instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2009-0292. | CVE ID: CVE-2009-0292
Date Updated: 2024-08-07T04:31:25.466Z
Date Published: 2009-01-27T20:00:00
Description:
SQL injection vulnerability in show_cat2.php in SHOP-INET 4 allows remote attackers to execute arbitrary SQL commands via the grid parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/7874
- http://osvdb.org/51615
- http://secunia.com/advisories/33660
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-26284. | CVE ID: CVE-2022-26284
Date Updated: 2024-08-03T04:56:37.931Z
Date Published: 2022-03-21T22:25:21
Description:
Simple Client Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the manage_client endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Dir0x/SQLi-exploit---Simple-Client-Management-System/blob/main/manage_client_sqli.py
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-9498. | CVE ID: CVE-2020-9498
Date Updated: 2024-08-04T10:34:39.028Z
Date Published: 2020-07-02T12:32:44
Description:
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E
- https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc%40%3Cannounce.apache.org%3E
- https://research.checkpoint.com/2020/apache-guacamole-rce/
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525
- https://lists.debian.org/debian-lts-announce/2020/11/msg00010.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/
- https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-4577. | CVE ID: CVE-2017-4577
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-3818. | CVE ID: CVE-2012-3818
Date Updated: 2024-09-17T00:35:27.426Z
Date Published: 2012-06-29T17:00:00Z
Description:
The fpm exporter in Revelation 0.4.13-2 and earlier encrypts the version number but not the password when exporting a file, which might allow local users to obtain sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://als.regnet.cz/fpm2/feedback/2
- http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-16127. | CVE ID: CVE-2020-16127
Date Updated: 2024-09-16T17:58:49.219Z
Date Published: 2020-11-11T04:10:15.512976Z
Description:
An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-27992. | CVE ID: CVE-2020-27992
Date Updated: 2024-08-04T16:25:44.118Z
Date Published: 2020-10-31T16:14:45
Description:
Dr.Fone 3.0.0 allows local users to gain privileges via a Trojan horse DriverInstall.exe because %PROGRAMFILES(X86)%\Wondershare\dr.fone\Library\DriverInstaller has Full Control for BUILTIN\Users.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://drfone.wondershare.com
- https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-4279. | CVE ID: CVE-2022-4279
Date Updated: 2024-08-03T01:34:49.920Z
Date Published: 2022-12-03T00:00:00
Description:
A vulnerability classified as problematic has been found in SourceCodester Human Resource Management System 1.0. Affected is an unknown function of the file /hrm/employeeview.php. The manipulation of the argument search leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214776.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss
- https://vuldb.com/?id.214776
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-22274. | CVE ID: CVE-2020-22274
Date Updated: 2024-08-04T14:51:10.308Z
Date Published: 2020-11-04T17:06:20
Description:
JomSocial (Joomla Social Network Extention) 4.7.6 allows CSV injection via a customer's profile.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gofile.io/?c=LsAOtL
- http://uploadboy.me/iypl38958pon/JomSocial.mp4.html
- https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22274.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-27529. | CVE ID: CVE-2022-27529
Date Updated: 2024-08-03T05:32:58.676Z
Date Published: 2022-04-18T16:20:27
Description:
A maliciously crafted PICT, BMP, PSD or TIF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 may be used to write beyond the allocated buffer while parsing PICT, BMP, PSD or TIF file. This vulnerability may be exploited to execute arbitrary code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-1177. | CVE ID: CVE-2021-1177
Date Updated: 2024-09-16T23:06:41.305Z
Date Published: 2021-01-13T21:20:48.056405Z
Description:
Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-33106. | CVE ID: CVE-2022-33106
Date Updated: 2024-08-03T08:01:20.079Z
Date Published: 2022-10-12T00:00:00
Description:
WiJungle NGFW Version U250 was discovered to be vulnerable to No Rate Limit attack, allowing the attacker to brute force the admin password leading to Account Take Over.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://wijungle.com
- https://hexisanoob.gitbook.io/hexisanoob/cves/cve-2022-33106
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-5877. | CVE ID: CVE-2014-5877
Date Updated: 2024-08-06T11:55:50.203Z
Date Published: 2014-09-11T10:00:00
Description:
The TV Guide (aka net.micene.minigroup.palimpsests.lite) application 5.4.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
- http://www.kb.cert.org/vuls/id/354753
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-15366. | CVE ID: CVE-2018-15366
Date Updated: 2024-08-05T09:54:03.416Z
Date Published: 2018-10-23T14:00:00
Description:
A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx
- http://www.securityfocus.com/bid/105757
- https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx
- https://www.zerodayinitiative.com/advisories/ZDI-18-1293/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-4136. | CVE ID: CVE-2011-4136
