instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2022-25307.
CVE ID: CVE-2022-25307 Date Updated: 2024-08-03T04:36:06.776Z Date Published: 2022-02-24T18:27:12 Description: The WP Statistics WordPress plugin is vulnerable to Cross-Site Scripting due to insufficient escaping and sanitization of the platform parameter found in the ~/includes/class-wp-statistics-hits.php file which allows attackers to inject arbitrary web scripts onto several pages that execute when site administrators view a sites statistics, in versions up to and including 13.1.5. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2679983%40wp-statistics&new=2679983%40wp-statistics&sfp_email=&sfph_mail= - https://gist.github.com/Xib3rR4dAr/8090a6d026d4601083cff80aa80de7eb - https://www.wordfence.com/vulnerability-advisories/#CVE-2022-25307 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6663.
CVE ID: CVE-2020-6663 Date Updated: 2021-01-12T20:02:40 Date Published: 2021-01-12T20:02:40 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4910.
CVE ID: CVE-2024-4910 Date Updated: 2024-08-01T20:55:10.286Z Date Published: 2024-05-15T20:00:06.027Z Description: A vulnerability was found in Campcodes Complete Web-Based School Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /view/student_exam_mark_insert_form1.php. The manipulation of the argument grade leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-264445 was assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.264445 - https://vuldb.com/?ctiid.264445 - https://vuldb.com/?submit.333296 - https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System%20-%20sql/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%206.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36912.
CVE ID: CVE-2022-36912 Date Updated: 2024-08-03T10:14:29.499Z Date Published: 2022-07-27T14:27:18 Description: A missing permission check in Jenkins Openstack Heat Plugin 1.5 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20%281%29 - http://www.openwall.com/lists/oss-security/2022/07/27/1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2847.
CVE ID: CVE-2009-2847 Date Updated: 2024-08-07T06:07:36.606Z Date Published: 2009-08-18T20:41:00 Description: The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2009/08/04/1 - https://bugzilla.redhat.com/show_bug.cgi?id=515392 - http://secunia.com/advisories/37471 - http://www.ubuntu.com/usn/USN-852-1 - http://rhn.redhat.com/errata/RHSA-2009-1243.html - http://secunia.com/advisories/36759 - http://www.vmware.com/security/advisories/VMSA-2009-0016.html - http://www.openwall.com/lists/oss-security/2009/08/26/2 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10637 - http://www.securityfocus.com/archive/1/507985/100/0/threaded - http://secunia.com/advisories/36562 - https://www.redhat.com/archives/fedora-package-announce/2009-August/msg01256.html - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=0083fc2c50e6c5127c2802ad323adf8143ab7856 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8405 - http://www.exploit-db.com/exploits/9352 - http://secunia.com/advisories/36501 - http://www.openwall.com/lists/oss-security/2009/08/05/1 - http://www.redhat.com/support/errata/RHSA-2009-1438.html - http://www.vupen.com/english/advisories/2009/3316 - http://secunia.com/advisories/37105 - http://secunia.com/advisories/36136 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33820.
CVE ID: CVE-2024-33820 Date Updated: 2024-08-02T02:42:59.429Z Date Published: 2024-05-01T00:00:00 Description: Totolink AC1200 Wireless Dual Band Gigabit Router A3002R_V4 Firmware V4.0.0-B20230531.1404 is vulnerable to Buffer Overflow via the formWlEncrypt function of the boa server. Specifically, they exploit the length of the wlan_ssid field triggers the overflow. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/Swind1er/ee095fbfe13f77a5b45b39a5aa82bd17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-29363.
CVE ID: CVE-2021-29363 Date Updated: 2024-08-03T22:02:51.724Z Date Published: 2021-09-28T15:27:33 Description: A buffer overflow vulnerability in FORMATS!ReadRAS_W+0xa74 of Irfanview 4.57 allows attackers to execute arbitrary code via a crafted RLE file.0xa74 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/moshekaplan/Research/tree/main/IrfanView No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3189.
CVE ID: CVE-2015-3189 Date Updated: 2024-08-06T05:39:32.005Z Date Published: 2017-05-25T17:00:00 Description: With Cloud Foundry Runtime cf-release versions v208 or earlier, UAA Standalone versions 2.2.5 or earlier and Pivotal Cloud Foundry Runtime 1.4.5 or earlier, old Password Reset Links are not expired after the user changes their current email address to a new one. This vulnerability is applicable only when using the UAA internal user store for authentication. Deployments enabled for integration via SAML or LDAP are not affected. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pivotal.io/security/cve-2015-3189 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-3054.
