - https://jvn.jp/vu/JVNVU99562395/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41249.
CVE ID: CVE-2022-41249 Date Updated: 2024-08-03T12:35:49.618Z Date Published: 2022-09-21T15:46:07 Description: A cross-site request forgery (CSRF) vulnerability in Jenkins SCM HttpClient Plugin 1.5 and earlier allows attackers to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2708 - http://www.openwall.com/lists/oss-security/2022/09/21/5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0455.
CVE ID: CVE-2010-0455 Date Updated: 2024-08-07T00:52:19.437Z Date Published: 2010-01-28T20:00:00 Description: Cross-site scripting (XSS) vulnerability in forum/viewtopic.php in PunBB 1.3 allows remote attackers to inject arbitrary web script or HTML via the pid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.packetstormsecurity.com/1001-exploits/punbb13-xss.txt - http://www.securityfocus.com/bid/37930 - https://exchange.xforce.ibmcloud.com/vulnerabilities/55853 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7096.
CVE ID: CVE-2014-7096 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2435.
CVE ID: CVE-2019-2435 Date Updated: 2024-10-02T16:18:27.879Z Date Published: 2019-01-16T19:00:00 Description: Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/Python). Supported versions that are affected are 8.0.13 and prior and 2.1.8 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via TLS to compromise MySQL Connectors. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Connectors accessible data as well as unauthorized access to critical data or complete access to all MySQL Connectors accessible data. CVSS 3.0 Base Score 8.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/106616 - http://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html - https://security.netapp.com/advisory/ntap-20190118-0002/ - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00044.html - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00053.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0696.
CVE ID: CVE-2019-0696 Date Updated: 2024-08-04T17:51:27.057Z Date Published: 2019-04-08T23:13:31 Description: An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0696 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7612.
CVE ID: CVE-2014-7612 Date Updated: 2024-08-06T12:56:11.981Z Date Published: 2014-10-20T10:00:00 Description: The e-Kiosk (aka com.ekioskreader.android.pdfviewer) application 1.74 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/176289 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47352.
CVE ID: CVE-2021-47352 Date Updated: 2024-09-11T17:33:48.464Z Date Published: 2024-05-21T14:35:56.473Z Description: In the Linux kernel, the following vulnerability has been resolved: virtio-net: Add validation for used length This adds validation for used length (might come from an untrusted device) to avoid data corruption or loss. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/c92298d228f61589dd21657af2bea95fc866b813 - https://git.kernel.org/stable/c/3133e01514c3c498f2b01ff210ee6134b70c663c - https://git.kernel.org/stable/c/ba710baa1cc1b17a0483f7befe03e696efd17292 - https://git.kernel.org/stable/c/ad993a95c508417acdeb15244109e009e50d8758 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-39941.
CVE ID: CVE-2023-39941 Date Updated: 2024-08-09T18:51:50.165Z Date Published: 2024-02-14T13:38:16.495Z Description: Improper access control in some Intel(R) SUR software before version 2.4.10587 may allow an unauthenticated user to potentially enable denial of service via adjacent access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00998.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27848.
CVE ID: CVE-2024-27848 Date Updated: 2024-08-02T00:41:55.731Z Date Published: 2024-06-10T20:56:35.117Z Description: This issue was addressed with improved permissions checking. This issue is fixed in macOS Sonoma 14.5, iOS 17.5 and iPadOS 17.5. A malicious app may be able to gain root privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT214101 - https://support.apple.com/en-us/HT214106 - https://support.apple.com/kb/HT214106 - https://support.apple.com/kb/HT214101 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3430.