Date Updated: 2024-08-07T00:01:50.498Z
Date Published: 2011-10-19T10:00:00
Description:
django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hermes.opensuse.org/messages/14700881
- http://www.debian.org/security/2011/dsa-2332
- https://bugzilla.redhat.com/show_bug.cgi?id=737366
- http://secunia.com/advisories/46614
- http://openwall.com/lists/oss-security/2011/09/11/1
- https://www.djangoproject.com/weblog/2011/sep/10/127/
- http://openwall.com/lists/oss-security/2011/09/13/2
- https://www.djangoproject.com/weblog/2011/sep/09/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-32057. | CVE ID: CVE-2023-32057
Date Updated: 2024-08-02T15:03:28.741Z
Date Published: 2023-07-11T17:03:17.264Z
Description:
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32057
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-0339. | CVE ID: CVE-2009-0339
Date Updated: 2024-08-07T04:31:25.637Z
Date Published: 2009-01-29T18:09:00
Description:
SQL injection vulnerability in inc_webblogmanager.asp in DMXReady Blog Manager allows remote attackers to execute arbitrary SQL commands via the itemID parameter in a view action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/500146/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48054
- http://dmxready.helpserve.com/index.php?_m=news&_a=viewnews&newsid=12
- http://www.securityfocus.com/bid/33314
- http://secunia.com/advisories/33601
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-12832. | CVE ID: CVE-2017-12832
Date Updated: 2019-03-05T19:57:01
Date Published: 2019-03-05T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-5863. | CVE ID: CVE-2023-5863
Date Updated: 2024-09-05T17:50:14.983Z
Date Published: 2023-10-31T00:00:19.197Z
Description:
Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f
- https://github.com/thorsten/phpmyfaq/commit/97e813dcd2022bd10a8770569a8b02591716365f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-3375. | CVE ID: CVE-2008-3375
Date Updated: 2024-08-07T09:37:26.729Z
Date Published: 2008-07-30T17:00:00
Description:
The jrCookie function in includes/jamroom-misc.inc.php in JamRoom before 3.4.0 allows remote attackers to bypass authentication and gain administrative access via a boolean value within serialized data in a JMU_Cookie cookie.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/31249
- http://www.gulftech.org/?node=research&article_id=00117-07282008
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44048
- http://www.jamroom.net/phpBB2/viewtopic.php?t=24454
- http://www.securityfocus.com/archive/1/494820/100/0/threaded
- http://www.jamroom.net/index.php?m=td_tracker&o=view&id=1178
- http://securityreason.com/securityalert/4069
- http://www.securityfocus.com/bid/30406
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-36697. | CVE ID: CVE-2020-36697
Date Updated: 2024-08-04T17:37:06.636Z
Date Published: 2023-06-07T01:51:10.220Z
Description:
The WP GDPR plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in versions up to, and including, 2.1.1. This makes it possible for unauthenticated attackers to delete any comment and modify the plugin’s settings.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/032e775a-97be-4d93-bac3-094e35be4b11?source=cve
- https://blog.nintechnet.com/unauthenticated-stored-xss-and-content-spoofing-vulnerabilities-in-wordpress-wp-gdpr-plugin-unpatched/
- https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-wp-gdpr-multiple-vulnerabilities-2-1-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-1639. | CVE ID: CVE-2014-1639
Date Updated: 2024-08-06T09:50:10.989Z
Date Published: 2014-01-28T00:00:00
Description:
syncevo/installcheck-local.sh in syncevolution before 1.3.99.7 uses mktemp to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows local users to overwrite arbitrary files via a symlink attack on the new filename.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.openwall.com/lists/oss-security/2014/01/22/4
- https://exchange.xforce.ibmcloud.com/vulnerabilities/90662
- http://www.osvdb.org/102380
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736357
- http://www.securityfocus.com/bid/65098
- http://www.openwall.com/lists/oss-security/2014/01/22/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-4612. | CVE ID: CVE-2011-4612
Date Updated: 2024-09-16T17:22:55.558Z
Date Published: 2012-11-20T00:00:00Z
Description:
icecast before 2.3.3 allows remote attackers to inject control characters such as newlines into the error loc (error.log) via a crafted URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=768176
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090695.html
- http://www.icecast.org/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-5235. | CVE ID: CVE-2016-5235
Date Updated: 2024-08-06T00:53:48.973Z
Date Published: 2019-07-01T15:54:40
Description:
A Cross Site Scripting (XSS) vulnerability in versions of F5 WebSafe Dashboard 3.9.x and earlier, aka F5 WebSafe Alert Server, allows an unauthenticated user to inject HTML via a crafted alert.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K48572812
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35501. | CVE ID: CVE-2020-35501
Date Updated: 2024-08-04T17:02:08.109Z
Date Published: 2022-03-30T00:00:00
Description:
A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1908577
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-42410. | CVE ID: CVE-2022-42410