CVE ID: CVE-2022-3054 Date Updated: 2024-08-03T01:00:10.481Z Date Published: 2022-09-26T15:01:33 Description: Insufficient policy enforcement in DevTools in Google Chrome prior to 105.0.5195.52 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/08/stable-channel-update-for-desktop_30.html - https://crbug.com/1290236 - https://security.gentoo.org/glsa/202209-23 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T4NMJURTG5RO3TGD7ZMIQ6Z4ZZ3SAVYE/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27294.
CVE ID: CVE-2024-27294 Date Updated: 2024-08-08T19:56:17.827Z Date Published: 2024-02-29T22:47:05.535Z Description: dp-golang is a Puppet module for Go installations. Prior to 1.2.7, dp-golang could install files — including the compiler binary — with the wrong ownership when Puppet was run as root and the installed package was On macOS: Go version 1.4.3 through 1.21rc3, inclusive, go1.4-bootstrap-20170518.tar.gz, or go1.4-bootstrap-20170531.tar.gz. The user and group specified in Puppet code were ignored for files within the archive. dp-puppet version 1.2.7 will recreate installations if the owner or group of any file or directory within that installation does not match the requested owner or group No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/danielparks/puppet-golang/security/advisories/GHSA-8h8m-h98f-vv84 - https://github.com/danielparks/puppet-golang/commit/1d0865b24071cb1c00d2fd8cb755d444e6e8f888 - https://github.com/danielparks/puppet-golang/commit/870724a7fef50208515da7bbfa9dfd5d6950e7f5 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22083.
CVE ID: CVE-2022-22083 Date Updated: 2024-08-03T03:00:55.224Z Date Published: 2022-06-14T09:40:51 Description: Denial of service due to memory corruption while extracting ape header from clips in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/june-2022-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11404.
CVE ID: CVE-2020-11404 Date Updated: 2021-12-20T22:46:10 Date Published: 2021-12-20T22:46:10 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2511.
CVE ID: CVE-2024-2511 Date Updated: 2024-08-01T19:18:46.968Z Date Published: 2024-04-08T13:51:12.349Z Description: Issue summary: Some non-default TLS server configurations can cause unbounded memory growth when processing TLSv1.3 sessions Impact summary: An attacker may exploit certain server configurations to trigger unbounded memory growth that would lead to a Denial of Service This problem can occur in TLSv1.3 if the non-default SSL_OP_NO_TICKET option is being used (but not if early_data support is also configured and the default anti-replay protection is in use). In this case, under certain conditions, the session cache can get into an incorrect state and it will fail to flush properly as it fills. The session cache will continue to grow in an unbounded manner. A malicious client could deliberately create the scenario for this failure to force a Denial of Service. It may also happen by accident in normal operation. This issue only affects TLS servers supporting TLSv1.3. It does not affect TLS clients. The FIPS modules in 3.2, 3.1 and 3.0 are not affected by this issue. OpenSSL 1.0.2 is also not affected by this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.openssl.org/news/secadv/20240408.txt - https://github.com/openssl/openssl/commit/e9d7083e241670332e0443da0f0d4ffb52829f08 - https://github.com/openssl/openssl/commit/7e4d731b1c07201ad9374c1cd9ac5263bdf35bce - https://github.com/openssl/openssl/commit/b52867a9f618bb955bed2a3ce3db4d4f97ed8e5d - https://github.openssl.org/openssl/extended-releases/commit/5f8d25770ae6437db119dfc951e207271a326640 - http://www.openwall.com/lists/oss-security/2024/04/08/5 - https://security.netapp.com/advisory/ntap-20240503-0013/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0327.
CVE ID: CVE-2014-0327 Date Updated: 2024-08-06T09:13:09.804Z Date Published: 2014-08-17T23:00:00 Description: The Terminal Upgrade Tool in the Pilot Below Deck Equipment (BDE) and OpenPort implementations on Iridium satellite terminals allows remote attackers to execute arbitrary code by uploading new firmware to TCP port 54321. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/578598 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1656.
