instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2009-5095.
CVE ID: CVE-2009-5095 Date Updated: 2024-08-07T07:24:54.120Z Date Published: 2011-09-09T23:00:00 Description: PHP remote file inclusion vulnerability in index_inc.php in ea gBook 0.1 and 0.1.4 allows remote attackers to execute arbitrary PHP code via a URL in the inc_ordner parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/33774 - https://exchange.xforce.ibmcloud.com/vulnerabilities/48759 - http://www.exploit-db.com/exploits/8052 - http://secunia.com/advisories/33927 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2846.
CVE ID: CVE-2010-2846 Date Updated: 2024-08-07T02:46:48.174Z Date Published: 2010-07-23T20:00:00 Description: Cross-site scripting (XSS) vulnerability in the InterJoomla ArtForms (com_artforms) component 2.1b7.2 RC2 for Joomla! allows remote attackers to inject arbitrary web script or HTML via the afmsg parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/41457 - http://www.securityfocus.com/archive/1/512215/100/0/threaded - http://www.exploit-db.com/exploits/14263 - http://packetstormsecurity.org/1007-exploits/joomlaartforms-sqltraversalxss.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/60162 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22332.
CVE ID: CVE-2021-22332 Date Updated: 2024-08-03T18:37:18.495Z Date Published: 2021-04-28T12:10:28 Description: There is a pointer double free vulnerability in some versions of CloudEngine 5800, CloudEngine 6800, CloudEngine 7800 and CloudEngine 12800. When a function is called, the same memory pointer is copied to two functional modules. Attackers can exploit this vulnerability by performing a malicious operation to cause the pointer double free. This may lead to module crash, compromising normal service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.huawei.com/en/psirt/security-advisories/huawei-sa-20210407-01-doublefree-en No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-25711.
CVE ID: CVE-2024-25711 Date Updated: 2024-08-01T23:52:05.644Z Date Published: 2024-02-11T00:00:00 Description: diffoscope before 256 allows directory traversal via an embedded filename in a GPG file. Contents of any file, such as ../.ssh/id_rsa, may be disclosed to an attacker. This occurs because the value of the gpg --use-embedded-filenames option is trusted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://salsa.debian.org/reproducible-builds/diffoscope/-/issues/361 - https://salsa.debian.org/reproducible-builds/diffoscope/-/commit/dfed769904c27d66a14a5903823d9c8c5aae860e - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OUNBANAWD6TZH2NRRV4YUIAXEHLUJQ47/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7826.
CVE ID: CVE-2017-7826 Date Updated: 2024-08-05T16:12:28.321Z Date Published: 2018-06-11T21:00:00 Description: Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2017/12/msg00001.html - https://www.debian.org/security/2017/dsa-4035 - https://www.mozilla.org/security/advisories/mfsa2017-24/ - https://www.mozilla.org/security/advisories/mfsa2017-25/ - http://www.securityfocus.com/bid/101832 - https://www.mozilla.org/security/advisories/mfsa2017-26/ - https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804 - http://www.securitytracker.com/id/1039803 - https://www.debian.org/security/2017/dsa-4061 - https://lists.debian.org/debian-lts-announce/2017/11/msg00018.html - https://access.redhat.com/errata/RHSA-2017:3247 - https://www.debian.org/security/2017/dsa-4075 - https://usn.ubuntu.com/3688-1/ - https://access.redhat.com/errata/RHSA-2017:3372 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39371.
CVE ID: CVE-2021-39371 Date Updated: 2024-08-04T02:06:42.375Z Date Published: 2021-08-23T00:03:20 Description: An XML external entity (XXE) injection in PyWPS before 4.4.5 allows an attacker to view files on the application server filesystem by assigning a path to the entity. OWSLib 0.24.1 may also be affected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/geopython/pywps/pull/616 - https://github.com/geopython/OWSLib/issues/790 - https://lists.debian.org/debian-lts-announce/2021/09/msg00001.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-28117.
CVE ID: CVE-2021-28117 Date Updated: 2024-08-03T21:33:17.399Z Date Published: 2021-03-20T00:00:00 Description: libdiscover/backends/KNSBackend/KNSResource.cpp in KDE Discover before 5.21.3 automatically creates links to potentially dangerous URLs (that are neither https:// nor http://) based on the content of the store.kde.org web site. (5.18.7 is also a fixed version.) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://userbase.kde.org/Discover - https://github.com/KDE/discover/releases - https://kde.org/info/security/advisory-20210310-1.txt - https://invent.kde.org/plasma/discover/commit/94478827aab63d2e2321f0ca9ec5553718798e60 - https://github.com/KDE/discover/commit/fcd3b30552bf03a384b1a16f9bb8db029c111356 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10027.
CVE ID: CVE-2020-10027 Date Updated: 2024-09-16T20:52:35.670Z Date Published: 2020-05-11T22:26:14.923233Z Description: An attacker who has obtained code execution within a user thread is able to elevate privileges to that of the kernel. See NCC-ZEP-001 This issue affects: zephyrproject-rtos zephyr version 1.14.0 and later versions. version 2.1.0 and later versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://zephyrprojectsec.atlassian.net/browse/ZEPSEC-35 - https://github.com/zephyrproject-rtos/zephyr/pull/23328 - https://github.com/zephyrproject-rtos/zephyr/pull/23500 - https://github.com/zephyrproject-rtos/zephyr/pull/23499 - https://docs.zephyrproject.org/latest/security/vulnerabilities.html#cve-2020-10027 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47585.
CVE ID: CVE-2021-47585 Date Updated: 2024-08-04T05:39:59.778Z Date Published: 2024-06-19T14:53:50.780Z Description: In the Linux kernel, the following vulnerability has been resolved: btrfs: fix memory leak in __add_inode_ref() Line 1169 (#3) allocates a memory chunk for victim_name by kmalloc(), but when the function returns in line 1184 (#4) victim_name allocated by line 1169 (#3) is not freed, which will lead to a memory leak. There is a similar snippet of code in this function as allocating a memory chunk for victim_name in line 1104 (#1) as well as releasing the memory in line 1116 (#2). We should kfree() victim_name when the return value of backref_in_log() is less than zero and before the function returns in line 1184 (#4). 1057 static inline int __add_inode_ref(struct btrfs_trans_handle *trans, 1058 struct btrfs_root *root, 1059 struct btrfs_path *path, 1060 struct btrfs_root *log_root, 1061 struct btrfs_inode *dir, 1062 struct btrfs_inode *inode, 1063 u64 inode_objectid, u64 parent_objectid, 1064 u64 ref_index, char *name, int namelen, 1065 int *search_done) 1066 { 1104 victim_name = kmalloc(victim_name_len, GFP_NOFS); // #1: kmalloc (victim_name-1) 1105 if (!victim_name) 1106 return -ENOMEM; 1112 ret = backref_in_log(log_root, &search_key, 1113 parent_objectid, victim_name, 1114 victim_name_len); 1115 if (ret < 0) { 1116 kfree(victim_name); // #2: kfree (victim_name-1) 1117 return ret; 1118 } else if (!ret) { 1169 victim_name = kmalloc(victim_name_len, GFP_NOFS); // #3: kmalloc (victim_name-2) 1170 if (!victim_name) 1171 return -ENOMEM; 1180 ret = backref_in_log(log_root, &search_key, 1181 parent_objectid, victim_name, 1182 victim_name_len); 1183 if (ret < 0) { 1184 return ret; // #4: missing kfree (victim_name-2) 1185 } else if (!ret) { 1241 return 0; 1242 } No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/005d9292b5b2e71a009f911bd85d755009b37242 - https://git.kernel.org/stable/c/493ff661d434d6bdf02e3a21adae04d7a0b4265d - https://git.kernel.org/stable/c/f35838a6930296fc1988764cfa54cb3f705c0665 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2871.