Date Updated: 2024-08-03T13:10:40.430Z
Date Published: 2023-01-26T00:00:00
Description:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PGM files. Crafted data in a PGM file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18365.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tracker-software.com/product/pdf-xchange-editor/history
- https://www.zerodayinitiative.com/advisories/ZDI-22-1355/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-6418. | CVE ID: CVE-2023-6418
Date Updated: 2024-08-02T08:28:21.816Z
Date Published: 2023-11-30T13:14:19.950Z
Description:
A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via videos.php in the id parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-44390. | CVE ID: CVE-2022-44390
Date Updated: 2024-08-03T13:54:02.551Z
Date Published: 2022-11-14T00:00:00
Description:
A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/weng-xianhu/eyoucms/issues/31
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-0904. | CVE ID: CVE-2024-0904
Date Updated: 2024-08-01T18:18:19.034Z
Date Published: 2024-05-06T06:00:01.281Z
Description:
The Fancy Product Designer WordPress plugin before 6.1.81 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-20856. | CVE ID: CVE-2021-20856
Date Updated: 2024-08-03T17:53:22.658Z
Date Published: 2021-12-01T02:15:47
Description:
Cross-site scripting vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.elecom.co.jp/news/security/20211130-01/
- https://jvn.jp/en/jp/JVN88993473/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-25037. | CVE ID: CVE-2018-25037
Date Updated: 2024-08-05T12:26:39.598Z
Date Published: 2022-06-12T07:40:24
Description:
A vulnerability was found in Thomson TCW710 ST5D.10.05 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/RgDdns. The manipulation of the argument DdnsHostName with the input ><script>alert(1)</script> as part of POST Request leads to cross site scripting (Persistent). The attack may be launched remotely. The exploit has been disclosed to the public and may be used.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://alquimistadesistemas.com/auditando-router-thomson-tcw710
- https://vuldb.com/?id.126698
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12629. | CVE ID: CVE-2020-12629
Date Updated: 2024-08-04T12:04:21.772Z
Date Published: 2020-05-04T12:28:46
Description:
include/class.sla.php in osTicket before 1.14.2 allows XSS via the SLA Name.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/osticket/osticket/commit/fc4c8608fa122f38673b9dddcb8fef4a15a9c884
- https://github.com/osTicket/osTicket/compare/v1.14.1...v1.14.2
- https://www.exploit-db.com/exploits/48413
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-20596. | CVE ID: CVE-2023-20596
Date Updated: 2024-08-02T09:05:36.288Z
Date Published: 2023-11-14T18:55:14.665Z
Description:
Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7011
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-20672. | CVE ID: CVE-2022-20672
Date Updated: 2024-09-16T20:21:32.690Z
Date Published: 2022-05-27T14:05:46.295284Z
Description:
Multiple vulnerabilities in the web-based management interface of Cisco Common Services Platform Collector (CSPC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-24455. | CVE ID: CVE-2021-24455
Date Updated: 2024-08-03T19:35:19.191Z
Date Published: 2021-08-02T10:32:01
Description:
The Tutor LMS – eLearning and online course solution WordPress plugin before 1.9.2 did not escape the Summary field of Announcements (when outputting it in an attribute), which can be created by users as low as Tutor Instructor. This lead to a Stored Cross-Site Scripting issue, which is triggered when viewing the Announcements list, and could result in privilege escalation when viewed by an admin.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-31837. | CVE ID: CVE-2024-31837
Date Updated: 2024-08-02T01:59:49.983Z
Date Published: 2024-04-30T00:00:00
Description:
DMitry (Deepmagic Information Gathering Tool) 1.3a has a format-string vulnerability, with a threat model similar to CVE-2017-7938.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/jaygreig86/dmitry/pull/12
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1185 | The MITRE ATT&CK technique T1185: Man in the Browser is related to the vulnerability CVE-CVE-2018-11073. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact. |
Provide detailed information about CVE-2023-22645. | CVE ID: CVE-2023-22645
Date Updated: 2024-08-02T10:13:49.453Z
Date Published: 2023-04-19T00:00:00
Description:
An Improper Privilege Management vulnerability in SUSE kubewarden allows attackers to read arbitrary secrets if they get access to the ServiceAccount kubewarden-controller This issue affects: SUSE kubewarden kubewarden-controller versions prior to 1.6.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.suse.com/show_bug.cgi?id=1210218
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-9761. | CVE ID: CVE-2019-9761
Date Updated: 2024-08-04T22:01:54.149Z
Date Published: 2019-03-14T01:00:00
Description:
An XXE issue was discovered in PHPSHE 1.7, which can be used to read any file in the system or scan the internal network without authentication. This occurs because of the call to wechat_getxml in include/plugin/payment/wechat/notify_url.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitee.com/koyshe/phpshe/issues/ITC0C
