instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2009-0292.
CVE ID: CVE-2009-0292 Date Updated: 2024-08-07T04:31:25.466Z Date Published: 2009-01-27T20:00:00 Description: SQL injection vulnerability in show_cat2.php in SHOP-INET 4 allows remote attackers to execute arbitrary SQL commands via the grid parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7874 - http://osvdb.org/51615 - http://secunia.com/advisories/33660 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26284.
CVE ID: CVE-2022-26284 Date Updated: 2024-08-03T04:56:37.931Z Date Published: 2022-03-21T22:25:21 Description: Simple Client Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter in the manage_client endpoint. This vulnerability allows attackers to dump the application's database via crafted HTTP requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Dir0x/SQLi-exploit---Simple-Client-Management-System/blob/main/manage_client_sqli.py No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-9498.
CVE ID: CVE-2020-9498 Date Updated: 2024-08-04T10:34:39.028Z Date Published: 2020-07-02T12:32:44 Description: Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed with the privileges of therunning guacd process. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread.html/rff824b38ebd2fddc726b816f0e509696b83b9f78979d0cd021ca623b%40%3Cannounce.guacamole.apache.org%3E - https://lists.apache.org/thread.html/r26fb170edebff842c74aacdb1333c1338f0e19e5ec7854d72e4680fc%40%3Cannounce.apache.org%3E - https://research.checkpoint.com/2020/apache-guacamole-rce/ - https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44525 - https://lists.debian.org/debian-lts-announce/2020/11/msg00010.html - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TVV5K2X4EXSAVUUL7IJ3MUJ3ADWMVSBM/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WNS7UHBOFV6JHWH5XOEZTE3BREGRSSQ3/ - https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E - https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7%40%3Cannounce.apache.org%3E No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4577.
CVE ID: CVE-2017-4577 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3818.
CVE ID: CVE-2012-3818 Date Updated: 2024-09-17T00:35:27.426Z Date Published: 2012-06-29T17:00:00Z Description: The fpm exporter in Revelation 0.4.13-2 and earlier encrypts the version number but not the password when exporting a file, which might allow local users to obtain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://als.regnet.cz/fpm2/feedback/2 - http://knoxin.blogspot.co.uk/2012/06/revelation-password-manager-considered.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-16127.
CVE ID: CVE-2020-16127 Date Updated: 2024-09-16T17:58:49.219Z Date Published: 2020-11-11T04:10:15.512976Z Description: An Ubuntu-specific modification to AccountsService in versions before 0.6.55-0ubuntu13.2, among other earlier versions, would perform unbounded read operations on user-controlled ~/.pam_environment files, allowing an infinite loop if /dev/zero is symlinked to this location. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securitylab.github.com/advisories/GHSL-2020-187-accountsservice-drop-privs-DOS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27992.
CVE ID: CVE-2020-27992 Date Updated: 2024-08-04T16:25:44.118Z Date Published: 2020-10-31T16:14:45 Description: Dr.Fone 3.0.0 allows local users to gain privileges via a Trojan horse DriverInstall.exe because %PROGRAMFILES(X86)%\Wondershare\dr.fone\Library\DriverInstaller has Full Control for BUILTIN\Users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://drfone.wondershare.com - https://packetstormsecurity.com/files/159775/Wondershare-Dr.Fone-3.0.0-Unquoted-Service-Path.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4279.
CVE ID: CVE-2022-4279 Date Updated: 2024-08-03T01:34:49.920Z Date Published: 2022-12-03T00:00:00 Description: A vulnerability classified as problematic has been found in SourceCodester Human Resource Management System 1.0. Affected is an unknown function of the file /hrm/employeeview.php. The manipulation of the argument search leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214776. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/leecybersec/bug-report/tree/main/sourcecodester/oretnom23/hrm/employee-view-xss - https://vuldb.com/?id.214776 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-22274.
CVE ID: CVE-2020-22274 Date Updated: 2024-08-04T14:51:10.308Z Date Published: 2020-11-04T17:06:20 Description: JomSocial (Joomla Social Network Extention) 4.7.6 allows CSV injection via a customer's profile. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gofile.io/?c=LsAOtL - http://uploadboy.me/iypl38958pon/JomSocial.mp4.html - https://cert.ikiu.ac.ir/public-files/news/document/CVE-99/CVE-2020-22274.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-27529.
CVE ID: CVE-2022-27529 Date Updated: 2024-08-03T05:32:58.676Z Date Published: 2022-04-18T16:20:27 Description: A maliciously crafted PICT, BMP, PSD or TIF file in Autodesk AutoCAD 2022, 2021, 2020, 2019 may be used to write beyond the allocated buffer while parsing PICT, BMP, PSD or TIF file. This vulnerability may be exploited to execute arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.autodesk.com/trust/security-advisories/adsk-sa-2022-0004 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-1177.
CVE ID: CVE-2021-1177 Date Updated: 2024-09-16T23:06:41.305Z Date Published: 2021-01-13T21:20:48.056405Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an authenticated, remote attacker to execute arbitrary code or cause an affected device to restart unexpectedly. The vulnerabilities are due to improper validation of user-supplied input in the web-based management interface. An attacker could exploit these vulnerabilities by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system or cause the device to reload, resulting in a denial of service (DoS) condition. To exploit these vulnerabilities, an attacker would need to have valid administrator credentials on the affected device. Cisco has not released software updates that address these vulnerabilities. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rv-overflow-WUnUgv4U No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-33106.
CVE ID: CVE-2022-33106 Date Updated: 2024-08-03T08:01:20.079Z Date Published: 2022-10-12T00:00:00 Description: WiJungle NGFW Version U250 was discovered to be vulnerable to No Rate Limit attack, allowing the attacker to brute force the admin password leading to Account Take Over. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://wijungle.com - https://hexisanoob.gitbook.io/hexisanoob/cves/cve-2022-33106 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5877.
CVE ID: CVE-2014-5877 Date Updated: 2024-08-06T11:55:50.203Z Date Published: 2014-09-11T10:00:00 Description: The TV Guide (aka net.micene.minigroup.palimpsests.lite) application 5.4.3 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing - http://www.kb.cert.org/vuls/id/354753 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15366.