CVE ID: CVE-2009-2871 Date Updated: 2024-08-07T06:07:37.186Z Date Published: 2009-09-28T18:20:00 Description: Unspecified vulnerability in Cisco IOS 12.2 and 12.4, when SSLVPN sessions, SSH sessions, or IKE encrypted nonces are enabled, allows remote attackers to cause a denial of service (device reload) via a crafted encrypted packet, aka Bug ID CSCsq24002. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.cisco.com/en/US/products/products_security_advisory09186a0080af811c.shtml - http://www.securitytracker.com/id?1022930 - http://www.vupen.com/english/advisories/2009/2759 - http://tools.cisco.com/security/center/viewAlert.x?alertId=18892 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2367.
CVE ID: CVE-2015-2367 Date Updated: 2024-08-06T05:10:16.218Z Date Published: 2015-07-14T22:00:00 Description: win32k.sys in the kernel-mode drivers in Microsoft Windows Server 2003 SP2 and R2 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows local users to obtain sensitive information from uninitialized kernel memory via a crafted application, aka "Win32k Information Disclosure Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-073 - http://www.securitytracker.com/id/1032904 - http://www.zerodayinitiative.com/advisories/ZDI-15-536 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38678.
CVE ID: CVE-2023-38678 Date Updated: 2024-08-02T17:46:56.474Z Date Published: 2024-01-03T08:11:55.859Z Description: OOB access in paddle.mode in PaddlePaddle before 2.6.0. This flaw can cause a runtime crash and a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PaddlePaddle/Paddle/blob/develop/security/advisory/pdsa-2023-010.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17549.
CVE ID: CVE-2019-17549 Date Updated: 2024-08-05T01:40:15.982Z Date Published: 2020-03-03T14:25:02 Description: ESET Cyber Security before 6.8.1.0 is vulnerable to a denial-of-service allowing any user to stop (kill) ESET processes. An attacker can abuse this bug to stop the protection from ESET and launch his attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://danishcyberdefence.dk/blog/esets-cyber-security No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-39421.
CVE ID: CVE-2021-39421 Date Updated: 2024-08-04T02:06:42.633Z Date Published: 2023-07-24T00:00:00 Description: A cross-site scripting (XSS) vulnerability in SeedDMS v6.0.15 allows attackers to execute arbitrary web scripts or HTML via a crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%40rohitgautam26/cve-2021-39421-76fa68817cd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1344.
CVE ID: CVE-2011-1344 Date Updated: 2024-08-06T22:21:34.205Z Date Published: 2011-03-10T20:00:00 Description: Use-after-free vulnerability in WebKit, as used in Apple Safari before 5.0.5; iOS before 4.3.2 for iPhone, iPod, and iPad; iOS before 4.2.7 for iPhone 4 (CDMA); and possibly other products allows remote attackers to execute arbitrary code by adding children to a WBR tag and then removing the tag, related to text nodes, as demonstrated by Chaouki Bekrar during a Pwn2Own competition at CanSecWest 2011. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/44151 - http://www.securityfocus.com/archive/1/517517/100/0/threaded - http://twitter.com/aaronportnoy/statuses/45632544967901187 - http://www.securityfocus.com/bid/46822 - http://support.apple.com/kb/HT4596 - http://lists.apple.com/archives/security-announce/2011//Apr/msg00002.html - http://www.securitytracker.com/id?1025363 - http://lists.apple.com/archives/security-announce/2011//Apr/msg00001.html - http://www.zerodayinitiative.com/advisories/ZDI-11-135 - http://www.vupen.com/english/advisories/2011/0984 - http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011 - http://www.securityfocus.com/archive/1/517505/100/0/threaded - http://support.apple.com/kb/HT4607 - https://exchange.xforce.ibmcloud.com/vulnerabilities/66061 - http://www.zdnet.com/blog/security/safarimacbook-first-to-fall-at-pwn2own-2011/8358 - http://www.computerworld.com/s/article/9214002/Safari_IE_hacked_first_at_Pwn2Own - http://lists.apple.com/archives/security-announce/2011//Apr/msg00000.html - http://secunia.com/advisories/44154 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2956.
CVE ID: CVE-2008-2956 Date Updated: 2024-08-07T09:21:34.476Z Date Published: 2008-07-01T00:00:00 Description: Memory leak in Pidgin 2.0.0, and possibly other versions, allows remote attackers to cause a denial of service (memory consumption) via malformed XML documents. NOTE: this issue has been disputed by the upstream vendor, who states: "I was never able to identify a scenario under which a problem occurred and the original reporter wasn't able to supply any sort of reproduction details." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/29985 - http://www.openwall.com/lists/oss-security/2008/06/27/3 - http://secunia.com/advisories/31387 - http://www.securityfocus.com/archive/1/495165/100/0/threaded - http://crisp.cs.du.edu/?q=ca2007-1 - http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0246 - https://issues.rpath.com/browse/RPL-2647 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7527.
CVE ID: CVE-2014-7527 Date Updated: 2024-08-06T12:56:10.433Z Date Published: 2014-10-20T10:00:00 Description: The Savage Nation Mobile Web (aka com.wSavageNation) application 0.57.13354.63350 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/726289 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29613.
CVE ID: CVE-2022-29613 Date Updated: 2024-08-03T06:26:06.562Z Date Published: 2022-05-11T14:57:56 Description: Due to insufficient input validation, SAP Employee Self Service allows an authenticated attacker with user privileges to alter employee number. On successful exploitation, the attacker can view personal details of other users causing a limited impact on confidentiality of the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - https://launchpad.support.sap.com/#/notes/3164677 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40553.
CVE ID: CVE-2022-40553 Date Updated: 2023-03-27T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6314.
CVE ID: CVE-2013-6314 Date Updated: 2024-08-06T17:39:01.118Z Date Published: 2014-03-06T11:00:00 Description: Cross-site scripting (XSS) vulnerability in IBM InfoSphere Enterprise Records 4.5.1 before 4.5.1.7-IER-IF001 and Enterprise Records 5.1.1 before 5.1.1.1-IER-IF003 allows remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/88595 - http://www.securityfocus.com/bid/65922 - http://www-01.ibm.com/support/docview.wss?uid=swg21662911 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41645.
CVE ID: CVE-2022-41645 Date Updated: 2024-08-03T12:49:43.359Z Date Published: 2023-01-03T00:00:00 Description: Out-of-bounds read vulnerability in V-Server v4.0.12.0 and earlier allows a local attacker to obtain the information and/or execute arbitrary code by having a user to open a specially crafted project file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://monitouch.fujielectric.com/site/download-e/03tellus_inf/index.php - https://jvn.jp/en/vu/JVNVU92811888/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33685.
CVE ID: CVE-2022-33685 Date Updated: 2024-08-03T08:09:22.466Z Date Published: 2022-07-11T13:33:16 Description: Unprotected dynamic receiver in Wearable Manager Service prior to SMR Jul-2022 Release 1 allows attacker to launch arbitray activity and access senstive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4216.
CVE ID: CVE-2008-4216 Date Updated: 2024-08-07T10:08:34.970Z Date Published: 2008-11-17T18:00:00 Description: The plug-in interface in WebKit in Apple Safari before 3.2 does not prevent plug-ins from accessing local URLs, which allows remote attackers to obtain sensitive information via vectors that "launch local files." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.apple.com/archives/security-announce//2008/Nov/msg00001.html - http://www.securitytracker.com/id?1021227 - http://secunia.com/advisories/32706 - http://www.securityfocus.com/bid/32291 - http://support.apple.com/kb/HT3298 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2072.