CVE ID: CVE-2022-1656 Date Updated: 2024-08-03T00:10:03.824Z Date Published: 2022-06-13T12:41:32 Description: Vulnerable versions of the JupiterX Theme (<=2.0.6) allow any logged-in user, including subscriber-level users, to access any of the functions registered in lib/api/api/ajax.php, which also grant access to the jupiterx_api_ajax_ actions registered by the JupiterX Core Plugin (<=2.0.6). This includes the ability to deactivate arbitrary plugins as well as update the theme’s API key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/blog/2022/05/critical-privilege-escalation-vulnerability-in-jupiter-and-jupiterx-premium-themes/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0627.
CVE ID: CVE-2021-0627 Date Updated: 2024-08-03T15:47:28.181Z Date Published: 2021-08-18T14:44:24 Description: In OMA DRM, there is a possible memory corruption due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05722434; Issue ID: ALPS05722434. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/August-2021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-9100.
CVE ID: CVE-2016-9100 Date Updated: 2024-09-16T20:42:42.195Z Date Published: 2017-05-11T14:01:00Z Description: Symantec Advanced Secure Gateway (ASG) 6.6 prior to 6.6.5.13, ASG 6.7 prior to 6.7.3.1, ProxySG 6.5 prior to 6.5.10.6, ProxySG 6.6 prior to 6.6.5.13, and ProxySG 6.7 prior to 6.7.3.1 are susceptible to an information disclosure vulnerability. An attacker with local access to the client host of an authenticated administrator user can, under certain circumstances, obtain sensitive authentication credential information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040138 - https://www.symantec.com/security-center/network-protection-security-advisories/SA155 - http://www.securityfocus.com/bid/102454 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14337.
CVE ID: CVE-2020-14337 Date Updated: 2024-08-04T12:39:36.520Z Date Published: 2020-07-31T12:42:55 Description: A data exposure flaw was found in Tower, where sensitive data was revealed from the HTTP return error codes. This flaw allows an unauthenticated, remote attacker to retrieve pages from the default organization and verify existing usernames. The highest threat from this vulnerability is to data confidentiality. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1859139 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24716.
CVE ID: CVE-2022-24716 Date Updated: 2024-08-03T04:20:49.887Z Date Published: 2022-03-08T00:00:00 Description: Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw - https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d - https://security.gentoo.org/glsa/202208-05 - http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27347.
CVE ID: CVE-2020-27347 Date Updated: 2024-09-17T00:20:28.710Z Date Published: 2020-11-06T02:20:13.352334Z Description: In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c - https://www.openwall.com/lists/oss-security/2020/11/05/3 - https://security.gentoo.org/glsa/202011-10 - https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-20997.
CVE ID: CVE-2021-20997 Date Updated: 2024-09-16T23:42:19.095Z Date Published: 2021-05-13T13:45:25.054592Z Description: In multiple managed switches by WAGO in different versions it is possible to read out the password hashes of all Web-based Management users. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cert.vde.com/en-us/advisories/vde-2021-013 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18757.
CVE ID: CVE-2017-18757 Date Updated: 2024-08-05T21:37:43.917Z Date Published: 2020-04-22T16:06:21 Description: Certain NETGEAR devices are affected by incorrect configuration of security settings. This affects D7800 before 1.0.1.30, R6100 before 1.0.1.16, R7500 before 1.0.0.116, R7500v2 before 1.0.3.20, R7800 before 1.0.2.36, R9000 before 1.0.2.40, WNDR4300v2 before 1.0.0.48, WNDR4300v1 before 1.0.2.90, and WNDR4500v3 before 1.0.0.48. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.netgear.com/000051491/Security-Advisory-for-Security-Misconfiguration-on-Some-Routers-PSV-2016-0120 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-0978.
CVE ID: CVE-2010-0978 Date Updated: 2024-08-07T01:06:52.698Z Date Published: 2010-03-16T19:00:00 Description: KMSoft Guestbook (aka GBook) 1.0 stores sensitive information under the web root with insufficient access control, which allows remote attackers to download a database via a direct request for db/db.mdb. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/38076 - http://packetstormsecurity.org/1001-exploits/kmsoftgb-disclose.txt - https://exchange.xforce.ibmcloud.com/vulnerabilities/55376 - http://osvdb.org/61487 - http://www.exploit-db.com/exploits/11005 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-38576.