CVE ID: CVE-2018-15366 Date Updated: 2024-08-05T09:54:03.416Z Date Published: 2018-10-23T14:00:00 Description: A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx - http://www.securityfocus.com/bid/105757 - https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx - https://www.zerodayinitiative.com/advisories/ZDI-18-1293/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4136.
CVE ID: CVE-2011-4136 Date Updated: 2024-08-07T00:01:50.498Z Date Published: 2011-10-19T10:00:00 Description: django.contrib.sessions in Django before 1.2.7 and 1.3.x before 1.3.1, when session data is stored in the cache, uses the root namespace for both session identifiers and application-data keys, which allows remote attackers to modify a session by triggering use of a key that is equal to that session's identifier. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hermes.opensuse.org/messages/14700881 - http://www.debian.org/security/2011/dsa-2332 - https://bugzilla.redhat.com/show_bug.cgi?id=737366 - http://secunia.com/advisories/46614 - http://openwall.com/lists/oss-security/2011/09/11/1 - https://www.djangoproject.com/weblog/2011/sep/10/127/ - http://openwall.com/lists/oss-security/2011/09/13/2 - https://www.djangoproject.com/weblog/2011/sep/09/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32057.
CVE ID: CVE-2023-32057 Date Updated: 2024-08-02T15:03:28.741Z Date Published: 2023-07-11T17:03:17.264Z Description: Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32057 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0339.
CVE ID: CVE-2009-0339 Date Updated: 2024-08-07T04:31:25.637Z Date Published: 2009-01-29T18:09:00 Description: SQL injection vulnerability in inc_webblogmanager.asp in DMXReady Blog Manager allows remote attackers to execute arbitrary SQL commands via the itemID parameter in a view action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/500146/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/48054 - http://dmxready.helpserve.com/index.php?_m=news&_a=viewnews&newsid=12 - http://www.securityfocus.com/bid/33314 - http://secunia.com/advisories/33601 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-12832.
CVE ID: CVE-2017-12832 Date Updated: 2019-03-05T19:57:01 Date Published: 2019-03-05T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5863.
CVE ID: CVE-2023-5863 Date Updated: 2024-09-05T17:50:14.983Z Date Published: 2023-10-31T00:00:19.197Z Description: Cross-site Scripting (XSS) - Reflected in GitHub repository thorsten/phpmyfaq prior to 3.2.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/fbfd4e84-61fb-4063-8f11-15877b8c1f6f - https://github.com/thorsten/phpmyfaq/commit/97e813dcd2022bd10a8770569a8b02591716365f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3375.
CVE ID: CVE-2008-3375 Date Updated: 2024-08-07T09:37:26.729Z Date Published: 2008-07-30T17:00:00 Description: The jrCookie function in includes/jamroom-misc.inc.php in JamRoom before 3.4.0 allows remote attackers to bypass authentication and gain administrative access via a boolean value within serialized data in a JMU_Cookie cookie. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/31249 - http://www.gulftech.org/?node=research&article_id=00117-07282008 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44048 - http://www.jamroom.net/phpBB2/viewtopic.php?t=24454 - http://www.securityfocus.com/archive/1/494820/100/0/threaded - http://www.jamroom.net/index.php?m=td_tracker&o=view&id=1178 - http://securityreason.com/securityalert/4069 - http://www.securityfocus.com/bid/30406 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36697.
CVE ID: CVE-2020-36697 Date Updated: 2024-08-04T17:37:06.636Z Date Published: 2023-06-07T01:51:10.220Z Description: The WP GDPR plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in versions up to, and including, 2.1.1. This makes it possible for unauthenticated attackers to delete any comment and modify the plugin’s settings. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/032e775a-97be-4d93-bac3-094e35be4b11?source=cve - https://blog.nintechnet.com/unauthenticated-stored-xss-and-content-spoofing-vulnerabilities-in-wordpress-wp-gdpr-plugin-unpatched/ - https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-wp-gdpr-multiple-vulnerabilities-2-1-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-1639.
CVE ID: CVE-2014-1639 Date Updated: 2024-08-06T09:50:10.989Z Date Published: 2014-01-28T00:00:00 Description: syncevo/installcheck-local.sh in syncevolution before 1.3.99.7 uses mktemp to create a safe temporary file but appends a suffix to the original filename and writes to this new filename, which allows local users to overwrite arbitrary files via a symlink attack on the new filename. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2014/01/22/4 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90662 - http://www.osvdb.org/102380 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736357 - http://www.securityfocus.com/bid/65098 - http://www.openwall.com/lists/oss-security/2014/01/22/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-4612.
CVE ID: CVE-2011-4612 Date Updated: 2024-09-16T17:22:55.558Z Date Published: 2012-11-20T00:00:00Z Description: icecast before 2.3.3 allows remote attackers to inject control characters such as newlines into the error loc (error.log) via a crafted URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=768176 - http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090668.html - http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090695.html - http://www.icecast.org/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-5235.
CVE ID: CVE-2016-5235 Date Updated: 2024-08-06T00:53:48.973Z Date Published: 2019-07-01T15:54:40 Description: A Cross Site Scripting (XSS) vulnerability in versions of F5 WebSafe Dashboard 3.9.x and earlier, aka F5 WebSafe Alert Server, allows an unauthenticated user to inject HTML via a crafted alert. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K48572812 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-35501.
CVE ID: CVE-2020-35501 Date Updated: 2024-08-04T17:02:08.109Z Date Published: 2022-03-30T00:00:00 Description: A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1908577 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-42410.
CVE ID: CVE-2022-42410 Date Updated: 2024-08-03T13:10:40.430Z Date Published: 2023-01-26T00:00:00 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of PGM files. Crafted data in a PGM file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-18365. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tracker-software.com/product/pdf-xchange-editor/history - https://www.zerodayinitiative.com/advisories/ZDI-22-1355/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-6418.
CVE ID: CVE-2023-6418 Date Updated: 2024-08-02T08:28:21.816Z Date Published: 2023-11-30T13:14:19.950Z Description: A vulnerability has been reported in Voovi Social Networking Script that affects version 1.0 and consists of a SQL injection via videos.php in the id parameter. Exploitation of this vulnerability could allow a remote attacker to send a specially crafted SQL query to the server and retrieve all the information stored in the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-voovi-social-networking-script No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44390.