CVE ID: CVE-2008-2072 Date Updated: 2024-08-07T08:49:57.605Z Date Published: 2008-05-05T16:00:00 Description: Cross-site scripting (XSS) vulnerability in index.php in Virtual Design Studio vlbook 1.21 allows remote attackers to inject arbitrary web script or HTML via the l parameter, a different vector than CVE-2006-3260. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityreason.com/securityalert/3854 - http://www.securityfocus.com/archive/1/491519/100/0/threaded - http://secunia.com/advisories/30046 - https://www.exploit-db.com/exploits/5529 - http://www.securityfocus.com/bid/29006 - https://exchange.xforce.ibmcloud.com/vulnerabilities/42126 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0023.
CVE ID: CVE-2014-0023 Date Updated: 2024-08-06T08:58:26.621Z Date Published: 2019-11-15T14:40:12 Description: OpenShift: Install script has temporary file creation vulnerability which can result in arbitrary code execution No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-0023 - https://access.redhat.com/security/cve/cve-2014-0023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1418.
CVE ID: CVE-2010-1418 Date Updated: 2024-08-07T01:21:19.148Z Date Published: 2010-06-11T19:00:00 Description: Cross-site scripting (XSS) vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to inject arbitrary web script or HTML via a FRAME element with a SRC attribute composed of a javascript: sequence preceded by spaces. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - http://support.apple.com/kb/HT4220 - http://www.vupen.com/english/advisories/2010/2722 - http://secunia.com/advisories/43068 - http://www.ubuntu.com/usn/USN-1006-1 - http://secunia.com/advisories/41856 - http://www.vupen.com/english/advisories/2011/0212 - http://support.apple.com/kb/HT4225 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - http://secunia.com/advisories/40196 - http://secunia.com/advisories/40105 - http://www.vupen.com/english/advisories/2010/1373 - http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://secunia.com/advisories/42314 - http://www.vupen.com/english/advisories/2010/1512 - http://www.securityfocus.com/bid/40620 - http://www.vupen.com/english/advisories/2011/0552 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6871 - http://support.apple.com/kb/HT4456 - http://securitytracker.com/id?1024067 - http://support.apple.com/kb/HT4196 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5891.
CVE ID: CVE-2014-5891 Date Updated: 2024-08-06T11:55:50.182Z Date Published: 2014-09-15T14:00:00 Description: The SnipSnap Coupon App (aka com.snipsnap.snipsnapapp) application 1.1.11 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/814553 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3207.
CVE ID: CVE-2020-3207 Date Updated: 2024-09-16T20:32:11.110Z Date Published: 2020-06-03T17:40:40.504552Z Description: A vulnerability in the processing of boot options of specific Cisco IOS XE Software switches could allow an authenticated, local attacker with root shell access to the underlying operating system (OS) to conduct a command injection attack during device boot. This vulnerability is due to insufficient input validation checks while processing boot options. An attacker could exploit this vulnerability by modifying device boot options to execute attacker-provided code. A successful exploit may allow an attacker to bypass the Secure Boot process and execute malicious code on an affected device with root-level privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ngwc-cmdinj-KEwWVWR No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43034.
CVE ID: CVE-2022-43034 Date Updated: 2024-08-03T13:26:02.592Z Date Published: 2022-10-19T00:00:00 Description: An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/axiomatic-systems/Bento4/issues/764 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0553.
CVE ID: CVE-2010-0553 Date Updated: 2024-08-07T00:52:19.371Z Date Published: 2010-02-04T19:00:00 Description: Geo++ GNCASTER 1.4.0.7 and earlier allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a long NMEA data sentence. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://osvdb.org/62012 - https://exchange.xforce.ibmcloud.com/vulnerabilities/55975 - http://www.securityfocus.com/archive/1/509197/100/0/threaded - http://www.redteam-pentesting.de/en/advisories/rt-sa-2010-002/-geo-r-gncaster-insecure-handling-of-nmea-data - http://secunia.com/advisories/38323 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-9177.
CVE ID: CVE-2024-9177 Date Updated: 2024-09-26T14:31:17.228Z Date Published: 2024-09-26T13:54:58.008Z Description: The Themedy Toolbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's themedy_col, themedy_social_link, themedy_alertbox, and themedy_pullleft shortcodes in all versions up to, and including, 1.0.14, and up to, and including 1.0.15 for the plugin's themedy_button shortcode due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/755e0998-0f0d-4259-881d-ed07aecb0b10?source=cve - https://wordpress.org/plugins/themedy-toolbox/#developers - https://plugins.trac.wordpress.org/changeset/3157836/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1537 : Transfer Data to Cloud Account
Name: Transfer Data to Cloud Account ID: T1537 URL: https://attack.mitre.org/techniques/T1537 Platforms: IaaS, SaaS, Google Workspace, Office 365 Kill Chain Phases: Exfiltration Description: Adversaries may exfiltrate data by transferring the data, including through sharing/syncing and creating backups of cloud environments, to another cloud account they control on the same service. A defender who is monitoring for large transfers to outside the cloud environment through normal file transfers or over command and control channels may not be watching for data transfers to another account within the same cloud provider. Such transfers may utilize existing cloud provider APIs and the internal address space of the cloud provider to blend into normal traffic or avoid data transfers over external network interfaces.(Citation: TLDRSec AWS Attacks) Adversaries may also use cloud-native mechanisms to share victim data with adversary-controlled cloud accounts, such as creating anonymous file sharing links or, in Azure, a shared access signature (SAS) URI.(Citation: Microsoft Azure Storage Shared Access Signature) Incidents have been observed where adversaries have created backups of cloud instances and transferred them to separate accounts.(Citation: DOJ GRU Indictment Jul 2018) Data Sources: Cloud Storage: Cloud Storage Modification, Snapshot: Snapshot Creation, Snapshot: Snapshot Modification, Cloud Storage: Cloud Storage Metadata, Snapshot: Snapshot Metadata, Application Log: Application Log Content, Network Traffic: Network Traffic Content, Cloud Storage: Cloud Storage Creation Detection: Monitor account activity for attempts to share data, snapshots, or backups with untrusted or unusual accounts on the same cloud service provider. Monitor for anomalous file transfer activity between accounts and to untrusted VPCs. In AWS, sharing an Elastic Block Store (EBS) snapshot, either with specified users or publicly, generates a ModifySnapshotAttribute event in CloudTrail logs.(Citation: AWS EBS Snapshot Sharing) Similarly, in Azure, creating a Shared Access Signature (SAS) URI for a Virtual Hard Disk (VHS) snapshot generates a "Get Snapshot SAS URL" event in Activity Logs.(Citation: Azure Blob Snapshots)(Citation: Azure Shared Access Signature)
Provide detailed information about CVE-2022-29383.
CVE ID: CVE-2022-29383 Date Updated: 2024-08-03T06:17:55.301Z Date Published: 2022-05-13T12:49:40 Description: NETGEAR ProSafe SSL VPN firmware FVS336Gv2 and FVS336Gv3 was discovered to contain a SQL injection vulnerability via USERDBDomains.Domainname at cgi-bin/platform.cgi. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.netgear.com/about/security/ - https://github.com/badboycxcc/Netgear-ssl-vpn-20211222 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4684.
CVE ID: CVE-2015-4684 Date Updated: 2024-08-06T06:18:12.223Z Date Published: 2017-09-19T19:00:00 Description: Multiple directory traversal vulnerabilities in Polycom RealPresence Resource Manager (aka RPRM) before 8.4 allow (1) remote authenticated users to read arbitrary files via a .. (dot dot) in the Modifier parameter to PlcmRmWeb/FileDownload; or remote authenticated administrators to upload arbitrary files via the (2) Filename or (3) SE_FNAME parameter to PlcmRmWeb/FileUpload or to read and remove arbitrary files via the (4) filePathName parameter in an importSipUriReservations SOAP request to PlcmRmWeb/JUserManager. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/535852/100/0/threaded - http://packetstormsecurity.com/files/132463/Polycom-RealPresence-Resource-Manager-RPRM-Disclosure-Traversal.html - http://seclists.org/fulldisclosure/2015/Jun/81 - https://www.exploit-db.com/exploits/37449/ - http://www.securityfocus.com/bid/75432 - https://support.polycom.com/global/documents/support/documentation/Security_Center_Post_for_RPRM_CVEs.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27305.