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-0753. | CVE ID: CVE-2015-0753
Date Updated: 2024-08-06T04:17:32.789Z
Date Published: 2015-05-29T15:00:00
Description:
SQL injection vulnerability in Cisco Unified Email Interaction Manager (EIM) and Unified Web Interaction Manager (WIM) 9.0(2) allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuu30028.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1032422
- http://tools.cisco.com/security/center/viewAlert.x?alertId=39013
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-43512. | CVE ID: CVE-2023-43512
Date Updated: 2024-08-02T19:44:43.288Z
Date Published: 2024-01-02T05:38:55.097Z
Description:
Transient DOS while parsing GATT service data when the total amount of memory that is required by the multiple services is greater than the actual size of the services buffer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-7224. | CVE ID: CVE-2020-7224
Date Updated: 2024-08-04T09:25:48.420Z
Date Published: 2020-04-16T17:26:45
Description:
The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://docs.aviatrix.com/HowTos/security_bulletin_article.html
- https://docs.aviatrix.com/#security-bulletin
- https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-44117. | CVE ID: CVE-2022-44117
Date Updated: 2024-08-03T13:47:05.630Z
Date Published: 2022-11-23T00:00:00
Description:
Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gist.github.com/yinfei6/20bd1d3ebe0803c2d8756ace3e173676
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-8886. | CVE ID: CVE-2016-8886
Date Updated: 2024-08-06T02:35:02.214Z
Date Published: 2017-03-23T18:00:00
Description:
The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/
- https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c
- http://www.securityfocus.com/bid/93839
- http://www.openwall.com/lists/oss-security/2016/10/25/11
- https://bugzilla.redhat.com/show_bug.cgi?id=1388880
- http://www.openwall.com/lists/oss-security/2016/10/23/2
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGI2FZQLOTSZI3VA4ECJERI74SMNQDL4/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-1758. | CVE ID: CVE-2010-1758
Date Updated: 2024-08-07T01:35:53.620Z
Date Published: 2010-06-11T19:00:00
Description:
Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving DOM Range objects.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:039
- http://support.apple.com/kb/HT4220
- http://www.vupen.com/english/advisories/2010/2722
- http://secunia.com/advisories/43068
- http://www.ubuntu.com/usn/USN-1006-1
- http://secunia.com/advisories/41856
- http://www.vupen.com/english/advisories/2011/0212
- http://support.apple.com/kb/HT4225
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html
- http://secunia.com/advisories/40196
- http://secunia.com/advisories/40105
- http://www.vupen.com/english/advisories/2010/1373
- http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html
- http://secunia.com/advisories/42314
- http://www.vupen.com/english/advisories/2010/1512
- http://www.securityfocus.com/bid/40620
- http://www.vupen.com/english/advisories/2011/0552
- http://support.apple.com/kb/HT4456
- http://securitytracker.com/id?1024067
- http://support.apple.com/kb/HT4196
- http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7335
- http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4628. | CVE ID: CVE-2010-4628
Date Updated: 2024-08-07T03:51:17.919Z
Date Published: 2010-12-30T20:00:00
Description:
member.php in MyBB (aka MyBulletinBoard) before 1.4.12 makes a certain superfluous call to the SQL COUNT function, which allows remote attackers to cause a denial of service (resource consumption) by making requests to member.php that trigger scans of the entire users table.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/
- http://openwall.com/lists/oss-security/2010/10/08/7
- http://openwall.com/lists/oss-security/2010/10/11/8
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64514
- http://openwall.com/lists/oss-security/2010/12/06/2
- http://dev.mybboard.net/issues/662
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-5040. | CVE ID: CVE-2020-5040
Date Updated: 2021-01-05T18:31:03
Date Published: 2021-01-05T18:31:03
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-41321. | CVE ID: CVE-2023-41321
Date Updated: 2024-09-23T20:24:39.908Z
Date Published: 2023-09-26T21:16:31.589Z
Description:
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-0064. | CVE ID: CVE-2023-0064
Date Updated: 2024-08-02T04:54:32.602Z
Date Published: 2023-03-06T13:34:06.078Z
Description:
The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-13963. | CVE ID: CVE-2020-13963
Date Updated: 2024-08-04T12:32:14.607Z
Date Published: 2021-03-21T20:57:32
Description:
SOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://forum.soplanning.org/viewforum.php?f=8
- https://labs.integrity.pt/advisories/cve-2020-13963/
- https://cwe.mitre.org/data/definitions/321.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-50424. | CVE ID: CVE-2023-50424
Date Updated: 2024-09-28T22:19:05.889Z
Date Published: 2023-12-12T01:59:36.703Z
Description:
SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://me.sap.com/notes/3411067
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
- https://github.com/SAP/cloud-security-client-go
- https://pkg.go.dev/github.com/sap/cloud-security-client-go@v0.17.0
- https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/