CVE ID: CVE-2021-38576 Date Updated: 2024-08-04T01:44:23.604Z Date Published: 2022-01-03T21:07:45 Description: A BIOS bug in firmware for a particular PC model leaves the Platform authorization value empty. This can be used to permanently brick the TPM in multiple ways, as well as to non-permanently DoS the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.tianocore.org/show_bug.cgi?id=3499 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1829.
CVE ID: CVE-2019-1829 Date Updated: 2024-09-16T16:43:53.949Z Date Published: 2019-04-18T01:15:23.585952Z Description: A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-air-ap-cmdinj - http://www.securityfocus.com/bid/107990 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1017.
CVE ID: CVE-2009-1017 Date Updated: 2024-08-07T04:57:17.549Z Date Published: 2009-04-15T10:00:00 Description: Unspecified vulnerability in the BI Publisher component in Oracle Application Server 5.6.2, 10.1.3.2.1, 10.1.3.3.3, and 10.1.3.4 allows remote authenticated users to affect confidentiality via unknown vectors, a different vulnerability than CVE-2009-0994. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id?1022055 - http://www.securityfocus.com/bid/34461 - http://secunia.com/advisories/34693 - http://www.us-cert.gov/cas/techalerts/TA09-105A.html - http://www.oracle.com/technetwork/topics/security/cpuapr2009-099563.html - http://osvdb.org/53746 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8963.
CVE ID: CVE-2018-8963 Date Updated: 2024-09-17T00:41:20.637Z Date Published: 2018-03-23T21:00:00Z Description: In libming 0.4.8, the decompileGETVARIABLE function of decompile.c has a use-after-free. Remote attackers could leverage this vulnerability to cause a denial of service via a crafted swf file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/libming/libming/issues/130 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41253.
CVE ID: CVE-2021-41253 Date Updated: 2024-08-04T03:08:31.619Z Date Published: 2021-11-08T21:45:11 Description: Zydis is an x86/x86-64 disassembler library. Users of Zydis versions v3.2.0 and older that use the string functions provided in `zycore` in order to append untrusted user data to the formatter buffer within their custom formatter hooks can run into heap buffer overflows. Older versions of Zydis failed to properly initialize the string object within the formatter buffer, forgetting to initialize a few fields, leaving their value to chance. This could then in turn cause zycore functions like `ZyanStringAppend` to make incorrect calculations for the new target size, resulting in heap memory corruption. This does not affect the regular uncustomized Zydis formatter, because Zydis internally doesn't use the string functions in zycore that act upon these fields. However, because the zycore string functions are the intended way to work with the formatter buffer for users of the library that wish to extend the formatter, we still consider this to be a vulnerability in Zydis. This bug is patched starting in version 3.2.1. As a workaround, users may refrain from using zycore string functions in their formatter hooks until updating to a patched version. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zyantific/zydis/security/advisories/GHSA-q42v-hv86-3m4g - https://github.com/zyantific/zydis/commit/55dd08c210722aed81b38132f5fd4a04ec1943b5 - https://huntr.dev/bounties/96b0a482-7041-45b1-9327-c6a4a8f32d3a - https://huntr.dev/bounties/d2536d7d-36ce-4723-928c-98d1ee039784 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4648.
CVE ID: CVE-2010-4648 Date Updated: 2024-08-07T03:51:17.956Z Date Published: 2012-06-21T23:00:00Z Description: The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2011/01/06/18 - https://bugzilla.redhat.com/show_bug.cgi?id=667907 - http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=0a54917c3fc295cb61f3fb52373c173fd3b69f48 - https://github.com/torvalds/linux/commit/0a54917c3fc295cb61f3fb52373c173fd3b69f48 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52806.
CVE ID: CVE-2023-52806 Date Updated: 2024-09-11T17:32:54.863Z Date Published: 2024-05-21T15:31:17.025Z Description: In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix possible null-ptr-deref when assigning a stream While AudioDSP drivers assign streams exclusively of HOST or LINK type, nothing blocks a user to attempt to assign a COUPLED stream. As supplied substream instance may be a stub, what is the case when code-loading, such scenario ends with null-ptr-deref. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b - https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323 - https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250 - https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7 - https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e - https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4 - https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0 - https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd - https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-14183.