CVE ID: CVE-2023-27305 Date Updated: 2024-08-02T12:09:43.445Z Date Published: 2023-11-14T19:04:21.686Z Description: Incorrect default permissions in some Intel(R) Arc(TM) Control software before version 1.73.5335.2 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-01020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6540.
CVE ID: CVE-2012-6540 Date Updated: 2024-08-06T21:28:39.860Z Date Published: 2013-03-14T20:00:00 Description: The do_ip_vs_get_ctl function in net/netfilter/ipvs/ip_vs_ctl.c in the Linux kernel before 3.6 does not initialize a certain structure for IP_VS_SO_GET_TIMEOUT commands, which allows local users to obtain sensitive information from kernel stack memory via a crafted application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/torvalds/linux/commit/2d8a041b7bfe1097af21441cb77d6af95f4f4680 - http://www.openwall.com/lists/oss-security/2013/03/05/13 - http://www.ubuntu.com/usn/USN-1792-1 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=2d8a041b7bfe1097af21441cb77d6af95f4f4680 - https://www.kernel.org/pub/linux/kernel/v3.x/patch-3.6.bz2 - http://www.ubuntu.com/usn/USN-1798-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11629.
CVE ID: CVE-2020-11629 Date Updated: 2024-08-04T11:35:13.395Z Date Published: 2020-04-07T23:34:20 Description: An issue was discovered in EJBCA before 6.15.2.6 and 7.x before 7.3.1.2. The External Command Certificate Validator, which allows administrators to upload external linters to validate certificates, is supposed to save uploaded test certificates to the server. An attacker who has gained access to the CA UI could exploit this to upload malicious scripts to the server. (Risks associated with this issue alone are negligible unless a malicious user already has gained access to the CA UI through other means, as a trusted user is already trusted to upload scripts by virtue of having access to the validator.) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.primekey.com/news/primekey-announcements No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-37408.
CVE ID: CVE-2024-37408 Date Updated: 2024-09-06T18:33:28.803Z Date Published: 2024-06-08T00:00:00 Description: fprintd through 1.94.3 lacks a security attention mechanism, and thus unexpected actions might be authorized by "auth sufficient pam_fprintd.so" for Sudo. NOTE: the supplier disputes this because they believe issue resolution would involve modifying the PAM configuration to restrict pam_fprintd.so to front-ends that implement a proper attention mechanism, not modifying pam_fprintd.so or fprintd. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openwall.com/lists/oss-security/2024/05/30/3 - https://lists.freedesktop.org/archives/fprint/2024-May/001231.html - https://gitlab.freedesktop.org/libfprint/fprintd/-/releases - https://www.openwall.com/lists/oss-security/2024/06/13/2 - http://www.openwall.com/lists/oss-security/2024/06/13/3 - http://www.openwall.com/lists/oss-security/2024/06/14/1 - http://www.openwall.com/lists/oss-security/2024/06/14/2 - http://www.openwall.com/lists/oss-security/2024/06/14/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0166.
CVE ID: CVE-2022-0166 Date Updated: 2024-08-02T23:18:42.062Z Date Published: 2022-01-19T11:05:11 Description: A privilege escalation vulnerability in the McAfee Agent prior to 5.7.5. McAfee Agent uses openssl.cnf during the build process to specify the OPENSSLDIR variable as a subdirectory within the installation directory. A low privilege user could have created subdirectories and executed arbitrary code with SYSTEM privileges by creating the appropriate pathway to the specifically created malicious openssl.cnf file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kc.mcafee.com/corporate/index?page=content&id=SB10378 - https://www.kb.cert.org/vuls/id/287178 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-9307.
CVE ID: CVE-2017-9307 Date Updated: 2024-08-05T17:02:44.314Z Date Published: 2017-05-31T03:54:00 Description: SSRF vulnerability in remotedownload.php in Allen Disk 1.6 allows remote authenticated users to conduct port scans and access intranet servers via a crafted file parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/s3131212/allendisk/issues/20 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2232.
CVE ID: CVE-2024-2232 Date Updated: 2024-08-07T13:43:12.434Z Date Published: 2024-08-05T06:00:01.247Z Description: The lacks CSRF checks allowing a user to invite any user to any group (including private groups) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/a2df28d3-bf03-4fd3-b231-86e062739899/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-1747.
CVE ID: CVE-2015-1747 Date Updated: 2024-08-06T04:54:15.424Z Date Published: 2015-06-10T01:00:00 Description: Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1732, CVE-2015-1742, CVE-2015-1750, and CVE-2015-1753. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-056 - http://www.zerodayinitiative.com/advisories/ZDI-15-250 - http://www.securityfocus.com/bid/74986 - http://www.securitytracker.com/id/1032521 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-25082.
CVE ID: CVE-2019-25082 Date Updated: 2023-09-14T18:43:50.093Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20067.
CVE ID: CVE-2018-20067 Date Updated: 2024-08-05T11:51:18.990Z Date Published: 2019-01-09T19:00:00 Description: A renderer initiated back navigation was incorrectly allowed to cancel a browser initiated one in Navigation in Google Chrome prior to 71.0.3578.80 allowed a remote attacker to confuse the user about the origin of the current page via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html - https://crbug.com/879965 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2383.
CVE ID: CVE-2009-2383 Date Updated: 2024-08-07T05:52:13.991Z Date Published: 2009-07-08T15:00:00 Description: SQL injection vulnerability in BTE_RW_webajax.php in the Related Sites plugin 2.1 for WordPress allows remote attackers to execute arbitrary SQL commands via the guid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/51446 - http://www.securityfocus.com/bid/35538 - http://www.exploit-db.com/exploits/9054 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7442.
CVE ID: CVE-2019-7442 Date Updated: 2024-08-04T20:46:46.264Z Date Published: 2019-05-08T20:54:48 Description: An XML external entity (XXE) vulnerability in the Password Vault Web Access (PVWA) of CyberArk Enterprise Password Vault <=10.7 allows remote attackers to read arbitrary files or potentially bypass authentication via a crafted DTD in the SAML authentication system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.octority.com/2019/05/07/cyberark-enterprise-password-vault-xml-external-entity-xxe-injection/ - http://packetstormsecurity.com/files/152801/CyberArk-Enterprise-Password-Vault-10.7-XML-External-Entity-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4215.
CVE ID: CVE-2015-4215 Date Updated: 2024-08-06T06:11:11.354Z Date Published: 2015-06-24T10:00:00 Description: Cisco Wireless LAN Controller (WLC) devices with software 7.5(102.0) and 7.6(1.62) allow remote attackers to cause a denial of service (device crash) by triggering an exception during attempted forwarding of unspecified IPv6 packets to a non-IPv6 device, aka Bug ID CSCuj01046. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/75369 - http://www.securitytracker.com/id/1032697 - http://tools.cisco.com/security/center/viewAlert.x?alertId=39472 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0706.
CVE ID: CVE-2009-0706 Date Updated: 2024-08-07T04:48:51.600Z Date Published: 2009-02-23T15:00:00 Description: SQL injection vulnerability in the Simple Review (com_simple_review) component 1.3.5 for Joomla! and Mambo allows remote attackers to execute arbitrary SQL commands via the category parameter to index.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.org/0901-exploits/joomlasimplereview-sql.txt - http://www.securityfocus.com/bid/33102 - https://exchange.xforce.ibmcloud.com/vulnerabilities/47726 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10660.