CVE ID: CVE-2010-3430 Date Updated: 2024-08-07T03:11:44.189Z Date Published: 2011-01-24T17:00:00 Description: The privilege-dropping implementation in the (1) pam_env and (2) pam_mail modules in Linux-PAM (aka pam) 1.1.2 does not perform the required setfsgid and setgroups system calls, which might allow local users to obtain sensitive information by leveraging unintended group permissions, as demonstrated by a symlink attack on the .pam_environment file in a user's home directory. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-3435. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://openwall.com/lists/oss-security/2010/09/27/5 - http://openwall.com/lists/oss-security/2010/09/21/3 - http://security.gentoo.org/glsa/glsa-201206-31.xml - http://openwall.com/lists/oss-security/2010/10/03/1 - http://www.openwall.com/lists/oss-security/2010/09/24/2 - http://openwall.com/lists/oss-security/2010/09/21/9 - http://openwall.com/lists/oss-security/2010/09/21/8 - http://openwall.com/lists/oss-security/2010/09/27/10 - http://git.altlinux.org/people/ldv/packages/?p=pam.git%3Ba=commit%3Bh=843807a3a90f52e7538be756616510730a24739a - http://openwall.com/lists/oss-security/2010/09/27/4 - http://openwall.com/lists/oss-security/2010/09/21/10 - http://secunia.com/advisories/49711 - https://bugzilla.redhat.com/show_bug.cgi?id=641361 - http://openwall.com/lists/oss-security/2010/09/27/7 - http://openwall.com/lists/oss-security/2010/10/25/2 - http://www.openwall.com/lists/oss-security/2010/09/21/11 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1505.
CVE ID: CVE-2011-1505 Date Updated: 2024-08-06T22:28:41.775Z Date Published: 2011-03-22T17:00:00 Description: Unspecified vulnerability in IBM Lotus Quickr 8.1 before 8.1.0.27 services for Lotus Domino has unknown impact and attack vectors, aka SPR ESEO8DQME2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/66142 - http://secunia.com/advisories/43689 - http://www.ibm.com/support/docview.wss?uid=swg1LO58209 - http://www.securityfocus.com/bid/46903 - http://securitytracker.com/id?1025228 - http://www.vupen.com/english/advisories/2011/0707 - http://www-01.ibm.com/support/docview.wss?uid=swg27013341 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6398.
CVE ID: CVE-2008-6398 Date Updated: 2024-08-07T11:27:35.806Z Date Published: 2009-03-04T17:00:00 Description: sng_regress in SNG 1.0.2 allows local users to overwrite arbitrary files via a symlink attack on the (1) /tmp/recompiled$$.png, (2) /tmp/decompiled$$.sng, and (3) /tmp/canonicalized$$.sng temporary files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/44881 - http://lists.debian.org/debian-devel/2008/08/msg00283.html - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=496407 - http://www.securityfocus.com/bid/30965 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11043.
CVE ID: CVE-2018-11043 Date Updated: 2018-10-02T13:57:01 Date Published: 2018-10-02T14:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-28093.
CVE ID: CVE-2024-28093 Date Updated: 2024-09-04T16:34:11.488Z Date Published: 2024-03-26T00:00:00 Description: **UNSUPPORTED WHEN ASSIGNED** The TELNET service of AdTran NetVanta 3120 18.01.01.00.E devices is enabled by default, and has default credentials for a root-level account. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/actuator/cve/blob/main/AdTran/CWE-287 - https://github.com/actuator/cve/blob/main/AdTran/CVE-2024-28093 - https://supportcommunity.adtran.com/t5/NetVanta-Product-Notices/2019-Q2-NetVanta-3120-3130-EOL/ta-p/35715 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-7946.
CVE ID: CVE-2016-7946 Date Updated: 2024-08-06T02:13:21.322Z Date Published: 2016-12-13T20:00:00 Description: X.org libXi before 1.7.7 allows remote X servers to cause a denial of service (infinite loop) via vectors involving length fields. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/C3NTWIWSQ575GREBVAOUQUIMDL5CDVGP/ - http://www.securitytracker.com/id/1036945 - https://security.gentoo.org/glsa/201704-03 - https://cgit.freedesktop.org/xorg/lib/libXi/commit/?id=19a9cd607de73947fcfb104682f203ffe4e1f4e5 - https://lists.x.org/archives/xorg-announce/2016-October/002720.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KVTZ2XLPKLASQUIQA2GMKKAUOQIUMM7I/ - http://www.openwall.com/lists/oss-security/2016/10/04/4 - http://www.securityfocus.com/bid/93374 - http://www.openwall.com/lists/oss-security/2016/10/04/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42987.
CVE ID: CVE-2024-42987 Date Updated: 2024-09-03T17:29:43.534Z Date Published: 2024-08-15T00:00:00 Description: Tenda FH1206 v02.03.01.35 was discovered to contain a stack overflow via the modino parameter in the fromPptpUserAdd function. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/TTTJJJWWW/AHU-IoT-vulnerable/blob/main/Tenda/FH1206/fromPptpUserAdd.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48655.