CVE ID: CVE-2022-44390 Date Updated: 2024-08-03T13:54:02.551Z Date Published: 2022-11-14T00:00:00 Description: A cross-site scripting (XSS) vulnerability in EyouCMS V1.5.9-UTF8-SP1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Public Security Record Number text field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/weng-xianhu/eyoucms/issues/31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0904.
CVE ID: CVE-2024-0904 Date Updated: 2024-08-01T18:18:19.034Z Date Published: 2024-05-06T06:00:01.281Z Description: The Fancy Product Designer WordPress plugin before 6.1.81 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/baf4afc9-c20e-47d6-a798-75e15652d1e3/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20856.
CVE ID: CVE-2021-20856 Date Updated: 2024-08-03T17:53:22.658Z Date Published: 2021-12-01T02:15:47 Description: Cross-site scripting vulnerability in ELECOM LAN routers (WRH-733GBK firmware v1.02.9 and prior and WRH-733GWH firmware v1.02.9 and prior) allows a remote authenticated attacker to inject an arbitrary script via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.elecom.co.jp/news/security/20211130-01/ - https://jvn.jp/en/jp/JVN88993473/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-25037.
CVE ID: CVE-2018-25037 Date Updated: 2024-08-05T12:26:39.598Z Date Published: 2022-06-12T07:40:24 Description: A vulnerability was found in Thomson TCW710 ST5D.10.05 and classified as problematic. Affected by this issue is some unknown functionality of the file /goform/RgDdns. The manipulation of the argument DdnsHostName with the input ><script>alert(1)</script> as part of POST Request leads to cross site scripting (Persistent). The attack may be launched remotely. The exploit has been disclosed to the public and may be used. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://alquimistadesistemas.com/auditando-router-thomson-tcw710 - https://vuldb.com/?id.126698 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12629.
CVE ID: CVE-2020-12629 Date Updated: 2024-08-04T12:04:21.772Z Date Published: 2020-05-04T12:28:46 Description: include/class.sla.php in osTicket before 1.14.2 allows XSS via the SLA Name. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/osticket/osticket/commit/fc4c8608fa122f38673b9dddcb8fef4a15a9c884 - https://github.com/osTicket/osTicket/compare/v1.14.1...v1.14.2 - https://www.exploit-db.com/exploits/48413 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20596.
CVE ID: CVE-2023-20596 Date Updated: 2024-08-02T09:05:36.288Z Date Published: 2023-11-14T18:55:14.665Z Description: Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7011 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20672.
CVE ID: CVE-2022-20672 Date Updated: 2024-09-16T20:21:32.690Z Date Published: 2022-05-27T14:05:46.295284Z Description: Multiple vulnerabilities in the web-based management interface of Cisco Common Services Platform Collector (CSPC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface. These vulnerabilities are due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit these vulnerabilities by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-multi-xss-tyDFjhwb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24455.
CVE ID: CVE-2021-24455 Date Updated: 2024-08-03T19:35:19.191Z Date Published: 2021-08-02T10:32:01 Description: The Tutor LMS – eLearning and online course solution WordPress plugin before 1.9.2 did not escape the Summary field of Announcements (when outputting it in an attribute), which can be created by users as low as Tutor Instructor. This lead to a Stored Cross-Site Scripting issue, which is triggered when viewing the Announcements list, and could result in privilege escalation when viewed by an admin. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/9ef14cf1-1e04-4125-a296-9aa5388612f9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31837.
CVE ID: CVE-2024-31837 Date Updated: 2024-08-02T01:59:49.983Z Date Published: 2024-04-30T00:00:00 Description: DMitry (Deepmagic Information Gathering Tool) 1.3a has a format-string vulnerability, with a threat model similar to CVE-2017-7938. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jaygreig86/dmitry/pull/12 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1185
The MITRE ATT&CK technique T1185: Man in the Browser is related to the vulnerability CVE-CVE-2018-11073. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact.
Provide detailed information about CVE-2023-22645.
CVE ID: CVE-2023-22645 Date Updated: 2024-08-02T10:13:49.453Z Date Published: 2023-04-19T00:00:00 Description: An Improper Privilege Management vulnerability in SUSE kubewarden allows attackers to read arbitrary secrets if they get access to the ServiceAccount kubewarden-controller This issue affects: SUSE kubewarden kubewarden-controller versions prior to 1.6.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.suse.com/show_bug.cgi?id=1210218 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-9761.
CVE ID: CVE-2019-9761 Date Updated: 2024-08-04T22:01:54.149Z Date Published: 2019-03-14T01:00:00 Description: An XXE issue was discovered in PHPSHE 1.7, which can be used to read any file in the system or scan the internal network without authentication. This occurs because of the call to wechat_getxml in include/plugin/payment/wechat/notify_url.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/koyshe/phpshe/issues/ITC0C No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0753.
CVE ID: CVE-2015-0753 Date Updated: 2024-08-06T04:17:32.789Z Date Published: 2015-05-29T15:00:00 Description: SQL injection vulnerability in Cisco Unified Email Interaction Manager (EIM) and Unified Web Interaction Manager (WIM) 9.0(2) allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka Bug ID CSCuu30028. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1032422 - http://tools.cisco.com/security/center/viewAlert.x?alertId=39013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43512.
CVE ID: CVE-2023-43512 Date Updated: 2024-08-02T19:44:43.288Z Date Published: 2024-01-02T05:38:55.097Z Description: Transient DOS while parsing GATT service data when the total amount of memory that is required by the multiple services is greater than the actual size of the services buffer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/january-2024-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7224.
CVE ID: CVE-2020-7224 Date Updated: 2024-08-04T09:25:48.420Z Date Published: 2020-04-16T17:26:45 Description: The Aviatrix OpenVPN client through 2.5.7 on Linux, macOS, and Windows is vulnerable when OpenSSL parameters are altered from the issued value set; the parameters could allow unauthorized third-party libraries to load. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.aviatrix.com/HowTos/security_bulletin_article.html - https://docs.aviatrix.com/#security-bulletin - https://docs.aviatrix.com/HowTos/security_bulletin_article.html#article-avxsb-00001 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44117.