CVE ID: CVE-2019-10660 Date Updated: 2024-08-04T22:32:01.166Z Date Published: 2019-03-30T16:43:21 Description: Grandstream GXV3611IR_HD before 1.0.3.23 devices allow remote authenticated users to execute arbitrary code via shell metacharacters in the /goform/systemlog?cmd=set logserver field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=23920&dl=1 - https://github.com/scarvell/grandstream_exploits No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25844.
CVE ID: CVE-2022-25844 Date Updated: 2024-09-16T22:40:37.127Z Date Published: 2022-05-01T15:25:32.752987Z Description: The package angular after 1.7.0 are vulnerable to Regular Expression Denial of Service (ReDoS) by providing a custom locale rule that makes it possible to assign the parameter in posPre: ' '.repeat() of NUMBER_FORMATS.PATTERNS[1].posPre with a very high value. **Note:** 1) This package has been deprecated and is no longer maintained. 2) The vulnerable versions are 1.7.0 and higher. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-ANGULAR-2772735 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2772736 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2772737 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGITHUBANGULAR-2772738 - https://stackblitz.com/edit/angularjs-material-blank-zvtdvb - https://security.netapp.com/advisory/ntap-20220629-0009/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2WUSPYOTOMAZPDEFPWPSCSPMNODRDKK3/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7LNAKCNTVBIHWAUT3FKWV5N67PQXSZOO/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2192.
CVE ID: CVE-2015-2192 Date Updated: 2024-08-06T05:10:15.515Z Date Published: 2015-03-08T02:00:00 Description: Integer overflow in the dissect_osd2_cdb_continuation function in epan/dissectors/packet-scsi-osd.c in the SCSI OSD dissector in Wireshark 1.12.x before 1.12.4 allows remote attackers to cause a denial of service (infinite loop) via a crafted length field in a packet. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-updates/2015-03/msg00038.html - http://www.wireshark.org/security/wnpa-sec-2015-11.html - http://www.securitytracker.com/id/1031858 - https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c35ca6c051adb28c321db54cc138f18637977c9a - https://security.gentoo.org/glsa/201510-03 - https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11024 - http://www.securityfocus.com/bid/72937 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14846.
CVE ID: CVE-2017-14846 Date Updated: 2024-08-05T19:42:22.192Z Date Published: 2017-09-27T20:00:00 Description: Mojoomla Hospital Management System for WordPress allows SQL Injection via the id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/42802/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26325.
CVE ID: CVE-2023-26325 Date Updated: 2024-08-02T11:46:24.401Z Date Published: 2023-02-23T00:00:00 Description: The 'rx_export_review' action in the ReviewX WordPress Plugin, is affected by an authenticated SQL injection vulnerability in the 'filterValue' and 'selectedColumns' parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2023-2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000208.
CVE ID: CVE-2017-1000208 Date Updated: 2024-08-05T21:53:07.295Z Date Published: 2017-11-17T02:00:00 Description: A vulnerability in Swagger-Parser's (version <= 1.0.30) yaml parsing functionality results in arbitrary code being executed when a maliciously crafted yaml Open-API specification is parsed. This in particular, affects the 'generate' and 'validate' command in swagger-codegen (<= 2.2.2) and can lead to arbitrary code being executed when these commands are used on a well-crafted yaml specification. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lgtm.com/blog/swagger_snakeyaml_CVE-2017-1000207_CVE-2017-1000208 - https://github.com/swagger-api/swagger-parser/releases/tag/v1.0.31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3768.
CVE ID: CVE-2011-3768 Date Updated: 2024-08-06T23:46:02.998Z Date Published: 2011-09-24T00:00:00 Description: Phorum 5.2.15a allows remote attackers to obtain sensitive information via a direct request to a .php file, which reveals the installation path in an error message, as demonstrated by css.php and certain other files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/70604 - http://www.openwall.com/lists/oss-security/2011/06/27/6 - http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/%21_README - http://code.google.com/p/inspathx/source/browse/trunk/paths_vuln/phorum-5.2.15a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-6030.
CVE ID: CVE-2017-6030 Date Updated: 2024-08-05T15:18:49.582Z Date Published: 2017-06-30T02:35:00 Description: A Predictable Value Range from Previous Values issue was discovered in Schneider Electric Modicon PLCs Modicon M221, firmware versions prior to Version 1.5.0.0, Modicon M241, firmware versions prior to Version 4.0.5.11, and Modicon M251, firmware versions prior to Version 4.0.5.11. The affected products generate insufficiently random TCP initial sequence numbers that may allow an attacker to predict the numbers from previous values. This may allow an attacker to spoof or disrupt TCP connections. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://ics-cert.us-cert.gov/advisories/ICSA-17-089-02 - http://www.securityfocus.com/bid/97254 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-23797.
CVE ID: CVE-2024-23797 Date Updated: 2024-08-16T19:16:15.675Z Date Published: 2024-02-13T09:00:12.025Z Description: A vulnerability has been identified in Tecnomatix Plant Simulation V2201 (All versions < V2201.0012), Tecnomatix Plant Simulation V2302 (All versions < V2302.0006). The affected applications contain a stack overflow vulnerability while parsing specially crafted WRL files. This could allow an attacker to execute code in the context of the current process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert-portal.siemens.com/productcert/html/ssa-017796.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42503.
CVE ID: CVE-2023-42503 Date Updated: 2024-08-02T19:23:39.663Z Date Published: 2023-09-14T07:45:14.520Z Description: Improper Input Validation, Uncontrolled Resource Consumption vulnerability in Apache Commons Compress in TAR parsing.This issue affects Apache Commons Compress: from 1.22 before 1.24.0. Users are recommended to upgrade to version 1.24.0, which fixes the issue. A third party can create a malformed TAR file by manipulating file modification times headers, which when parsed with Apache Commons Compress, will cause a denial of service issue via CPU consumption. In version 1.22 of Apache Commons Compress, support was added for file modification times with higher precision (issue # COMPRESS-612 [1]). The format for the PAX extended headers carrying this data consists of two numbers separated by a period [2], indicating seconds and subsecond precision (for example “1647221103.5998539”). The impacted fields are “atime”, “ctime”, “mtime” and “LIBARCHIVE.creationtime”. No input validation is performed prior to the parsing of header values. Parsing of these numbers uses the BigDecimal [3] class from the JDK which has a publicly known algorithmic complexity issue when doing operations on large numbers, causing denial of service (see issue # JDK-6560193 [4]). A third party can manipulate file time headers in a TAR file by placing a number with a very long fraction (300,000 digits) or a number with exponent notation (such as “9e9999999”) within a file modification time header, and the parsing of files with these headers will take hours instead of seconds, leading to a denial of service via exhaustion of CPU resources. This issue is similar to CVE-2012-2098 [5]. [1]: https://issues.apache.org/jira/browse/COMPRESS-612 [2]: https://pubs.opengroup.org/onlinepubs/9699919799/utilities/pax.html#tag_20_92_13_05 [3]: https://docs.oracle.com/javase/8/docs/api/java/math/BigDecimal.html [4]: https://bugs.openjdk.org/browse/JDK-6560193 [5]: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2098 Only applications using CompressorStreamFactory class (with auto-detection of file types), TarArchiveInputStream and TarFile classes to parse TAR files are impacted. Since this code was introduced in v1.22, only that version and later versions are impacted. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/5xwcyr600mn074vgxq92tjssrchmc93c - https://security.netapp.com/advisory/ntap-20231020-0003/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-16386.