CVE ID: CVE-2023-48655 Date Updated: 2024-08-02T21:37:53.577Z Date Published: 2023-11-17T00:00:00 Description: An issue was discovered in MISP before 2.4.176. app/Controller/Component/IndexFilterComponent.php does not properly filter out query parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/MISP/MISP/compare/v2.4.175...v2.4.176 - https://github.com/MISP/MISP/commit/158c8b2f788b75e0d26e9249a75e1be291e59d4b - https://zigrin.com/advisories/misp-blind-sql-injection-in-array-input-parameters/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27476.
CVE ID: CVE-2023-27476 Date Updated: 2024-08-02T12:09:43.480Z Date Published: 2023-03-07T23:20:32.878Z Description: OWSLib is a Python package for client programming with Open Geospatial Consortium (OGC) web service interface standards, and their related content models. OWSLib's XML parser (which supports both `lxml` and `xml.etree`) does not disable entity resolution, and could lead to arbitrary file reads from an attacker-controlled XML payload. This affects all XML parsing in the codebase. This issue has been addressed in version 0.28.1. All users are advised to upgrade. The only known workaround is to patch the library manually. See `GHSA-8h9c-r582-mggc` for details. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/geopython/OWSLib/security/advisories/GHSA-8h9c-r582-mggc - https://github.com/geopython/OWSLib/pull/863/commits/b92687702be9576c0681bb11cad21eb631b9122f - https://securitylab.github.com/advisories/GHSL-2022-131_owslib/ - https://www.debian.org/security/2023/dsa-5426 - https://lists.debian.org/debian-lts-announce/2023/06/msg00032.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3925.
CVE ID: CVE-2011-3925 Date Updated: 2024-08-06T23:53:32.219Z Date Published: 2012-01-24T02:00:00 Description: Use-after-free vulnerability in the Safe Browsing feature in Google Chrome before 16.0.912.75 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via vectors related to a navigation entry and an interstitial page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://googlechromereleases.blogspot.com/2012/01/stable-channel-update_23.html - http://code.google.com/p/chromium/issues/detail?id=107182 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14538 - http://www.securitytracker.com/id?1026487 - http://secunia.com/advisories/47449 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11289.
CVE ID: CVE-2017-11289 Date Updated: 2024-08-05T18:05:29.936Z Date Published: 2017-12-09T06:00:00 Description: An issue was discovered in Adobe Connect 9.6.2 and earlier versions. A reflected cross-site scripting vulnerability exists that can result in information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/connect/apsb17-35.html - http://www.securitytracker.com/id/1039799 - http://www.securityfocus.com/bid/101838 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-26678.
CVE ID: CVE-2020-26678 Date Updated: 2024-08-04T15:56:05.035Z Date Published: 2021-05-26T11:50:40 Description: vFairs 3.3 is affected by Remote Code Execution. Any user logged in to a vFairs virtual conference or event can abuse the functionality to upload a profile picture in order to place a malicious PHP file on the server and gain code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://vfairs.com - https://api.vfairs.com/v1/profiles - https://www.huntress.com/blog/zero-day-vulnerabilities-in-popular-event-management-platforms-could-leave-msps-open-to-attack No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-20583.
CVE ID: CVE-2020-20583 Date Updated: 2024-08-04T14:22:25.159Z Date Published: 2021-07-08T15:44:28 Description: A SQL injection vulnerability in /question.php of LJCMS Version v4.3.R60321 allows attackers to obtain sensitive database information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/0xyu/PHP_Learning/issues/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15357.
CVE ID: CVE-2019-15357 Date Updated: 2024-08-05T00:42:03.769Z Date Published: 2019-11-14T16:25:00 Description: The Advan i6A Android device with a build fingerprint of ADVAN/i6A/i6A:8.1.0/O11019/1523602705:userdebug/test-keys contains a pre-installed app with a package name of com.mediatek.wfo.impl app (versionCode=27, versionName=8.1.0) that allows any app co-located on the device to modify a system property through an exported interface without proper authorization. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kryptowire.com/android-firmware-2019/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6861.
CVE ID: CVE-2014-6861 Date Updated: 2024-08-06T12:31:47.005Z Date Published: 2014-10-02T10:00:00 Description: The Terrarienbilder.com Forum (aka com.tapatalk.terrarienbildercomvb) application 3.8.20 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/901585 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-7098.