CVE ID: CVE-2022-44117 Date Updated: 2024-08-03T13:47:05.630Z Date Published: 2022-11-23T00:00:00 Description: Boa 0.94.14rc21 is vulnerable to SQL Injection via username. NOTE: the is disputed by multiple third parties because Boa does not ship with any support for SQL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/yinfei6/20bd1d3ebe0803c2d8756ace3e173676 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8886.
CVE ID: CVE-2016-8886 Date Updated: 2024-08-06T02:35:02.214Z Date Published: 2017-03-23T18:00:00 Description: The jas_malloc function in libjasper/base/jas_malloc.c in JasPer before 1.900.11 allows remote attackers to have unspecified impact via a crafted file, which triggers a memory allocation failure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/22FCKKHQCQ3S6TZY5G44EFDTMWOJXJRD/ - https://blogs.gentoo.org/ago/2016/10/18/jasper-memory-allocation-failure-in-jas_malloc-jas_malloc-c - http://www.securityfocus.com/bid/93839 - http://www.openwall.com/lists/oss-security/2016/10/25/11 - https://bugzilla.redhat.com/show_bug.cgi?id=1388880 - http://www.openwall.com/lists/oss-security/2016/10/23/2 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EGI2FZQLOTSZI3VA4ECJERI74SMNQDL4/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-1758.
CVE ID: CVE-2010-1758 Date Updated: 2024-08-07T01:35:53.620Z Date Published: 2010-06-11T19:00:00 Description: Use-after-free vulnerability in WebKit in Apple Safari before 5.0 on Mac OS X 10.5 through 10.6 and Windows, and before 4.1 on Mac OS X 10.4, allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via vectors involving DOM Range objects. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.mandriva.com/security/advisories?name=MDVSA-2011:039 - http://support.apple.com/kb/HT4220 - http://www.vupen.com/english/advisories/2010/2722 - http://secunia.com/advisories/43068 - http://www.ubuntu.com/usn/USN-1006-1 - http://secunia.com/advisories/41856 - http://www.vupen.com/english/advisories/2011/0212 - http://support.apple.com/kb/HT4225 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00000.html - http://secunia.com/advisories/40196 - http://secunia.com/advisories/40105 - http://www.vupen.com/english/advisories/2010/1373 - http://lists.apple.com/archives/security-announce/2010//Jun/msg00002.html - http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00006.html - http://secunia.com/advisories/42314 - http://www.vupen.com/english/advisories/2010/1512 - http://www.securityfocus.com/bid/40620 - http://www.vupen.com/english/advisories/2011/0552 - http://support.apple.com/kb/HT4456 - http://securitytracker.com/id?1024067 - http://support.apple.com/kb/HT4196 - http://lists.apple.com/archives/security-announce/2010/Jun/msg00003.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7335 - http://lists.apple.com/archives/security-announce/2010//Nov/msg00003.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4628.
CVE ID: CVE-2010-4628 Date Updated: 2024-08-07T03:51:17.919Z Date Published: 2010-12-30T20:00:00 Description: member.php in MyBB (aka MyBulletinBoard) before 1.4.12 makes a certain superfluous call to the SQL COUNT function, which allows remote attackers to cause a denial of service (resource consumption) by making requests to member.php that trigger scans of the entire users table. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.mybb.com/2010/04/13/mybb-1-4-12-released-security-maintenance-update/ - http://openwall.com/lists/oss-security/2010/10/08/7 - http://openwall.com/lists/oss-security/2010/10/11/8 - https://exchange.xforce.ibmcloud.com/vulnerabilities/64514 - http://openwall.com/lists/oss-security/2010/12/06/2 - http://dev.mybboard.net/issues/662 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5040.
CVE ID: CVE-2020-5040 Date Updated: 2021-01-05T18:31:03 Date Published: 2021-01-05T18:31:03 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41321.
CVE ID: CVE-2023-41321 Date Updated: 2024-09-23T20:24:39.908Z Date Published: 2023-09-26T21:16:31.589Z Description: GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. An API user can enumerate sensitive fields values on resources on which he has read access. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/glpi-project/glpi/security/advisories/GHSA-3fxw-j5rj-w836 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0064.
CVE ID: CVE-2023-0064 Date Updated: 2024-08-02T04:54:32.602Z Date Published: 2023-03-06T13:34:06.078Z Description: The eVision Responsive Column Layout Shortcodes WordPress plugin through 2.3 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/97be5795-b5b8-40c7-80bf-7da95da7705a No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13963.
CVE ID: CVE-2020-13963 Date Updated: 2024-08-04T12:32:14.607Z Date Published: 2021-03-21T20:57:32 Description: SOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forum.soplanning.org/viewforum.php?f=8 - https://labs.integrity.pt/advisories/cve-2020-13963/ - https://cwe.mitre.org/data/definitions/321.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50424.
CVE ID: CVE-2023-50424 Date Updated: 2024-09-28T22:19:05.889Z Date Published: 2023-12-12T01:59:36.703Z Description: SAP BTP Security Services Integration Library ([Golang] github.com/sap/cloud-security-client-go) - versions < 0.17.0, allow under certain conditions an escalation of privileges. On successful exploitation, an unauthenticated attacker can obtain arbitrary permissions within the application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://me.sap.com/notes/3411067 - https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html - https://github.com/SAP/cloud-security-client-go - https://pkg.go.dev/github.com/sap/cloud-security-client-go@v0.17.0 - https://blogs.sap.com/2023/12/12/unveiling-critical-security-updates-sap-btp-security-note-3411067/ - https://github.com/SAP/cloud-security-services-integration-library/security/advisories/GHSA-59c9-pxq8-9c73 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17524.
CVE ID: CVE-2019-17524 Date Updated: 2024-08-05T01:40:15.971Z Date Published: 2019-11-13T14:36:01 Description: An XSS vulnerability on Technicolor TC7300 STFA.51.20 devices allows remote attackers to inject arbitrary web script via the "Connected Clients" field to /wlanAccess.asp. An intranet host can use a crafted hostname to exploit this. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.technicolor.com/news - https://gitlab.com/luiss/cve_repo/blob/master/CVE-2019-17523/README.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-0368.