CVE ID: CVE-2019-16386 Date Updated: 2024-08-05T01:17:39.441Z Date Published: 2019-11-26T17:23:46 Description: PEGA Platform 7.x and 8.x is vulnerable to Information disclosure via a direct prweb/sso/random_token/!STANDARD?pyActivity=GetWebInfo&target=popup&pzHarnessID=random_harness_id request to get database schema information while using a low-privilege account. NOTE: The vendor states that this vulnerability was discovered using an administrator account and they are normal administrator functions. Therefore, the claim that the CVE was done with a low privilege account is incorrect No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.cybercastrum.com/2019/11/25/cve-2019-16386/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-18754.
CVE ID: CVE-2020-18754 Date Updated: 2024-08-04T14:08:29.860Z Date Published: 2021-08-13T16:08:37 Description: An information disclosure vulnerability exists within Dut Computer Control Engineering Co.'s PLC MAC1100. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Ni9htMar3/vulnerability/blob/master/PLC/DCCE/DCCE%20MAC1100%20PLC_leak.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0852.
CVE ID: CVE-2014-0852 Date Updated: 2024-08-06T09:27:20.290Z Date Published: 2014-08-16T01:00:00 Description: IBM WebSphere DataPower SOA appliances through 4.0.2.15, 5.x through 5.0.0.17, 6.0.0.x through 6.0.0.9, and 6.0.1.x through 6.0.1.5 make it easier for remote attackers to obtain a PreMasterSecret value and defeat cryptographic protection mechanisms by sending a large number of requests in an SSL/TLS side-channel timing attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/60112 - http://www-01.ibm.com/support/docview.wss?uid=swg1IT01111 - http://www-01.ibm.com/support/docview.wss?uid=swg21678204 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90753 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-8634.
CVE ID: CVE-2015-8634 Date Updated: 2024-08-06T08:20:43.551Z Date Published: 2015-12-28T23:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 18.0.0.324 and 19.x and 20.x before 20.0.0.267 on Windows and OS X and before 11.2.202.559 on Linux, Adobe AIR before 20.0.0.233, Adobe AIR SDK before 20.0.0.233, and Adobe AIR SDK & Compiler before 20.0.0.233 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-8635, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, and CVE-2015-8650. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00048.html - http://www.securitytracker.com/id/1034544 - http://rhn.redhat.com/errata/RHSA-2015-2697.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05385680 - https://helpx.adobe.com/security/products/flash-player/apsb16-01.html - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00046.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00047.html - https://www.exploit-db.com/exploits/39221/ - http://www.securityfocus.com/bid/79701 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00045.html - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05356388 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3503.
CVE ID: CVE-2011-3503 Date Updated: 2024-08-06T23:37:47.924Z Date Published: 2011-09-16T17:00:00 Description: Untrusted search path vulnerability in eSignal 10.6.2425.1208, and possibly other versions, allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse JRS_UT.dll that is located in the same folder as a .quo (QUOTE) file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/45966 - http://osvdb.org/75458 - https://exchange.xforce.ibmcloud.com/vulnerabilities/69786 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-19131.
CVE ID: CVE-2018-19131 Date Updated: 2024-09-16T18:33:29.179Z Date Published: 2018-11-09T11:00:00Z Description: Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.squid-cache.org/Versions/v5/changesets/squid-5-6feeb15ff312f3e145763adf8d234ed6a0b3f11d.patch - http://www.squid-cache.org/Advisories/SQUID-2018_4.txt - https://github.com/squid-cache/squid/pull/306 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31678.
CVE ID: CVE-2024-31678 Date Updated: 2024-08-02T01:59:50.633Z Date Published: 2024-04-11T00:00:00 Description: Sourcecodester Loan Management System v1.0 is vulnerable to SQL Injection via the "password" parameter in the "login.php" file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/CveSecLook/cve/issues/10 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40298.
CVE ID: CVE-2022-40298 Date Updated: 2024-08-03T12:14:40.215Z Date Published: 2022-09-22T23:30:16 Description: Crestron AirMedia for Windows before 5.5.1.84 has insecure inherited permissions, which leads to a privilege escalation vulnerability found in the AirMedia Windows Application, version 4.3.1.39. A low privileged user can initiate a repair of the system and gain a SYSTEM level shell. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.crestron.com/Security/Security_Advisories - https://www.crestron.com/release_notes/airmedia_windows_installer_release_notes_5.5.1.84.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3564.
CVE ID: CVE-2022-3564 Date Updated: 2024-08-03T01:14:01.563Z Date Published: 2022-10-17T00:00:00 Description: A vulnerability classified as critical was found in Linux Kernel. Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component Bluetooth. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-211087. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/bluetooth/bluetooth-next.git/commit/?id=89f9f3cb86b1c63badaf392a83dd661d56cc50b1 - https://vuldb.com/?id.211087 - https://lists.debian.org/debian-lts-announce/2022/12/msg00031.html - https://security.netapp.com/advisory/ntap-20221223-0001/ - https://lists.debian.org/debian-lts-announce/2022/12/msg00034.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-22060.
CVE ID: CVE-2021-22060 Date Updated: 2024-08-03T18:30:23.916Z Date Published: 2022-01-07T22:39:55 Description: In Spring Framework versions 5.3.0 - 5.3.13, 5.2.0 - 5.2.18, and older unsupported versions, it is possible for a user to provide malicious input to cause the insertion of additional log entries. This is a follow-up to CVE-2021-22096 that protects against additional types of input and in more places of the Spring Framework codebase. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tanzu.vmware.com/security/cve-2021-22060 - https://www.oracle.com/security-alerts/cpuapr2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3649.
CVE ID: CVE-2010-3649 Date Updated: 2024-08-07T03:18:52.684Z Date Published: 2010-11-07T21:00:00 Description: Unspecified vulnerability in Adobe Flash Player before 9.0.289.0 and 10.x before 10.1.102.64 on Windows, Mac OS X, Linux, and Solaris, and 10.1.95.1 on Android, allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via unknown vectors, a different vulnerability than CVE-2010-3640, CVE-2010-3641, CVE-2010-3642, CVE-2010-3643, CVE-2010-3644, CVE-2010-3645, CVE-2010-3646, CVE-2010-3647, CVE-2010-3648, CVE-2010-3650, and CVE-2010-3652. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2011/0192 - http://secunia.com/advisories/42183 - http://support.apple.com/kb/HT4435 - http://www.securityfocus.com/bid/44685 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15750 - http://blogs.sun.com/security/entry/multiple_vulnerabilities_in_adobe_flash1 - http://secunia.com/advisories/43026 - http://security.gentoo.org/glsa/glsa-201101-09.xml - http://www.vupen.com/english/advisories/2010/2918 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11872 - http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html - http://www.redhat.com/support/errata/RHSA-2010-0834.html - http://lists.opensuse.org/opensuse-security-announce/2010-11/msg00002.html - http://secunia.com/advisories/42926 - http://marc.info/?l=bugtraq&m=130331642631603&w=2 - http://www.vupen.com/english/advisories/2010/2903 - http://marc.info/?l=bugtraq&m=130331642631603&w=2 - http://www.vupen.com/english/advisories/2011/0173 - http://www.adobe.com/support/security/bulletins/apsb10-26.html - http://www.vupen.com/english/advisories/2010/2906 - http://www.redhat.com/support/errata/RHSA-2010-0867.html - http://www.redhat.com/support/errata/RHSA-2010-0829.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-2471.