CVE ID: CVE-2020-14183 Date Updated: 2024-09-17T02:16:18.539Z Date Published: 2020-10-06T22:20:13.382590Z Description: Affected versions of Jira Server & Data Center allow a remote attacker with limited (non-admin) privileges to view a Jira instance's Support Entitlement Number (SEN) via an Information Disclosure vulnerability in the HTTP Response headers. The affected versions are before version 7.13.18, from version 8.0.0 before 8.5.9, and from version 8.6.0 before 8.12.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.atlassian.com/browse/JRASERVER-71646 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-26401.
CVE ID: CVE-2021-26401 Date Updated: 2024-09-17T03:08:13.328Z Date Published: 2022-03-11T17:54:34.241477Z Description: LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1036 - http://www.openwall.com/lists/oss-security/2022/03/18/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32783.
CVE ID: CVE-2024-32783 Date Updated: 2024-08-09T20:05:19.982Z Date Published: 2024-06-09T13:03:11.381Z Description: Missing Authorization vulnerability in wpcreativeidea Advanced Testimonial Carousel for Elementor.This issue affects Advanced Testimonial Carousel for Elementor: from n/a through 3.0.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/advanced-testimonial-carousel-for-elementor/wordpress-advanced-testimonial-carousel-for-elementor-plugin-3-0-0-broken-access-control-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12309.
CVE ID: CVE-2019-12309 Date Updated: 2024-08-04T23:17:39.566Z Date Published: 2019-05-23T19:21:17 Description: dotCMS before 5.1.0 has a path traversal vulnerability exploitable by an administrator to create files. The vulnerability is caused by the insecure extraction of a ZIP archive. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://dotcms.com/security/SI-48 - https://github.com/dotCMS/core/compare/605e5db...364c910 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4169.
CVE ID: CVE-2015-4169 Date Updated: 2022-07-08T17:37:10 Date Published: 2022-07-08T17:37:10 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44408.
CVE ID: CVE-2023-44408 Date Updated: 2024-08-02T20:07:33.192Z Date Published: 2024-05-03T02:13:40.278Z Description: D-Link DAP-1325 SetAPLanSettings IPAddr Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of D-Link DAP-1325 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of XML data provided to the HNAP1 SOAP endpoint. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-18827. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1506/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-35744.
CVE ID: CVE-2022-35744 Date Updated: 2024-10-03T19:50:04.052Z Date Published: 2023-05-31T18:07:00.959Z Description: Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-34231.
CVE ID: CVE-2023-34231 Date Updated: 2024-08-02T16:01:54.231Z Date Published: 2023-06-08T19:42:13.381Z Description: gosnowflake is th Snowflake Golang driver. Prior to version 1.6.19, a command injection vulnerability exists in the Snowflake Golang driver via single sign-on (SSO) browser URL authentication. In order to exploit the potential for command injection, an attacker would need to be successful in (1) establishing a malicious resource and (2) redirecting users to utilize the resource. The attacker could set up a malicious, publicly accessible server which responds to the SSO URL with an attack payload. If the attacker then tricked a user into visiting the maliciously crafted connection URL, the user’s local machine would render the malicious payload, leading to a remote code execution. This attack scenario can be mitigated through URL whitelisting as well as common anti-phishing resources. A patch is available in version 1.6.19. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/snowflakedb/gosnowflake/security/advisories/GHSA-fwv2-65wh-2w8c - https://github.com/snowflakedb/gosnowflake/pull/757 - https://github.com/snowflakedb/gosnowflake/commit/e11a2a555f1b9f7adc1f01fb7b5e7f38fbbb2a1c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14359.
CVE ID: CVE-2017-14359 Date Updated: 2024-08-05T19:27:40.055Z Date Published: 2017-11-03T18:00:00 Description: A potential security vulnerability has been identified in HPE Performance Center versions 12.20. The vulnerability could be remotely exploited to allow cross-site scripting. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://softwaresupport.hpe.com/document/-/facetsearch/document/KM02996754 - http://www.securityfocus.com/bid/101659 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5551.
CVE ID: CVE-2024-5551 Date Updated: 2024-08-01T21:18:06.505Z Date Published: 2024-06-14T05:39:14.293Z Description: The WP STAGING Pro WordPress Backup Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.6.0. This is due to missing or incorrect nonce validation on the 'sub' parameter called from the WP STAGING WordPress Backup Plugin - Backup Duplicator & Migration plugin. This makes it possible for unauthenticated attackers to include any local files that end in '-settings.php' via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/2a99a21c-d4f1-4cdb-b1f1-31b3cf666b80?source=cve - https://plugins.trac.wordpress.org/browser/wp-staging/trunk/Backend/views/settings/tabs/remote-storages.php#L14 - https://wp-staging.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-3887.