CVE ID: CVE-2008-0368 Date Updated: 2024-08-07T07:39:35.185Z Date Published: 2008-01-18T23:00:00 Description: onedcu in IBM Informix Dynamic Server (IDS) 10.x before 10.00.xC8 allows local users to create arbitrary files via the Trace file argument. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/27328 - http://secunia.com/advisories/28534 - http://www.vupen.com/english/advisories/2008/0169 - https://exchange.xforce.ibmcloud.com/vulnerabilities/39751 - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=651 - http://www-1.ibm.com/support/docview.wss?uid=swg1IC54307 - http://www.securitytracker.com/id?1019237 - http://www-1.ibm.com/support/docview.wss?uid=swg27011556 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10110.
CVE ID: CVE-2018-10110 Date Updated: 2024-08-05T07:32:01.168Z Date Published: 2018-04-18T21:00:00 Description: D-Link DIR-615 T1 devices allow XSS via the Add User feature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/147184/D-Link-DIR-615-Cross-Site-Scripting.html - https://www.exploit-db.com/exploits/44473/ - https://hacksayan.wordpress.com/d-link-dir-615-wireless-router-persistent-cross-site-scripting-xss/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20208.
CVE ID: CVE-2019-20208 Date Updated: 2024-08-05T02:39:09.409Z Date Published: 2020-01-01T23:26:32 Description: dimC_Read in isomedia/box_code_3gpp.c in GPAC 0.8.0 has a stack-based buffer overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gpac/gpac/issues/1348 - https://lists.debian.org/debian-lts-announce/2020/01/msg00017.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30145.
CVE ID: CVE-2021-30145 Date Updated: 2024-08-03T22:24:59.537Z Date Published: 2021-05-18T13:34:53 Description: A format string vulnerability in mpv through 0.33.0 allows user-assisted remote attackers to achieve code execution via a crafted m3u playlist file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://mpv.io - https://github.com/mpv-player/mpv/releases/tag/v0.33.1 - https://devel0pment.de/?p=2217 - https://github.com/mpv-player/mpv/commit/d0c530919d8cd4d7a774e38ab064e0fabdae34e6 - https://security.gentoo.org/glsa/202107-46 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2362.
CVE ID: CVE-2017-2362 Date Updated: 2024-08-05T13:55:04.109Z Date Published: 2017-02-20T08:35:00 Description: An issue was discovered in certain Apple products. iOS before 10.2.1 is affected. Safari before 10.0.3 is affected. tvOS before 10.1.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/41213/ - http://www.securityfocus.com/bid/95727 - https://support.apple.com/HT207485 - https://security.gentoo.org/glsa/201706-15 - https://support.apple.com/HT207484 - https://support.apple.com/HT207482 - http://www.securitytracker.com/id/1037668 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-44827.
CVE ID: CVE-2021-44827 Date Updated: 2024-08-04T04:32:13.206Z Date Published: 2022-03-04T21:27:48 Description: There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tp-link.com/us/security - https://Full-Disclosure.eu - https://full-disclosure.eu/reports/2022/CVE-2021-44827-tplink-authenticated-remote-code-execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15884.
CVE ID: CVE-2018-15884 Date Updated: 2024-08-05T10:10:05.259Z Date Published: 2018-08-28T19:00:00 Description: RICOH MP C4504ex devices allow HTML Injection via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/149082/RICOH-MP-C4504ex-Cross-Site-Request-Forgery.html - https://www.exploit-db.com/exploits/45264/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-10797.
CVE ID: CVE-2020-10797 Date Updated: 2024-08-04T11:14:15.605Z Date Published: 2020-04-29T13:29:52 Description: An XSS vulnerability resides in the hostname field of the diag_ping.php page in pfsense before 2.4.5 version. After passing inputs to the command and executing this command, the $result variable is not sanitized before it is printed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://redmine.pfsense.org/issues/10355 - https://github.com/pfsense/pfsense/commit/cc3990a334059018b004c91eeb66c147d8afe83d - https://docs.netgate.com/pfsense/en/latest/releases/2-4-5-new-features-and-changes.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0884.
CVE ID: CVE-2023-0884 Date Updated: 2023-02-23T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-40480.
CVE ID: CVE-2021-40480 Date Updated: 2024-08-04T02:44:10.561Z Date Published: 2021-10-13T00:27:28 Description: Microsoft Office Visio Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-40480 - https://www.zerodayinitiative.com/advisories/ZDI-21-1159/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2924.
CVE ID: CVE-2019-2924 Date Updated: 2024-08-04T19:03:43.371Z Date Published: 2019-10-16T17:40:54 Description: Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Security: Encryption). Supported versions that are affected are 5.6.45 and prior and 5.7.27 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data. CVSS 3.0 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html - https://security.netapp.com/advisory/ntap-20191017-0002/ - https://usn.ubuntu.com/4195-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1007.
CVE ID: CVE-2009-1007 Date Updated: 2024-08-07T04:57:17.573Z Date Published: 2009-10-22T18:00:00 Description: Unspecified vulnerability in the Data Mining component in Oracle Database 10.2.0.4 allows remote authenticated users to affect confidentiality, integrity, and availability, related to SYS.DMP_SYS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/36750 - http://secunia.com/advisories/37027 - http://www.securitytracker.com/id?1023057 - http://www.us-cert.gov/cas/techalerts/TA09-294A.html - http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1474.
CVE ID: CVE-2023-1474 Date Updated: 2024-08-02T05:49:11.550Z Date Published: 2023-03-17T14:39:53.522Z Description: A vulnerability classified as critical was found in SourceCodester Automatic Question Paper Generator System 1.0. This vulnerability affects unknown code of the file users/question_papers/manage_question_paper.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-223336. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.223336 - https://vuldb.com/?ctiid.223336 - https://github.com/19FF/bug_report/blob/main/SQLi.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16171.