CVE ID: CVE-2015-7098 Date Updated: 2024-08-06T07:43:44.388Z Date Published: 2015-12-11T11:00:00 Description: WebKit in Apple iOS before 9.2, Safari before 9.0.2, and tvOS before 9.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than CVE-2015-7048, CVE-2015-7095, CVE-2015-7096, CVE-2015-7097, CVE-2015-7099, CVE-2015-7100, CVE-2015-7101, CVE-2015-7102, and CVE-2015-7103. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/HT205635 - http://www.securityfocus.com/bid/78720 - https://support.apple.com/kb/HT205636 - http://lists.opensuse.org/opensuse-updates/2016-03/msg00054.html - http://lists.apple.com/archives/security-announce/2015/Dec/msg00003.html - https://security.gentoo.org/glsa/201706-15 - http://lists.apple.com/archives/security-announce/2015/Dec/msg00000.html - https://support.apple.com/HT205639 - https://support.apple.com/HT205640 - http://www.securitytracker.com/id/1034341 - http://lists.apple.com/archives/security-announce/2015/Dec/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48509.
CVE ID: CVE-2023-48509 Date Updated: 2024-08-02T21:30:35.447Z Date Published: 2023-12-15T10:15:31.046Z Description: Adobe Experience Manager versions 6.5.18 and earlier are affected by a Cross-site Scripting (DOM-based XSS) vulnerability. If a low-privileged attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/experience-manager/apsb23-72.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9675.
CVE ID: CVE-2016-9675 Date Updated: 2024-08-06T02:59:03.268Z Date Published: 2016-12-22T21:00:00 Description: openjpeg: A heap-based buffer overflow flaw was found in the patch for CVE-2013-6045. A crafted j2k image could cause the application to crash, or potentially execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2016/11/29/7 - http://www.securityfocus.com/bid/94589 - http://rhn.redhat.com/errata/RHSA-2017-0559.html - http://rhn.redhat.com/errata/RHSA-2017-0838.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-6002.
CVE ID: CVE-2019-6002 Date Updated: 2024-08-04T20:09:24.032Z Date Published: 2019-07-26T13:25:39 Description: Cross-site scripting vulnerability in Central Dogma 0.17.0 to 0.40.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/line/centraldogma/releases/tag/centraldogma-0.41.0 - http://jvn.jp/en/jp/JVN94889214/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-2737.
CVE ID: CVE-2013-2737 Date Updated: 2024-08-06T15:44:33.577Z Date Published: 2013-05-16T10:00:00 Description: A JavaScript API in Adobe Reader and Acrobat 9.x before 9.5.5, 10.x before 10.1.7, and 11.x before 11.0.03 allows attackers to obtain sensitive information via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.adobe.com/support/security/bulletins/apsb13-15.html - http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00004.html - http://rhn.redhat.com/errata/RHSA-2013-0826.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16864 - http://security.gentoo.org/glsa/glsa-201308-03.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2197.
CVE ID: CVE-2012-2197 Date Updated: 2024-08-06T19:26:09.025Z Date Published: 2012-07-25T10:00:00 Description: Stack-based buffer overflow in the Java Stored Procedure infrastructure in IBM DB2 9.1 before FP12, 9.5 through FP9, 9.7 through FP6, 9.8 through FP5, and 10.1 allows remote authenticated users to execute arbitrary code by leveraging certain CONNECT and EXECUTE privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84753 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84754 - http://secunia.com/advisories/49919 - http://www.securityfocus.com/bid/54487 - http://www-01.ibm.com/support/docview.wss?uid=swg21600837 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84755 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84555 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC84752 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6584.
CVE ID: CVE-2015-6584 Date Updated: 2024-08-06T07:22:22.250Z Date Published: 2015-09-11T15:00:00 Description: Cross-site scripting (XSS) vulnerability in the DataTables plugin 1.10.8 and earlier for jQuery allows remote attackers to inject arbitrary web script or HTML via the scripts parameter to media/unit_testing/templates/6776.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/133555/DataTables-1.10.8-Cross-Site-Scripting.html - http://www.securityfocus.com/archive/1/536437/100/0/threaded - https://www.netsparker.com/cve-2015-6384-xss-vulnerability-identified-in-datatables/ - http://seclists.org/fulldisclosure/2015/Sep/37 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3670.