CVE ID: CVE-2012-3887 Date Updated: 2024-09-17T03:27:48.205Z Date Published: 2012-07-26T22:00:00Z Description: AirDroid before 1.0.7 beta uses a cleartext base64 format for data transfer that is documented as an "Encrypted Transmission" feature, which allows remote attackers to obtain sensitive information by sniffing the local wireless network, as demonstrated by the SMS message content sent to the sdctl/sms/send/single/ URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2012-07/0087.html - http://www.tele-consulting.com/advisories/TC-SA-2012-02.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27762.
CVE ID: CVE-2023-27762 Date Updated: 2024-08-02T12:16:37.007Z Date Published: 2023-04-04T00:00:00 Description: An issue found in Wondershare Technology Co., Ltd DemoCreator v.6.0.0 allows a remote attacker to execute arbitrary commands via the democreator_setup_full7743.exe file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/liong007/Wondershare/issues/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1692.
CVE ID: CVE-2024-1692 Date Updated: 2024-08-01T18:48:21.490Z Date Published: 2024-03-30T04:31:07.070Z Description: The BoldGrid Easy SEO – Simple and Effective SEO plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the meta description field in all versions up to, and including, 1.6.13 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a308fde-1c44-4c34-ace5-6820dc949f53?source=cve - https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3054618%40boldgrid-easy-seo&new=3054618%40boldgrid-easy-seo&sfp_email=&sfph_mail= No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-6835.
CVE ID: CVE-2016-6835 Date Updated: 2024-08-06T01:43:37.918Z Date Published: 2016-12-10T00:00:00 Description: The vmxnet_tx_pkt_parse_headers function in hw/net/vmxnet_tx_pkt.c in QEMU (aka Quick Emulator) allows local guest OS administrators to cause a denial of service (buffer over-read) by leveraging failure to check IP header length. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.gnu.org/archive/html/qemu-stable/2016-08/msg00077.html - https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html - http://www.openwall.com/lists/oss-security/2016/08/11/7 - http://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=93060258ae748573ca7197204125a2670047896d - http://www.openwall.com/lists/oss-security/2016/08/18/4 - https://access.redhat.com/errata/RHSA-2017:2392 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24519.
CVE ID: CVE-2021-24519 Date Updated: 2024-08-03T19:35:20.093Z Date Published: 2021-08-16T10:48:25 Description: The VikRentCar Car Rental Management System WordPress plugin before 1.1.10 does not sanitise the 'Text Next to Icon' field when adding or editing a Characteristic, allowing high privilege users such as admin to use XSS payload in it, leading to an authenticated Stored Cross-Site Scripting issue No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/368828f9-fdd1-4a82-8658-20e0f4c4da0c No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-8945.
CVE ID: CVE-2018-8945 Date Updated: 2024-08-05T07:10:47.045Z Date Published: 2018-03-22T21:00:00 Description: The bfd_section_from_shdr function in elf.c in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.30, allows remote attackers to cause a denial of service (segmentation fault) via a large attribute section. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://access.redhat.com/errata/RHSA-2018:3032 - https://security.gentoo.org/glsa/201811-17 - https://sourceware.org/bugzilla/show_bug.cgi?id=22809 - https://access.redhat.com/errata/RHBA-2019:0327 - http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00072.html - http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00008.html - https://usn.ubuntu.com/4336-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-19094.
CVE ID: CVE-2019-19094 Date Updated: 2024-08-05T02:09:39.344Z Date Published: 2020-04-02T19:47:32 Description: Lack of input checks for SQL queries in ABB eSOMS versions 3.9 to 6.0.3 might allow an attacker SQL injection attacks against the backend database. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://search.abb.com/library/Download.aspx?DocumentID=9AKK107492A9964&LanguageCode=en&DocumentPartId=&Action=Launch No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-5172.
CVE ID: CVE-2015-5172 Date Updated: 2024-08-06T06:41:09.222Z Date Published: 2017-10-24T17:00:00 Description: Cloud Foundry Runtime cf-release before 216, UAA before 2.5.2, and Pivotal Cloud Foundry (PCF) Elastic Runtime before 1.7.0 allow attackers to have unspecified impact by leveraging failure to expire password reset links. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pivotal.io/security/cve-2015-5170-5173 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-36408.