CVE ID: CVE-2018-16171 Date Updated: 2024-08-05T10:17:38.199Z Date Published: 2019-01-09T22:00:00 Description: Directory traversal vulnerability in Cybozu Remote Service 3.0.0 to 3.1.8 allows remote attackers to execute Java code file on the server via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.cybozu.support/article/35259/ - https://jvn.jp/en/jp/JVN23161885/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-38991.
CVE ID: CVE-2023-38991 Date Updated: 2024-08-02T17:54:39.827Z Date Published: 2023-08-03T00:00:00 Description: An issue in the delete function in the ActModelController class of jeesite v1.2.6 allows authenticated attackers to arbitrarily delete models created by the Administrator. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/thinkgem/jeesite/issues/520 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4775.
CVE ID: CVE-2017-4775 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-5230.
CVE ID: CVE-2020-5230 Date Updated: 2024-08-04T08:22:09.097Z Date Published: 2020-01-30T20:55:14 Description: Opencast before 8.1 and 7.6 allows almost arbitrary identifiers for media packages and elements to be used. This can be problematic for operation and security since such identifiers are sometimes used for file system operations which may lead to an attacker being able to escape working directories and write files to other locations. In addition, Opencast's Id.toString(…) vs Id.compact(…) behavior, the latter trying to mitigate some of the file system problems, can cause errors due to identifier mismatch since an identifier may unintentionally change. This issue is fixed in Opencast 7.6 and 8.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/opencast/opencast/security/advisories/GHSA-w29m-fjp4-qhmq - https://github.com/opencast/opencast/commit/bbb473f34ab95497d6c432c81285efb0c739f317 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15613.
CVE ID: CVE-2020-15613 Date Updated: 2024-08-04T13:22:30.400Z Date Published: 2020-07-28T17:01:16 Description: This vulnerability allows remote attackers to execute arbitrary code on affected installations of CentOS Web Panel cwp-e17.0.9.8.923. Authentication is not required to exploit this vulnerability. The specific flaw exists within ajax_admin_apis.php. When parsing the line parameter, the process does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-9739. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-20-760/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-0401.
CVE ID: CVE-2011-0401 Date Updated: 2024-08-06T21:51:08.771Z Date Published: 2011-01-10T19:18:00 Description: Piwik before 1.1 does not properly limit the number of files stored under tmp/sessions/, which might allow remote attackers to cause a denial of service (inode consumption) by establishing many sessions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/45787 - http://dev.piwik.org/trac/ticket/1910 - http://dev.piwik.org/trac/ticket/1279#comment:13 - http://piwik.org/blog/2011/01/piwik-1-1-2/ - https://exchange.xforce.ibmcloud.com/vulnerabilities/64638 - http://osvdb.org/70381 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-8377.
CVE ID: CVE-2020-8377 Date Updated: 2021-04-13T20:41:21 Date Published: 2021-04-13T20:41:21 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4473.
CVE ID: CVE-2013-4473 Date Updated: 2024-08-06T16:45:14.622Z Date Published: 2013-11-23T11:00:00 Description: Stack-based buffer overflow in the extractPages function in utils/pdfseparate.cc in poppler before 0.24.2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a source filename. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugs.debian.org/723124 - http://secunia.com/advisories/56567 - http://security.gentoo.org/glsa/glsa-201401-21.xml - https://bugs.freedesktop.org/show_bug.cgi?id=69434 - http://www.ubuntu.com/usn/USN-2958-1 - http://cgit.freedesktop.org/poppler/poppler/commit/utils/pdfseparate.cc?id=b8682d868ddf7f741e93b - http://cgit.freedesktop.org/poppler/poppler/tree/NEWS - http://www.securityfocus.com/bid/63368 - http://www.openwall.com/lists/oss-security/2013/10/29/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-20250
CVE-CVE-2018-20250 is a vulnerability in WinRAR. It is related to the MITRE ATT&CK technique T1204.002: Malicious File. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2016-4912.
CVE ID: CVE-2016-4912 Date Updated: 2024-08-06T00:46:39.377Z Date Published: 2017-03-27T17:00:00 Description: The _xrealloc function in xlsp_xmalloc.c in OpenSLP 2.0.0 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a large number of crafted packets, which triggers a memory allocation failure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1329295 - https://security.gentoo.org/glsa/201707-05 - http://www.securitytracker.com/id/1035916 - http://www.openwall.com/lists/oss-security/2016/05/18/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-3100.
CVE ID: CVE-2009-3100 Date Updated: 2024-09-17T02:58:13.731Z Date Published: 2009-09-08T18:00:00Z Description: xscreensaver (aka Gnome-XScreenSaver) in Sun Solaris 9 and 10, OpenSolaris snv_109 through snv_122, and X11 6.4.1 on Solaris 8 does not properly handle Accessibility support, which allows local users to cause a denial of service (system hang) by locking the screen and then attempting to launch an Accessibility pop-up window, related to a regression in certain Solaris and OpenSolaris patches. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://bugs.opensolaris.org/view_bug.do?bug_id=6839026 - http://sunsolve.sun.com/search/document.do?assetkey=1-66-266469-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12335.
CVE ID: CVE-2020-12335 Date Updated: 2024-08-04T11:56:51.510Z Date Published: 2020-11-12T18:17:39 Description: Improper permissions in the installer for the Intel(R) Processor Identification Utility before version 6.4.0603 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00419 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1566.
CVE ID: CVE-2011-1566 Date Updated: 2024-08-06T22:28:41.818Z Date Published: 2011-04-05T15:00:00 Description: Directory traversal vulnerability in dc.exe 9.00.00.11059 and earlier in 7-Technologies Interactive Graphical SCADA System (IGSS) allows remote attackers to execute arbitrary programs via ..\ (dot dot backslash) sequences in opcodes (1) 0xa and (2) 0x17 to TCP port 12397. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/46936 - http://www.us-cert.gov/control_systems/pdf/ICS-ALERT-11-080-03.pdf - http://aluigi.org/adv/igss_8-adv.txt - http://secunia.com/advisories/43849 - http://www.vupen.com/english/advisories/2011/0741 - http://www.exploit-db.com/exploits/17024 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-4785.