- https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-17524. | CVE ID: CVE-2019-17524
Date Updated: 2024-08-05T01:40:15.971Z
Date Published: 2019-11-13T14:36:01
Description:
An XSS vulnerability on Technicolor TC7300 STFA.51.20 devices allows remote attackers to inject arbitrary web script via the "Connected Clients" field to /wlanAccess.asp. An intranet host can use a crafted hostname to exploit this.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.technicolor.com/news
- https://gitlab.com/luiss/cve_repo/blob/master/CVE-2019-17523/README.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-0368. | CVE ID: CVE-2008-0368
Date Updated: 2024-08-07T07:39:35.185Z
Date Published: 2008-01-18T23:00:00
Description:
onedcu in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allows local users to create arbitrary files via the Trace file argument.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/27328
- http://secunia.com/advisories/28534
- http://www.vupen.com/english/advisories/2008/0169
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39751
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=651
- http://www-1.ibm.com/support/docview.wss?uid=swg1IC54307
- http://www.securitytracker.com/id?1019237
- http://www-1.ibm.com/support/docview.wss?uid=swg27011556
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-10110. | CVE ID: CVE-2018-10110
Date Updated: 2024-08-05T07:32:01.168Z
Date Published: 2018-04-18T21:00:00
Description:
D-Link DIR-615 T1 devices allow XSS via the Add User feature.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html
- https://www.exploit-db.com/exploits/44473/
- https://hacksayan.wordpress.com/d-link-dir-615-wireless-router-persistent-cross-site-scripting-xss/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-20208. | CVE ID: CVE-2019-20208
Date Updated: 2024-08-05T02:39:09.409Z
Date Published: 2020-01-01T23:26:32
Description:
dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a stack-based buffer overflow.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gpac/gpac/issues/1348
- https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30145. | CVE ID: CVE-2021-30145
Date Updated: 2024-08-03T22:24:59.537Z
Date Published: 2021-05-18T13:34:53
Description:
A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://mpv.io
- https://github.com/mpv-player/mpv/releases/tag/v0.33.1
- https://devel0pment.de/?p=2217
- https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6
- https://security.gentoo.org/glsa/202107-46
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-2362. | CVE ID: CVE-2017-2362
Date Updated: 2024-08-05T13:55:04.109Z
Date Published: 2017-02-20T08:35:00
Description:
An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/41213/
- http://www.securityfocus.com/bid/95727
- https://support.apple.com/HT207485
- https://security.gentoo.org/glsa/201706-15
- https://support.apple.com/HT207484
- https://support.apple.com/HT207482
- http://www.securitytracker.com/id/1037668
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-44827. | CVE ID: CVE-2021-44827
Date Updated: 2024-08-04T04:32:13.206Z
Date Published: 2022-03-04T21:27:48
Description:
There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tp-link.com/us/security
- https://Full-Disclosure.eu
- https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-15884. | CVE ID: CVE-2018-15884
Date Updated: 2024-08-05T10:10:05.259Z
Date Published: 2018-08-28T19:00:00
Description:
RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html
- https://www.exploit-db.com/exploits/45264/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-10797. | CVE ID: CVE-2020-10797
Date Updated: 2024-08-04T11:14:15.605Z
Date Published: 2020-04-29T13:29:52
Description:
An XSS vulnerability resides in the hostname field of the diag_ping.php page in pfsense before 2.4.5 version. After passing inputs to the command and executing this command, the $result variable is not sanitized before it is printed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://redmine.pfsense.org/issues/10355
- https://github.com/pfsense/pfsense/commit/cc3990a334059018b004c91eeb66c147d8afe83d
- https://docs.netgate.com/pfsense/en/latest/releases/2-4-5-new-features-and-changes.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-0884. | CVE ID: CVE-2023-0884
Date Updated: 2023-02-23T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-40480. | CVE ID: CVE-2021-40480
Date Updated: 2024-08-04T02:44:10.561Z
Date Published: 2021-10-13T00:27:28
Description:
Microsoft Office Visio Remote Code Execution Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40480
- https://www.zerodayinitiative.com/advisories/ZDI-21-1159/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-2924. | CVE ID: CVE-2019-2924
Date Updated: 2024-08-04T19:03:43.371Z
Date Published: 2019-10-16T17:40:54
Description:
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.6.45 and prior and 5.7.27 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://security.netapp.com/advisory/ntap-20191017-0002/
- https://usn.ubuntu.com/4195-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-1007. | CVE ID: CVE-2009-1007
Date Updated: 2024-08-07T04:57:17.573Z
Date Published: 2009-10-22T18:00:00
Description:
Unspecified vulnerability in the Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality, integrity, and availability, related to SYS.DMP_SYS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/36750