CVE ID: CVE-2024-36408 Date Updated: 2024-08-02T03:37:05.149Z Date Published: 2024-06-10T16:46:00.935Z Description: SuiteCRM is an open-source Customer Relationship Management (CRM) software application. In versions prior to 7.14.4 and 8.6.1, poor input validation allows for SQL Injection in the `Alerts` controller. Versions 7.14.4 and 8.6.1 contain a fix for this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-2g8f-gjrr-x5cg No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0074.
CVE ID: CVE-2024-0074 Date Updated: 2024-08-01T17:41:16.440Z Date Published: 2024-03-27T21:52:25.828Z Description: NVIDIA GPU Display Driver for Linux contains a vulnerability where an attacker may access a memory location after the end of the buffer. A successful exploit of this vulnerability may lead to denial of service and data tampering. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5520 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2835.
CVE ID: CVE-2024-2835 Date Updated: 2024-08-01T19:25:41.903Z Date Published: 2024-05-20T13:10:08.716Z Description: A Stored Cross-Site Scripting (XSS) vulnerability has been identified in OpenText ArcSight Enterprise Security Manager and ArcSight Platform. The vulnerability could be remotely exploited. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.microfocus.com/s/article/KM000029773 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41053.
CVE ID: CVE-2022-41053 Date Updated: 2024-08-03T12:35:48.907Z Date Published: 2022-11-09T00:00:00 Description: Windows Kerberos Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41053 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-6524.
CVE ID: CVE-2020-6524 Date Updated: 2024-08-04T09:02:40.764Z Date Published: 2020-07-22T16:16:06 Description: Heap buffer overflow in WebAudio in Google Chrome prior to 84.0.4147.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2020/07/stable-channel-update-for-desktop.html - https://crbug.com/1081722 - http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00069.html - https://security.gentoo.org/glsa/202007-08 - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MTRPPTKZ2RKVH2XGQCWNFZ7FOGQ5LLCA/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYIDWCHG24ZTFD4P42D4A4WWPPA74BCG/ - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00007.html - http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00018.html - http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00041.html - https://www.debian.org/security/2021/dsa-4824 - https://security.gentoo.org/glsa/202101-30 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-32738.
CVE ID: CVE-2021-32738 Date Updated: 2024-08-03T23:33:54.900Z Date Published: 2021-07-02T18:15:11 Description: js-stellar-sdk is a Javascript library for communicating with a Stellar Horizon server. The `Utils.readChallengeTx` function used in SEP-10 Stellar Web Authentication states in its function documentation that it reads and validates the challenge transaction including verifying that the `serverAccountID` has signed the transaction. In js-stellar-sdk before version 8.2.3, the function does not verify that the server has signed the transaction. Applications that also used `Utils.verifyChallengeTxThreshold` or `Utils.verifyChallengeTxSigners` to verify the signatures including the server signature on the challenge transaction are unaffected as those functions verify the server signed the transaction. Applications calling `Utils.readChallengeTx` should update to version 8.2.3, the first version with a patch for this vulnerability, to ensure that the challenge transaction is completely valid and signed by the server creating the challenge transaction. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/stellar/js-stellar-sdk/security/advisories/GHSA-6cgh-hjpw-q3gq - https://github.com/stellar/js-stellar-sdk/releases/tag/v8.2.3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0522.
CVE ID: CVE-2020-0522 Date Updated: 2024-08-04T06:02:52.286Z Date Published: 2021-02-17T13:57:34 Description: Improper initialization in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters before version 3.30 may allow a privileged user to potentially enable denial of service via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00318.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-22325.
CVE ID: CVE-2023-22325 Date Updated: 2024-08-02T10:07:06.113Z Date Published: 2023-10-12T15:27:54.526Z Description: A denial of service vulnerability exists in the DCRegister DDNS_RPC_MAX_RECV_SIZE functionality of SoftEther VPN 4.41-9782-beta, 5.01.9674 and 5.02. A specially crafted network packet can lead to denial of service. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2023-1736 - https://www.softether.org/9-about/News/904-SEVPN202301 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46671.
CVE ID: CVE-2022-46671 Date Updated: 2022-12-30T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11036.