CVE ID: CVE-2020-4785 Date Updated: 2024-09-16T17:29:01.679Z Date Published: 2020-11-03T13:25:21.789171Z Description: IBM App Connect Enterprise Certified Container 1.0.0, 1.0.1, 1.0.2, 1.0.3, and 1.0.4 could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the victim. IBM X-Force ID: 189219. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/6357899 - https://exchange.xforce.ibmcloud.com/vulnerabilities/189219 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2018-7499
CVE-CVE-2018-7499 is a vulnerability in WebAccess. It is related to the MITRE ATT&CK technique T1574: Hijack Execution Flow. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2021-37706.
CVE ID: CVE-2021-37706 Date Updated: 2024-08-04T01:23:01.503Z Date Published: 2021-12-22T00:00:00 Description: PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE. In affected versions if the incoming STUN message contains an ERROR-CODE attribute, the header length is not checked before performing a subtraction operation, potentially resulting in an integer underflow scenario. This issue affects all users that use STUN. A malicious actor located within the victim’s network may forge and send a specially crafted UDP (STUN) message that could remotely execute arbitrary code on the victim’s machine. Users are advised to upgrade as soon as possible. There are no known workarounds. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/pjsip/pjproject/security/advisories/GHSA-2qpg-f6wf-w984 - https://github.com/pjsip/pjproject/commit/15663e3f37091069b8c98a7fce680dc04bc8e865 - http://seclists.org/fulldisclosure/2022/Mar/0 - http://packetstormsecurity.com/files/166225/Asterisk-Project-Security-Advisory-AST-2022-004.html - https://lists.debian.org/debian-lts-announce/2022/03/msg00035.html - https://security.gentoo.org/glsa/202210-37 - https://lists.debian.org/debian-lts-announce/2022/11/msg00021.html - https://www.debian.org/security/2022/dsa-5285 - https://lists.debian.org/debian-lts-announce/2023/08/msg00038.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22525.
CVE ID: CVE-2024-22525 Date Updated: 2024-08-20T15:23:47.440Z Date Published: N/A Description: dnspod-sr 0dfbd37 contains a SEGV. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/DNSPod/dnspod-sr/issues/61 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33545.
CVE ID: CVE-2024-33545 Date Updated: 2024-08-02T02:36:04.398Z Date Published: 2024-06-09T12:10:04.719Z Description: Missing Authorization vulnerability in AA-Team WZone.This issue affects WZone: from n/a through 14.0.10. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woozone/wordpress-wzone-plugin-14-0-10-unauthenticated-broken-access-control-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-30484.
CVE ID: CVE-2023-30484 Date Updated: 2024-08-02T14:28:51.294Z Date Published: 2023-05-25T09:32:29.514Z Description: Cross-Site Request Forgery (CSRF) vulnerability in uPress Enable Accessibility plugin <= 1.4 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/enable-accessibility/wordpress-enable-accessibility-plugin-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20427.
CVE ID: CVE-2022-20427 Date Updated: 2024-08-03T02:10:44.567Z Date Published: 2022-11-17T00:00:00 Description: In (TBD) of (TBD), there is a possible way to corrupt memory due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-239555070References: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2022-11-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11439.
CVE ID: CVE-2018-11439 Date Updated: 2024-08-05T08:10:14.085Z Date Published: 2018-05-30T13:00:00 Description: The TagLib::Ogg::FLAC::File::scan function in oggflacfile.cpp in TagLib 1.11.1 allows remote attackers to cause information disclosure (heap-based buffer over-read) via a crafted audio file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.debian.org/debian-lts-announce/2018/07/msg00022.html - http://seclists.org/fulldisclosure/2018/May/49 - https://lists.debian.org/debian-lts-announce/2021/09/msg00020.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0536.
CVE ID: CVE-2020-0536 Date Updated: 2024-08-04T06:02:52.338Z Date Published: 2020-06-15T14:00:25 Description: Improper input validation in the DAL subsystem for Intel(R) CSME versions before 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions before 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html - https://security.netapp.com/advisory/ntap-20200611-0006/ - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html - https://support.lenovo.com/de/en/product_security/len-30041 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-40543.
CVE ID: CVE-2024-40543 Date Updated: 2024-08-02T04:33:11.667Z Date Published: 2024-07-12T00:00:00 Description: PublicCMS v4.0.202302.e was discovered to contain a Server-Side Request Forgery (SSRF) via the component /admin/ueditor?action=catchimage. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitee.com/sanluan/PublicCMS/issues/IAAITR No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4742.
CVE ID: CVE-2013-4742 Date Updated: 2024-08-06T16:52:27.001Z Date Published: 2013-08-09T21:00:00 Description: Buffer overflow in NetWin SurgeFTP before 23d2 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a long string within the authentication request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/54188 - https://exchange.xforce.ibmcloud.com/vulnerabilities/85922 - http://osvdb.org/95582 - http://www.securityfocus.com/bid/61403 - http://archives.neohapsis.com/archives/bugtraq/2013-07/0149.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-25010.
CVE ID: CVE-2019-25010 Date Updated: 2024-08-05T03:00:19.018Z Date Published: 2020-12-31T08:31:16 Description: An issue was discovered in the failure crate through 2019-11-13 for Rust. Type confusion can occur when __private_get_type_id__ is overridden. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/rust-lang-nursery/failure/issues/336 - https://rustsec.org/advisories/RUSTSEC-2019-0036.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4161.
CVE ID: CVE-2024-4161 Date Updated: 2024-08-01T20:33:52.517Z Date Published: 2024-04-25T02:32:08.686Z Description: In Brocade SANnav, before Brocade SANnav v2.3.0, syslog traffic received clear text. This could allow an unauthenticated, remote attacker to capture sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.broadcom.com/external/content/SecurityAdvisories/0/23284 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28491.
CVE ID: CVE-2023-28491 Date Updated: 2024-08-02T12:38:25.446Z Date Published: 2023-12-20T17:23:19.842Z Description: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Slideshow Gallery LITE.This issue affects Slideshow Gallery LITE: from n/a through 1.7.6. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/slideshow-gallery/wordpress-slideshow-gallery-lite-plugin-1-7-6-sql-injection?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20070.