CVE ID: CVE-2010-2471 Date Updated: 2024-08-07T02:32:16.886Z Date Published: 2019-11-06T17:09:06 Description: Drupal versions 5.x and 6.x has open redirection No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2014/02/12/8 - https://security-tracker.debian.org/tracker/CVE-2010-2471 - https://access.redhat.com/security/cve/cve-2010-2471 - https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=592716 - https://www.drupal.org/node/731710 - https://www.openwall.com/lists/oss-security/2010/06/28/8 - https://www.drupal.org/node/731710 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide information about the following MITRE ATT&CK technique:
T1571 : Non-Standard Port
Name: Non-Standard Port ID: T1571 URL: https://attack.mitre.org/techniques/T1571 Platforms: Linux, macOS, Windows Kill Chain Phases: Command and Control Description: Adversaries may communicate using a protocol and port pairing that are typically not associated. For example, HTTPS over port 8088(Citation: Symantec Elfin Mar 2019) or port 587(Citation: Fortinet Agent Tesla April 2018) as opposed to the traditional port 443. Adversaries may make changes to the standard port used by a protocol to bypass filtering or muddle analysis/parsing of network data. Adversaries may also make changes to victim systems to abuse non-standard ports. For example, Registry keys and other configuration settings can be used to modify protocol and port pairings.(Citation: change_rdp_port_conti) Data Sources: Network Traffic: Network Traffic Flow, Network Traffic: Network Traffic Content Detection: Analyze packet contents to detect communications that do not follow the expected protocol behavior for the port that is being used. Analyze network data for uncommon data flows (e.g., a client sending significantly more data than it receives from a server). Processes utilizing the network that do not normally have network communication or have never been seen before are suspicious.(Citation: University of Birmingham C2)
Provide detailed information about CVE-2018-20573.
CVE ID: CVE-2018-20573 Date Updated: 2024-09-17T02:02:36.908Z Date Published: 2018-12-28T16:00:00Z Description: The Scanner::EnsureTokensInQueue function in yaml-cpp (aka LibYaml-C++) 0.6.2 allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted YAML file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jbeder/yaml-cpp/issues/655 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-47135.
CVE ID: CVE-2024-47135 Date Updated: 2024-10-03T15:32:41.172Z Date Published: 2024-10-03T02:53:46.102Z Description: Stack-based buffer overflow vulnerability exists in Kostac PLC Programming Software (Former name: Koyo PLC Programming Software) Version 1.6.14.0 and earlier. Having a user open a specially crafted project file which was saved using Kostac PLC Programming Software Version 1.6.9.0 and earlier may cause a denial-of-service (DoS) condition, arbitrary code execution, and/or information disclosure because the issues exist in parsing of KPP project files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.electronics.jtekt.co.jp/en/topics/202410026928/ - https://www.electronics.jtekt.co.jp/jp/topics/2024100217388/ - https://jvn.jp/en/vu/JVNVU92808077/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10684.
CVE ID: CVE-2017-10684 Date Updated: 2024-08-05T17:41:55.540Z Date Published: 2017-06-29T23:00:00 Description: In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.gentoo.org/glsa/201804-13 - https://bugzilla.redhat.com/show_bug.cgi?id=1464687 - https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E - https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-14754.
CVE ID: CVE-2019-14754 Date Updated: 2024-08-05T00:26:38.551Z Date Published: 2019-08-08T12:32:46 Description: Open-School 3.0, and Community Edition 2.3, allows SQL Injection via the index.php?r=students/students/document id parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://open-school.org - https://pastebin.com/xuZN5rJR No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8580.
CVE ID: CVE-2016-8580 Date Updated: 2024-08-06T02:27:40.509Z Date Published: 2016-10-28T15:00:00 Description: PHP object injection vulnerabilities exist in multiple widget files in AlienVault OSSIM and USM before 5.3.2. These vulnerabilities allow arbitrary PHP code execution via magic methods in included classes. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.alienvault.com/forums/discussion/7766/security-advisory-alienvault-5-3-2-address-70-vulnerabilities - https://www.exploit-db.com/exploits/40682/ - http://www.securityfocus.com/bid/93864 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3201.
CVE ID: CVE-2009-3201 Date Updated: 2024-08-07T06:14:56.415Z Date Published: 2009-09-15T23:00:00 Description: Integer overflow in Media Player Classic 6.4.9 allows user-assisted remote attackers to cause a denial of service (application crash) via a MIDI file (.mid) with a malformed header, which triggers a buffer overflow, a different vulnerability than CVE-2007-4940. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/9620 - http://www.securityfocus.com/bid/36333 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28932.
CVE ID: CVE-2023-28932 Date Updated: 2024-08-02T13:51:38.923Z Date Published: 2023-05-10T07:07:24.036Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in WPMobile.App WPMobile.App — Android and iOS Mobile Application plugin <= 11.20 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wpappninja/wordpress-wpmobile-app-plugin-11-20-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000195.
CVE ID: CVE-2017-1000195 Date Updated: 2024-09-16T19:31:01.936Z Date Published: 2017-11-17T02:00:00Z Description: October CMS build 412 is vulnerable to PHP object injection in asset move functionality resulting in ability to delete files limited by file permissions on the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/octobercms/october/compare/v1.0.412...v1.0.413#diff-c328b7b99eac0d17b3c71eb37038fd61R317 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3508.
CVE ID: CVE-2009-3508 Date Updated: 2024-08-07T06:31:10.468Z Date Published: 2009-10-01T14:00:00 Description: Multiple directory traversal vulnerabilities in MUJE CMS 1.0.4.34 allow remote attackers to include and execute arbitrary local files via a .. (dot dot) in the (1) _class parameter to admin.php and the (2) url parameter to install/install.php; and allow remote authenticated administrators to read arbitrary files via a .. (dot dot) in the (3) _htmlfile parameter to admin.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/9314 - http://secunia.com/advisories/36079 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-43320.
CVE ID: CVE-2021-43320 Date Updated: 2021-11-30T19:31:47 Date Published: 2021-11-30T19:31:47 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1023.
CVE ID: CVE-2008-1023 Date Updated: 2024-08-07T08:08:57.158Z Date Published: 2008-04-04T17:00:00 Description: Heap-based buffer overflow in Clip opcode parsing in Apple QuickTime before 7.4.5 on Windows allows remote attackers to execute arbitrary code via a crafted PICT image file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/41615 - http://support.apple.com/kb/HT1241 - http://www.us-cert.gov/cas/techalerts/TA08-094A.html - http://www.vupen.com/english/advisories/2008/1078 - http://www.securityfocus.com/bid/28583 - http://securitytracker.com/id?1019767 - http://secunia.com/advisories/29650 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0501.
CVE ID: CVE-2009-0501 Date Updated: 2024-08-07T04:40:03.540Z Date Published: 2009-02-10T02:00:00 Description: Unspecified vulnerability in the Calendar export feature in Moodle 1.8 before 1.8.8 and 1.9 before 1.9.4 allows attackers to obtain sensitive information and conduct "brute force attacks on user accounts" via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html - http://moodle.org/security/ - http://secunia.com/advisories/34418 - http://www.openwall.com/lists/oss-security/2009/02/04/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8747.
CVE ID: CVE-2014-8747 Date Updated: 2024-08-06T13:26:02.584Z Date Published: 2014-10-13T18:00:00 Description: Cross-site scripting (XSS) vulnerability in the Drupal Commons module 7.x-3.x before 7.x-3.9 for Drupal allows remote attackers to inject arbitrary web script or HTML via vectors related to content creation and activity stream messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.drupal.org/node/2194777 - https://www.drupal.org/node/2194877 - http://osvdb.org/103288 - https://exchange.xforce.ibmcloud.com/vulnerabilities/91151 - http://www.securityfocus.com/bid/65524 - http://secunia.com/advisories/56861 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-40145.