CVE ID: CVE-2012-3670 Date Updated: 2024-08-06T20:13:51.581Z Date Published: 2012-07-25T20:00:00 Description: WebKit, as used in Apple Safari before 6.0, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2012-07-25-1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://support.apple.com/kb/HT5485 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00003.html - http://support.apple.com/kb/HT5503 - http://lists.apple.com/archives/security-announce/2012/Sep/msg00001.html - http://lists.apple.com/archives/security-announce/2012/Jul/msg00000.html - http://support.apple.com/kb/HT5400 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9575.
CVE ID: CVE-2014-9575 Date Updated: 2024-09-16T20:41:58.915Z Date Published: 2015-01-08T15:00:00Z Description: VDG Security SENSE (formerly DIVA) before 2.3.15 allows remote attackers to bypass authentication, and consequently read and modify arbitrary plugin settings, via an encoded : (colon) character in the Authorization HTTP header. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2014/Dec/76 - https://vdgsecurity.com/downloads/software/?file=1.+DIVA+2.3%2F2.+Changelog+2.3.16.txt - http://packetstormsecurity.com/files/129656/VDG-Security-SENSE-2.3.13-File-Disclosure-Bypass-Buffer-Overflow.html - https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20141218-0_VDG_Security_SENSE_Multiple_critical_vulnerabilities_v10.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3491.
CVE ID: CVE-2011-3491 Date Updated: 2024-08-06T23:37:47.655Z Date Published: 2011-09-16T14:00:00 Description: Heap-based buffer overflow in Progea Movicon / PowerHMI 11.2.1085 and earlier allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a negative Content-Length field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://aluigi.altervista.org/adv/movicon_1-adv.txt - http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-256-01.pdf - https://exchange.xforce.ibmcloud.com/vulnerabilities/69787 - http://osvdb.org/75494 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0226.
CVE ID: CVE-2008-0226 Date Updated: 2024-08-07T07:39:35.055Z Date Published: 2008-01-10T23:00:00 Description: Multiple buffer overflows in yaSSL 1.7.5 and earlier, as used in MySQL and possibly other products, allow remote attackers to execute arbitrary code via (1) the ProcessOldClientHello function in handshake.cpp or (2) "input_buffer& operator>>" in yassl_imp.cpp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.debian.org/security/2008/dsa-1478 - http://secunia.com/advisories/29443 - http://www.securityfocus.com/archive/1/485810/100/0/threaded - http://secunia.com/advisories/28324 - http://securityreason.com/securityalert/3531 - http://www.securityfocus.com/bid/31681 - http://bugs.mysql.com/33814 - http://www.securityfocus.com/bid/27140 - http://secunia.com/advisories/28597 - http://www.vupen.com/english/advisories/2008/0560/references - http://secunia.com/advisories/32222 - http://dev.mysql.com/doc/refman/5.1/en/news-5-1-23.html - http://www.securityfocus.com/archive/1/485811/100/0/threaded - http://secunia.com/advisories/28419 - http://www.vupen.com/english/advisories/2008/2780 - http://www.ubuntu.com/usn/usn-588-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:150 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39431 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39429 - http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html - http://support.apple.com/kb/HT3216 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15482.
CVE ID: CVE-2017-15482 Date Updated: 2018-01-23T16:57:02 Date Published: 2018-01-23T17:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32895.
CVE ID: CVE-2021-32895 Date Updated: 2022-12-02T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-15198.
CVE ID: CVE-2017-15198 Date Updated: 2024-09-16T16:54:12.044Z Date Published: 2017-10-10T05:00:00Z Description: In Kanboard before 1.0.47, by altering form data, an authenticated user can edit a category of a private project of another user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/kanboard/kanboard/commit/074f6c104f3e49401ef0065540338fc2d4be79f0 - http://openwall.com/lists/oss-security/2017/10/04/9 - https://kanboard.net/news/version-1.0.47 - https://github.com/kanboard/kanboard/commit/3e0f14ae2b0b5a44bd038a472f17eac75f538524 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47272.