- http://secunia.com/advisories/37027
- http://www.securitytracker.com/id?1023057
- http://www.us-cert.gov/cas/techalerts/TA09-294A.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-1474. | CVE ID: CVE-2023-1474
Date Updated: 2024-08-02T05:49:11.550Z
Date Published: 2023-03-17T14:39:53.522Z
Description:
A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file users/question_papers/manage_question_paper.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223336.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.223336
- https://vuldb.com/?ctiid.223336
- https://github.com/19FF/bug_report/blob/main/SQLi.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-16171. | CVE ID: CVE-2018-16171
Date Updated: 2024-08-05T10:17:38.199Z
Date Published: 2019-01-09T22:00:00
Description:
Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.cybozu.support/article/35259/
- https://jvn.jp/en/jp/JVN23161885/index.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-38991. | CVE ID: CVE-2023-38991
Date Updated: 2024-08-02T17:54:39.827Z
Date Published: 2023-08-03T00:00:00
Description:
An issue in the delete function in the ActModelController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete models created by the Administrator.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/thinkgem/jeesite/issues/520
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-4775. | CVE ID: CVE-2017-4775
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-5230. | CVE ID: CVE-2020-5230
Date Updated: 2024-08-04T08:22:09.097Z
Date Published: 2020-01-30T20:55:14
Description:
Opencast before 8.1 and 7.6 allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. This issue is fixed in Opencast 7.6 and 8.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq
- https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-15613. | CVE ID: CVE-2020-15613
Date Updated: 2024-08-04T13:22:30.400Z
Date Published: 2020-07-28T17:01:16
Description:
This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9739.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-20-760/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-0401. | CVE ID: CVE-2011-0401
Date Updated: 2024-08-06T21:51:08.771Z
Date Published: 2011-01-10T19:18:00
Description:
Piwik before 1.1 does not properly limit the number of files stored under tmp/sessions/, which might allow remote attackers to cause a denial of service (inode consumption) by establishing many sessions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/45787
- http://dev.piwik.org/trac/ticket/1910
- http://dev.piwik.org/trac/ticket/1279#comment:13
- http://piwik.org/blog/2011/01/piwik-1-1-2/
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64638
- http://osvdb.org/70381
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-8377. | CVE ID: CVE-2020-8377
Date Updated: 2021-04-13T20:41:21
Date Published: 2021-04-13T20:41:21
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-4473. | CVE ID: CVE-2013-4473
Date Updated: 2024-08-06T16:45:14.622Z
Date Published: 2013-11-23T11:00:00
Description:
Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugs.debian.org/723124
- http://secunia.com/advisories/56567
- http://security.gentoo.org/glsa/glsa-201401-21.xml
- https://bugs.freedesktop.org/show_bug.cgi?id=69434
- http://www.ubuntu.com/usn/USN-2958-1
- http://cgit.freedesktop.org/poppler/poppler/commit/utils/pdfseparate.cc?id=b8682d868ddf7f741e93b
- http://cgit.freedesktop.org/poppler/poppler/tree/NEWS
- http://www.securityfocus.com/bid/63368
- http://www.openwall.com/lists/oss-security/2013/10/29/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2018-20250 | CVE-CVE-2018-20250 is a vulnerability in WinRAR. It is related to the MITRE ATT&CK technique T1204.002: Malicious File. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2016-4912. | CVE ID: CVE-2016-4912
Date Updated: 2024-08-06T00:46:39.377Z
Date Published: 2017-03-27T17:00:00
Description:
The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1329295
- https://security.gentoo.org/glsa/201707-05
- http://www.securitytracker.com/id/1035916
- http://www.openwall.com/lists/oss-security/2016/05/18/6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-3100. | CVE ID: CVE-2009-3100
Date Updated: 2024-09-17T02:58:13.731Z
Date Published: 2009-09-08T18:00:00Z
Description:
xscreensaver (aka Gnome-XScreenSaver) in Sun Solaris 9 and 10, OpenSolaris snv_109 through snv_122, and X11 6.4.1 on Solaris 8 does not properly handle Accessibility support, which allows local users to cause a denial of service (system hang) by locking the screen and then attempting to launch an Accessibility pop-up window, related to a regression in certain Solaris and OpenSolaris patches.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugs.opensolaris.org/view_bug.do?bug_id=6839026
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-266469-1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12335. | CVE ID: CVE-2020-12335
Date Updated: 2024-08-04T11:56:51.510Z
Date Published: 2020-11-12T18:17:39
Description:
Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00419
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-1566. | CVE ID: CVE-2011-1566
Date Updated: 2024-08-06T22:28:41.818Z
Date Published: 2011-04-05T15:00:00
Description:
Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/46936
- http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-03.pdf