CVE ID: CVE-2022-40145 Date Updated: 2024-08-03T12:14:39.957Z Date Published: 2022-12-21T15:23:42.847Z Description: This vulnerable is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL. The function jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource use InitialContext.lookup(jndiName) without filtering. An user can modify `options.put(JDBCUtils.DATASOURCE, "osgi:" + DataSource.class.getName());` to `options.put(JDBCUtils.DATASOURCE,"jndi:rmi://x.x.x.x:xxxx/Command");` in JdbcLoginModuleTest#setup. This is vulnerable to a remote code execution (RCE) attack when a configuration uses a JNDI LDAP data source URI when an attacker has control of the target LDAP server.This issue affects all versions of Apache Karaf up to 4.4.1 and 4.3.7. We encourage the users to upgrade to Apache Karaf at least 4.4.2 or 4.3.8 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://karaf.apache.org/security/cve-2022-40145.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0119.
CVE ID: CVE-2021-0119 Date Updated: 2024-08-03T15:32:09.199Z Date Published: 2022-02-09T22:04:12 Description: Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00527.html - https://security.netapp.com/advisory/ntap-20220210-0007/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0232.
CVE ID: CVE-2023-0232 Date Updated: 2024-08-02T05:02:44.037Z Date Published: 2023-02-21T08:51:02.165Z Description: The ShopLentor WordPress plugin before 2.5.4 unserializes user input from cookies in order to track viewed products and user data, which could lead to PHP Object Injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/1885a708-0e8a-4f4c-8e26-069bebe9a518 - https://plugins.trac.wordpress.org/changeset/2852711/woolentor-addons/trunk/includes/helper-function.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-21028.
CVE ID: CVE-2024-21028 Date Updated: 2024-08-01T22:13:42.223Z Date Published: 2024-04-16T21:26:07.575Z Description: Vulnerability in the Oracle Complex Maintenance, Repair, and Overhaul product of Oracle E-Business Suite (component: LOV). Supported versions that are affected are 12.2.3-12.2.13. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Complex Maintenance, Repair, and Overhaul. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Complex Maintenance, Repair, and Overhaul, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Complex Maintenance, Repair, and Overhaul accessible data as well as unauthorized read access to a subset of Oracle Complex Maintenance, Repair, and Overhaul accessible data. CVSS 3.1 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2024.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4067.
CVE ID: CVE-2022-4067 Date Updated: 2024-08-03T01:27:54.542Z Date Published: 2022-11-20T00:00:00 Description: Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72 - https://github.com/librenms/librenms/commit/8e85698aa3aa4884c2f3d6c987542477eb64f07c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7784.
CVE ID: CVE-2019-7784 Date Updated: 2024-08-04T20:54:28.458Z Date Published: 2019-05-22T13:51:25 Description: Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a double free vulnerability. Successful exploitation could lead to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://helpx.adobe.com/security/products/acrobat/apsb19-18.html - http://www.securityfocus.com/bid/108321 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-20532.
CVE ID: CVE-2018-20532 Date Updated: 2024-08-05T12:05:17.344Z Date Published: 2018-12-28T03:00:00 Description: There is a NULL pointer dereference at ext/testcase.c (function testcase_read) in libsolvext.a in libsolv through 0.7.2 that will cause a denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/openSUSE/libsolv/pull/291 - https://bugzilla.redhat.com/show_bug.cgi?id=1652605 - https://usn.ubuntu.com/3916-1/ - https://access.redhat.com/errata/RHSA-2019:2290 - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00057.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3427.
CVE ID: CVE-2022-3427 Date Updated: 2024-08-03T01:07:06.740Z Date Published: 2022-12-15T04:02:40.319Z Description: The Corner Ad plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.0.56. This is due to missing or incorrect nonce validation on its corner_ad_settings_page function. This makes it possible for unauthenticated attackers to trigger the deletion of ads via forged request granted they can trick a site administrator into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a6c5e9a-754f-41c8-b27b-caa133b5070f - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2765630%40corner-ad%2Ftrunk&old=2719671%40corner-ad%2Ftrunk&sfp_email=&sfph_mail= - https://plugins.trac.wordpress.org/browser/corner-ad/trunk/corner-ad.php?rev=2782613#L240 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32877.
CVE ID: CVE-2022-32877 Date Updated: 2024-08-03T07:54:03.136Z Date Published: 2022-11-01T00:00:00 Description: A configuration issue was addressed with additional restrictions. This issue is fixed in macOS Big Sur 11.7, macOS Monterey 12.6. An app may be able to access user-sensitive data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/kb/HT213446 - https://support.apple.com/en-us/HT213443 - https://support.apple.com/en-us/HT213444 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-4339.
CVE ID: CVE-2019-4339 Date Updated: 2024-09-16T21:57:39.810Z Date Published: 2019-10-28T23:36:11.155539Z Description: IBM Security Guardium Big Data Intelligence (SonarG) 4.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 161418. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/1096924 - https://exchange.xforce.ibmcloud.com/vulnerabilities/161418 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-47387.
CVE ID: CVE-2022-47387 Date Updated: 2024-08-03T14:55:07.968Z Date Published: 2023-05-15T09:54:41.625Z Description: An authenticated remote attacker may use a stack based out-of-bounds write vulnerability in the CmpTraceMgr Component of multiple CODESYS products in multiple versions to write data into the stack which can lead to a denial-of-service condition, memory overwriting, or remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://customers.codesys.com/index.php?eID=dumpFile&t=f&f=17554&token=5444f53b4c90fe37043671a100dffa75305d1825&download= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8748.
CVE ID: CVE-2014-8748 Date Updated: 2024-09-16T18:18:21.559Z Date Published: 2014-10-13T18:00:00Z Description: Cross-site scripting (XSS) vulnerability in the Google Doubleclick for Publishers (DFP) module 7.x-1.x before 7.x-1.2 for Drupal allows remote authenticated users with the "administer dfp" permission to inject arbitrary web script or HTML via a slot name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/56521 - https://www.drupal.org/node/2172167 - https://drupal.org/node/2179085 - http://osvdb.org/102354 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23056.
CVE ID: CVE-2022-23056 Date Updated: 2024-09-17T03:59:39.893Z Date Published: 2022-06-22T07:25:16.868936Z Description: In ERPNext, versions v13.0.0-beta.13 through v13.30.0 are vulnerable to Stored XSS at the Patient History page which allows a low privilege user to conduct an account takeover attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mend.io/vulnerability-database/CVE-2022-23056 - https://github.com/frappe/erpnext/blob/21a3ea462aaf319e466c067c2ec406eb9abe6ed3/erpnext/healthcare/page/patient_history/patient_history.js#L288 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-42077.
CVE ID: CVE-2021-42077 Date Updated: 2024-08-04T03:22:25.984Z Date Published: 2021-11-08T04:01:18 Description: PHP Event Calendar before 2021-09-03 allows SQL injection, as demonstrated by the /server/ajax/user_manager.php username parameter. This can be used to execute SQL statements directly on the database, allowing an adversary in some cases to completely compromise the database system. It can also be used to bypass the login form. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/164777/PHP-Event-Calendar-Lite-Edition-SQL-Injection.html - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2021-048.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2354.
CVE ID: CVE-2008-2354 Date Updated: 2024-08-07T08:58:02.379Z Date Published: 2008-05-20T10:00:00 Description: Unspecified vulnerability in the data export function in testMaker before 3.0p10 allows test authors to obtain access to export data via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/42499 - http://www.securityfocus.com/bid/29273 - http://sourceforge.net/project/shownotes.php?group_id=194778&release_id=599729 - http://secunia.com/advisories/30251 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-24348.
CVE ID: CVE-2020-24348 Date Updated: 2024-08-04T15:12:08.966Z Date Published: 2020-08-13T18:52:00 Description: njs through 0.4.3, used in NGINX, has an out-of-bounds read in njs_json_stringify_iterator in njs_json.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nginx/njs/issues/322 - https://security.netapp.com/advisory/ntap-20200918-0001/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.