CVE ID: CVE-2021-20070 Date Updated: 2024-08-03T17:30:07.114Z Date Published: 2021-02-16T19:45:29 Description: Racom's MIDGE Firmware 4.4.40.105 contains an issue that allows attackers to conduct cross-site scriptings attacks via the virtualization.php dialogs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.tenable.com/security/research/tra-2021-04 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2439.
CVE ID: CVE-2008-2439 Date Updated: 2024-08-07T08:58:02.308Z Date Published: 2008-10-03T15:00:00 Description: Directory traversal vulnerability in the UpdateAgent function in TmListen.exe in the OfficeScanNT Listener service in the client in Trend Micro OfficeScan 7.3 Patch 4 build 1367 and other builds before 1372, OfficeScan 8.0 SP1 before build 1222, OfficeScan 8.0 SP1 Patch 1 before build 3087, and Worry-Free Business Security 5.0 before build 1220 allows remote attackers to read arbitrary files via directory traversal sequences in an HTTP request. NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vupen.com/english/advisories/2008/2711 - http://www.securityfocus.com/bid/31531 - http://www.trendmicro.com/ftp/documentation/readme/OSCE_7.3_Win_EN_CriticalPatch_B1372_Readme.txt - http://www.securitytracker.com/id?1020975 - http://www.trendmicro.com/ftp/documentation/readme/Readme_WFBS5.0_EN_CriticalPatch1414.txt - http://www.trendmicro.com/ftp/documentation/readme/OSCE8.0_SP1_Patch1_CriticalPatch_3087_Readme.txt - http://secunia.com/advisories/32097 - https://exchange.xforce.ibmcloud.com/vulnerabilities/45597 - http://www.trendmicro.com/ftp/documentation/readme/OSCE_8.0_SP1_Win_EN_CriticalPatch_B2439_Readme.txt - http://www.securityfocus.com/archive/1/496970/100/0/threaded - http://secunia.com/advisories/31343 - http://www.vupen.com/english/advisories/2008/2712 - http://secunia.com/secunia_research/2008-39/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5314.
CVE ID: CVE-2014-5314 Date Updated: 2024-08-06T11:41:48.287Z Date Published: 2014-11-24T02:00:00 Description: Buffer overflow in Cybozu Office 9 and 10 before 10.1.0, Mailwise 4 and 5 before 5.1.4, and Dezie 8 before 8.1.1 allows remote authenticated users to execute arbitrary code via e-mail messages. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/62248 - http://jvn.jp/en/jp/JVN14691234/index.html - http://jvndb.jvn.jp/jvndb/JVNDB-2014-000130 - https://cs.cybozu.co.jp/2014/1110-2.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-17444.
CVE ID: CVE-2018-17444 Date Updated: 2024-08-05T10:47:04.951Z Date Published: 2018-10-23T21:00:00 Description: A Directory Traversal issue was discovered in Citrix SD-WAN 10.1.0 and NetScaler SD-WAN 9.3.x before 9.3.6 and 10.0.x before 10.0.4. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.citrix.com/article/CTX236992 - http://www.securityfocus.com/bid/105711 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-35948.
CVE ID: CVE-2021-35948 Date Updated: 2024-08-04T00:47:42.173Z Date Published: 2021-09-07T19:08:12 Description: Session fixation on password protected public links in the ownCloud Server before 10.8.0 allows an attacker to bypass the password protection when they can force a target client to use a controlled cookie. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://doc.owncloud.com/server/admin_manual/release_notes.html - https://owncloud.com/security-advisories/cve-2021-35948/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3344.
CVE ID: CVE-2010-3344 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3158.
CVE ID: CVE-2012-3158 Date Updated: 2024-08-06T19:57:49.907Z Date Published: 2012-10-16T23:00:00 Description: Unspecified vulnerability in the MySQL Server component in Oracle MySQL 5.1.64 and earlier, and 5.5.26 and earlier, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Protocol. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/51177 - http://rhn.redhat.com/errata/RHSA-2012-1462.html - http://www.mandriva.com/security/advisories?name=MDVSA-2013:102 - http://secunia.com/advisories/53372 - http://security.gentoo.org/glsa/glsa-201308-06.xml - http://www.debian.org/security/2012/dsa-2581 - http://www.oracle.com/technetwork/topics/security/cpuoct2012-1515893.html - http://secunia.com/advisories/51309 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79382 - http://www.ubuntu.com/usn/USN-1621-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3695.
CVE ID: CVE-2010-3695 Date Updated: 2024-08-07T03:18:52.953Z Date Published: 2011-03-31T22:00:00 Description: Cross-site scripting (XSS) vulnerability in fetchmailprefs.php in Horde IMP before 4.3.8, and Horde Groupware Webmail Edition before 1.2.7, allows remote attackers to inject arbitrary web script or HTML via the fm_id parameter in a fetchmail_prefs_save action, related to the Fetchmail configuration. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.horde.org/archives/announce/2010/000568.html - http://www.securityfocus.com/bid/43515 - http://www.debian.org/security/2011/dsa-2204 - http://git.horde.org/diff.php/imp/fetchmailprefs.php?rt=horde&r1=1.39.4.10&r2=1.39.4.11 - http://openwall.com/lists/oss-security/2010/10/01/6 - http://cvs.horde.org/diff.php/imp/docs/CHANGES?rt=horde&r1=1.699.2.424&r2=1.699.2.430&ty=h - http://www.securityfocus.com/archive/1/513992/100/0/threaded - http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0379.html - http://lists.horde.org/archives/announce/2010/000558.html - http://git.horde.org/diff.php/groupware/docs/webmail/CHANGES?rt=horde&r1=1.35.2.11&r2=1.35.2.13&ty=h - http://www.vupen.com/english/advisories/2011/0769 - http://securityreason.com/securityalert/8170 - http://secunia.com/advisories/41627 - https://bugzilla.redhat.com/show_bug.cgi?id=641069 - http://www.vupen.com/english/advisories/2010/2513 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598584 - http://openwall.com/lists/oss-security/2010/09/30/8 - http://openwall.com/lists/oss-security/2010/09/30/7 - http://secunia.com/advisories/43896 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.