- http://aluigi.org/adv/igss_8-adv.txt
- http://secunia.com/advisories/43849
- http://www.vupen.com/english/advisories/2011/0741
- http://www.exploit-db.com/exploits/17024
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-4785. | CVE ID: CVE-2020-4785
Date Updated: 2024-09-16T17:29:01.679Z
Date Published: 2020-11-03T13:25:21.789171Z
Description:
IBM App Connect Enterprise Certified Container 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 189219.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6357899
- https://exchange.xforce.ibmcloud.com/vulnerabilities/189219
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2018-7499 | CVE-CVE-2018-7499 is a vulnerability in WebAccess. It is related to the MITRE ATT&CK technique T1574: Hijack Execution Flow. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2021-37706. | CVE ID: CVE-2021-37706
Date Updated: 2024-08-04T01:23:01.503Z
Date Published: 2021-12-22T00:00:00
Description:
PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984
- https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865
- http://seclists.org/fulldisclosure/2022/Mar/0
- http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html
- https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html
- https://security.gentoo.org/glsa/202210-37
- https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html
- https://www.debian.org/security/2022/dsa-5285
- https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-22525. | CVE ID: CVE-2024-22525
Date Updated: 2024-08-20T15:23:47.440Z
Date Published: N/A
Description:
dnspod-sr 0dfbd37 contains a SEGV.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/DNSPod/dnspod-sr/issues/61
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-33545. | CVE ID: CVE-2024-33545
Date Updated: 2024-08-02T02:36:04.398Z
Date Published: 2024-06-09T12:10:04.719Z
Description:
Missing Authorization vulnerability in AA-Team WZone.This issue affects WZone: from n/a through 14.0.10.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-unauthenticated-broken-access-control-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-30484. | CVE ID: CVE-2023-30484
Date Updated: 2024-08-02T14:28:51.294Z
Date Published: 2023-05-25T09:32:29.514Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in uPress Enable Accessibility plugin <= 1.4 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/enable-accessibility/wordpress-enable-accessibility-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-20427. | CVE ID: CVE-2022-20427
Date Updated: 2024-08-03T02:10:44.567Z
Date Published: 2022-11-17T00:00:00
Description:
In (TBD) of (TBD), there is a possible way to corrupt memory due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555070References: N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/pixel/2022-11-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-11439. | CVE ID: CVE-2018-11439
Date Updated: 2024-08-05T08:10:14.085Z
Date Published: 2018-05-30T13:00:00
Description:
The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.debian.org/debian-lts-announce/2018/07/msg00022.html
- http://seclists.org/fulldisclosure/2018/May/49
- https://lists.debian.org/debian-lts-announce/2021/09/msg00020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-0536. | CVE ID: CVE-2020-0536
Date Updated: 2024-08-04T06:02:52.338Z
Date Published: 2020-06-15T14:00:25
Description:
Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
- https://security.netapp.com/advisory/ntap-20200611-0006/
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html
- https://support.lenovo.com/de/en/product_security/len-30041
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-40543. | CVE ID: CVE-2024-40543
Date Updated: 2024-08-02T04:33:11.667Z
Date Published: 2024-07-12T00:00:00
Description:
PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitee.com/sanluan/PublicCMS/issues/IAAITR
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-4742. | CVE ID: CVE-2013-4742
Date Updated: 2024-08-06T16:52:27.001Z
Date Published: 2013-08-09T21:00:00
Description:
Buffer overflow in NetWin SurgeFTP before 23d2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string within the authentication request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/54188
- https://exchange.xforce.ibmcloud.com/vulnerabilities/85922
- http://osvdb.org/95582
- http://www.securityfocus.com/bid/61403
- http://archives.neohapsis.com/archives/bugtraq/2013-07/0149.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-25010. | CVE ID: CVE-2019-25010
Date Updated: 2024-08-05T03:00:19.018Z
Date Published: 2020-12-31T08:31:16
Description:
An issue was discovered in the failure crate through 2019-11-13 for Rust. Type confusion can occur when __private_get_type_id__ is overridden.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/rust-lang-nursery/failure/issues/336
- https://rustsec.org/advisories/RUSTSEC-2019-0036.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-4161. | CVE ID: CVE-2024-4161
Date Updated: 2024-08-01T20:33:52.517Z
Date Published: 2024-04-25T02:32:08.686Z
Description:
In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received
clear text. This could allow an unauthenticated, remote attacker to
capture sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.broadcom.com/external/content/SecurityAdvisories/0/23284
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28491. | CVE ID: CVE-2023-28491