CVE ID: CVE-2021-47272 Date Updated: 2024-09-11T17:33:10.857Z Date Published: 2024-05-21T14:20:01.383Z Description: In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL There exists a possible scenario in which dwc3_gadget_init() can fail: during during host -> peripheral mode switch in dwc3_set_mode(), and a pending gadget driver fails to bind. Then, if the DRD undergoes another mode switch from peripheral->host the resulting dwc3_gadget_exit() will attempt to reference an invalid and dangling dwc->gadget pointer as well as call dma_free_coherent() on unmapped DMA pointers. The exact scenario can be reproduced as follows: - Start DWC3 in peripheral mode - Configure ConfigFS gadget with FunctionFS instance (or use g_ffs) - Run FunctionFS userspace application (open EPs, write descriptors, etc) - Bind gadget driver to DWC3's UDC - Switch DWC3 to host mode => dwc3_gadget_exit() is called. usb_del_gadget() will put the ConfigFS driver instance on the gadget_driver_pending_list - Stop FunctionFS application (closes the ep files) - Switch DWC3 to peripheral mode => dwc3_gadget_init() fails as usb_add_gadget() calls check_pending_gadget_drivers() and attempts to rebind the UDC to the ConfigFS gadget but fails with -19 (-ENODEV) because the FFS instance is not in FFS_ACTIVE state (userspace has not re-opened and written the descriptors yet, i.e. desc_ready!=0). - Switch DWC3 back to host mode => dwc3_gadget_exit() is called again, but this time dwc->gadget is invalid. Although it can be argued that userspace should take responsibility for ensuring that the FunctionFS application be ready prior to allowing the composite driver bind to the UDC, failure to do so should not result in a panic from the kernel driver. Fix this by setting dwc->gadget to NULL in the failure path of dwc3_gadget_init() and add a check to dwc3_gadget_exit() to bail out unless the gadget pointer is valid. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/851dee5a5da56564a70290713aee665403bb0b24 - https://git.kernel.org/stable/c/4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8 - https://git.kernel.org/stable/c/03715ea2e3dbbc56947137ce3b4ac18a726b2f87 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2636.
CVE ID: CVE-2017-2636 Date Updated: 2024-08-05T14:02:06.961Z Date Published: 2017-03-07T22:00:00 Description: Race condition in drivers/tty/n_hdlc.c in the Linux kernel through 4.10.1 allows local users to gain privileges or cause a denial of service (double free) by setting the HDLC line discipline. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2017:0892 - http://www.securityfocus.com/bid/96732 - http://www.securitytracker.com/id/1037963 - https://access.redhat.com/errata/RHSA-2017:0932 - http://www.openwall.com/lists/oss-security/2017/03/07/6 - https://bugzilla.redhat.com/show_bug.cgi?id=1428319 - https://a13xp0p0v.github.io/2017/03/24/CVE-2017-2636.html - https://access.redhat.com/errata/RHSA-2017:1125 - https://access.redhat.com/errata/RHSA-2017:0933 - https://access.redhat.com/errata/RHSA-2017:1232 - https://access.redhat.com/errata/RHSA-2017:0931 - http://www.debian.org/security/2017/dsa-3804 - https://access.redhat.com/errata/RHSA-2017:1233 - https://access.redhat.com/errata/RHSA-2017:1488 - https://access.redhat.com/errata/RHSA-2017:0986 - https://access.redhat.com/errata/RHSA-2017:1126 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22345.
CVE ID: CVE-2020-22345 Date Updated: 2024-08-04T14:51:10.514Z Date Published: 2021-08-18T20:21:28 Description: /graphStatus/displayServiceStatus.php in Centreon 19.10.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in the RRDdatabase_path parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://engindemirbilek.github.io/centreon-19.10-rce - https://github.com/centreon/centreon/pull/8467#event-3163627607 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-3683.
CVE ID: CVE-2023-3683 Date Updated: 2024-08-02T07:01:57.332Z Date Published: 2023-07-16T08:00:05.329Z Description: A vulnerability has been found in LivelyWorks Articart 2.0.1 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /items/search. The manipulation of the argument search_term leads to cross site scripting. The attack can be launched remotely. The identifier VDB-234229 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.234229 - https://vuldb.com/?ctiid.234229 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2013-0625
CVE-CVE-2013-0625 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2013 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2024-28929.
CVE ID: CVE-2024-28929 Date Updated: 2024-08-02T01:03:51.116Z Date Published: 2024-04-09T17:00:27.042Z Description: Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-28929 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20681.
CVE ID: CVE-2019-20681 Date Updated: 2024-08-05T02:46:10.330Z Date Published: 2020-04-15T19:54:16 Description: Certain NETGEAR devices are affected by authentication bypass. This affects D6200 before 1.1.00.34, D7000 before 1.0.1.68, JR6150 before 1.0.1.18, PR2000 before 1.0.0.28, R6050 before 1.0.1.18, R6120 before 1.0.0.46, R6220 before 1.1.0.80, R6260 before 1.1.0.64, R6700v2 before 1.2.0.36, R6800 before 1.2.0.36, and R6900v2 before 1.2.0.36. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000061458/Security-Advisory-for-Authentication-Bypass-on-Some-Routers-and-Gateways-PSV-2018-0346 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34384.
CVE ID: CVE-2021-34384 Date Updated: 2024-08-04T00:12:49.913Z Date Published: 2021-06-30T10:24:37 Description: Bootloader contains a vulnerability in NVIDIA MB2 where a potential heap overflow could cause memory corruption, which might lead to denial of service or code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42530.
CVE ID: CVE-2021-42530 Date Updated: 2024-09-16T23:36:21.214Z Date Published: 2022-05-02T22:24:11.866903Z Description: XMP Toolkit SDK version 2021.07 (and earlier) is affected by a stack-based buffer overflow vulnerability potentially resulting in arbitrary code execution in the context of the current user. Exploitation requires user interaction in that a victim must open a crafted file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/xmpcore/apsb21-108.html - https://lists.debian.org/debian-lts-announce/2023/09/msg00032.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1002201.
CVE ID: CVE-2018-1002201 Date Updated: 2024-09-16T19:14:30.301Z Date Published: 2018-07-25T17:00:00Z Description: zt-zip before 1.13 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in a Zip archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/research/zip-slip-vulnerability - https://github.com/snyk/zip-slip-vulnerability - https://snyk.io/vuln/SNYK-JAVA-ORGZEROTURNAROUND-31681 - https://github.com/zeroturnaround/zt-zip/blob/zt-zip-1.13/Changelog.txt - https://github.com/zeroturnaround/zt-zip/commit/759b72f33bc8f4d69f84f09fcb7f010ad45d6fff No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0992.
CVE ID: CVE-2008-0992 Date Updated: 2024-08-07T08:01:40.244Z Date Published: 2008-03-18T23:00:00 Description: Array index error in pax in Apple Mac OS X 10.5.2 allows context-dependent attackers to execute arbitrary code via an archive with a crafted length value. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1019673 - http://www.securityfocus.com/bid/28304 - http://www.securityfocus.com/bid/28365 - http://www.us-cert.gov/cas/techalerts/TA08-079A.html - http://www.vupen.com/english/advisories/2008/0924/references - http://secunia.com/advisories/29420 - http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html - http://docs.info.apple.com/article.html?artnum=307562 - https://exchange.xforce.ibmcloud.com/vulnerabilities/41288 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11510.
CVE ID: CVE-2019-11510 Date Updated: 2024-08-04T22:55:40.694Z Date Published: 2019-05-08T16:18:28 Description: In Pulse Secure Pulse Connect Secure (PCS) 8.2 before 8.2R12.1, 8.3 before 8.3R7.1, and 9.0 before 9.0R3.4, an unauthenticated remote attacker can send a specially crafted URI to perform an arbitrary file reading vulnerability . No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.pulsesecure.net/?atype=sa - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101/ - http://www.securityfocus.com/bid/108073 - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2019-0010 - http://packetstormsecurity.com/files/154176/Pulse-Secure-SSL-VPN-8.1R15.1-8.2-8.3-9.0-Arbitrary-File-Disclosure.html - https://badpackets.net/over-14500-pulse-secure-vpn-endpoints-vulnerable-to-cve-2019-11510/ - http://packetstormsecurity.com/files/154231/Pulse-Secure-SSL-VPN-File-Disclosure-NSE.html - https://i.blackhat.com/USA-19/Wednesday/us-19-Tsai-Infiltrating-Corporate-Intranet-Like-NSA.pdf - https://devco.re/blog/2019/09/02/attacking-ssl-vpn-part-3-the-golden-Pulse-Secure-ssl-vpn-rce-chain-with-Twitter-as-case-study/ - https://lists.apache.org/thread.html/ff5fa1837b6bd1b24d18a42faa75e165a4573dbe2d434910c15fd08a%40%3Cuser.guacamole.apache.org%3E - https://www.kb.cert.org/vuls/id/927237 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.