Date Updated: 2024-08-02T12:38:25.446Z
Date Published: 2023-12-20T17:23:19.842Z
Description:
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Slideshow Gallery LITE.This issue affects Slideshow Gallery LITE: from n/a through 1.7.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/slideshow-gallery/wordpress-slideshow-gallery-lite-plugin-1-7-6-sql-injection?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-20070. | CVE ID: CVE-2021-20070
Date Updated: 2024-08-03T17:30:07.114Z
Date Published: 2021-02-16T19:45:29
Description:
Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scriptings attacks via the virtualization.php dialogs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tenable.com/security/research/tra-2021-04
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-2439. | CVE ID: CVE-2008-2439
Date Updated: 2024-08-07T08:58:02.308Z
Date Published: 2008-10-03T15:00:00
Description:
Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vupen.com/english/advisories/2008/2711
- http://www.securityfocus.com/bid/31531
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt
- http://www.securitytracker.com/id?1020975
- http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt
- http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt
- http://secunia.com/advisories/32097
- https://exchange.xforce.ibmcloud.com/vulnerabilities/45597
- http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt
- http://www.securityfocus.com/archive/1/496970/100/0/threaded
- http://secunia.com/advisories/31343
- http://www.vupen.com/english/advisories/2008/2712
- http://secunia.com/secunia_research/2008-39/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-5314. | CVE ID: CVE-2014-5314
Date Updated: 2024-08-06T11:41:48.287Z
Date Published: 2014-11-24T02:00:00
Description:
Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/62248
- http://jvn.jp/en/jp/JVN14691234/index.html
- http://jvndb.jvn.jp/jvndb/JVNDB-2014-000130
- https://cs.cybozu.co.jp/2014/1110-2.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-17444. | CVE ID: CVE-2018-17444
Date Updated: 2024-08-05T10:47:04.951Z
Date Published: 2018-10-23T21:00:00
Description:
A Directory Traversal issue was discovered in Citrix SD-WAN 10.1.0 and NetScaler SD-WAN 9.3.x before 9.3.6 and 10.0.x before 10.0.4.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.citrix.com/article/CTX236992
- http://www.securityfocus.com/bid/105711
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-35948. | CVE ID: CVE-2021-35948
Date Updated: 2024-08-04T00:47:42.173Z
Date Published: 2021-09-07T19:08:12
Description:
Session fixation on password protected public links in the ownCloud Server before 10.8.0 allows an attacker to bypass the password protection when they can force a target client to use a controlled cookie.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://doc.owncloud.com/server/admin_manual/release_notes.html
- https://owncloud.com/security-advisories/cve-2021-35948/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-3344. | CVE ID: CVE-2010-3344
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-3158. | CVE ID: CVE-2012-3158
Date Updated: 2024-08-06T19:57:49.907Z
Date Published: 2012-10-16T23:00:00
Description:
Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/51177
- http://rhn.redhat.com/errata/RHSA-2012-1462.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:102
- http://secunia.com/advisories/53372
- http://security.gentoo.org/glsa/glsa-201308-06.xml
- http://www.debian.org/security/2012/dsa-2581
- http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html
- http://secunia.com/advisories/51309
- https://exchange.xforce.ibmcloud.com/vulnerabilities/79382
- http://www.ubuntu.com/usn/USN-1621-1
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-3695. | CVE ID: CVE-2010-3695
Date Updated: 2024-08-07T03:18:52.953Z
Date Published: 2011-03-31T22:00:00
Description:
Cross-site scripting (XSS) vulnerability in fetchmailprefs.php in Horde IMP before 4.3.8, and Horde Groupware Webmail Edition before 1.2.7, allows remote attackers to inject arbitrary web script or HTML via the fm_id parameter in a fetchmail_prefs_save action, related to the Fetchmail configuration.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.horde.org/archives/announce/2010/000568.html
- http://www.securityfocus.com/bid/43515
- http://www.debian.org/security/2011/dsa-2204
- http://git.horde.org/diff.php/imp/fetchmailprefs.php?rt=horde&r1=1.39.4.10&r2=1.39.4.11
- http://openwall.com/lists/oss-security/2010/10/01/6
- http://cvs.horde.org/diff.php/imp/docs/CHANGES?rt=horde&r1=1.699.2.424&r2=1.699.2.430&ty=h
- http://www.securityfocus.com/archive/1/513992/100/0/threaded
- http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0379.html
- http://lists.horde.org/archives/announce/2010/000558.html
- http://git.horde.org/diff.php/groupware/docs/webmail/CHANGES?rt=horde&r1=1.35.2.11&r2=1.35.2.13&ty=h
- http://www.vupen.com/english/advisories/2011/0769
- http://securityreason.com/securityalert/8170
- http://secunia.com/advisories/41627
- https://bugzilla.redhat.com/show_bug.cgi?id=641069
- http://www.vupen.com/english/advisories/2010/2513
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598584
- http://openwall.com/lists/oss-security/2010/09/30/8
- http://openwall.com/lists/oss-security/2010/09/30/7
- http://secunia.com/advisories/43896
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.