CVE ID: CVE-2018-11036 Date Updated: 2024-08-05T07:54:36.536Z Date Published: 2018-05-31T12:00:00 Description: Ruckus SmartZone (formerly Virtual SmartCell Gateway or vSCG) 3.5.0, 3.5.1, 3.6.0, and 3.6.1 (Essentials and High Scale) on vSZ, SZ-100, SZ-300, and SCG-200 devices allows remote attackers to obtain sensitive information or modify data. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ruckuswireless.com/security/279/view/txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-26065.
CVE ID: CVE-2022-26065 Date Updated: 2024-09-16T19:24:17.334Z Date Published: 2022-03-29T16:37:08.222812Z Description: Delta Electronics DIAEnergie (All versions prior to 1.8.02.004) has a blind SQL injection vulnerability exists in GetLatestDemandNode. This allows an attacker to inject arbitrary SQL queries, retrieve and modify database contents, and execute system commands. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsa-22-081-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-31889.
CVE ID: CVE-2024-31889 Date Updated: 2024-08-02T01:59:50.666Z Date Published: 2024-05-31T12:57:26.223Z Description: IBM Planning Analytics Local 2.0 and 2.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 288136. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.ibm.com/support/pages/node/7151122 - https://exchange.xforce.ibmcloud.com/vulnerabilities/288136 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2488.
CVE ID: CVE-2014-2488 Date Updated: 2024-08-06T10:14:26.578Z Date Published: 2014-07-17T02:36:00 Description: Unspecified vulnerability in the Oracle VM VirtualBox component in Oracle Virtualization VirtualBox before 3.2.24, 4.0.26, 4.1.34, 4.2.26, and 4.3.12 allows local users to affect confidentiality via unknown vectors related to Core. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.vmware.com/security/advisories/VMSA-2014-0012.html - http://www.securityfocus.com/archive/1/534161/100/0/threaded - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://seclists.org/fulldisclosure/2014/Dec/23 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3594.
CVE ID: CVE-2013-3594 Date Updated: 2024-08-06T16:14:56.560Z Date Published: 2014-01-20T02:00:00 Description: The SSH service on Dell PowerConnect 3348 1.2.1.3, 3524p 2.0.0.48, and 5324 2.0.1.4 switches allows remote attackers to cause a denial of service (device reset) or possibly execute arbitrary code by sending many packets to TCP port 22. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/122582 - https://exchange.xforce.ibmcloud.com/vulnerabilities/90595 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-48320.
CVE ID: CVE-2023-48320 Date Updated: 2024-08-02T21:23:39.498Z Date Published: 2023-11-30T16:32:18.302Z Description: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebDorado SpiderVPlayer allows Stored XSS.This issue affects SpiderVPlayer: from n/a through 1.5.22. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/player/wordpress-spidervplayer-plugin-1-5-22-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36311.
CVE ID: CVE-2020-36311 Date Updated: 2024-08-04T17:23:10.253Z Date Published: 2021-04-06T23:28:49 Description: An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03 - https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9 - https://lists.debian.org/debian-lts-announce/2021/07/msg00015.html - https://www.debian.org/security/2021/dsa-4941 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2019-1689
CVE-CVE-2019-1689 is a vulnerability in Cisco Webex Teams. It is related to the MITRE ATT&CK technique T1565.001: Stored Data Manipulation. The vulnerability is classified as a secondary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2019 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2013-1671.
CVE ID: CVE-2013-1671 Date Updated: 2024-08-06T15:13:31.246Z Date Published: 2013-05-16T10:00:00 Description: Mozilla Firefox before 21.0 does not properly implement the INPUT element, which allows remote attackers to obtain the full pathname via a crafted web site. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17100 - http://lists.opensuse.org/opensuse-security-announce/2013-05/msg00010.html - http://www.mozilla.org/security/announce/2013/mfsa2013-43.html - http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00008.html - http://www.ubuntu.com/usn/USN-1822-1 - https://bugzilla.mozilla.org/show_bug.cgi?id=842255 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-13529.
CVE ID: CVE-2019-13529 Date Updated: 2024-08-04T23:57:39.443Z Date Published: 2019-10-09T15:26:53 Description: An attacker could send a malicious link to an authenticated operator, which may allow remote attackers to perform actions with the permissions of the user on the Sunny WebBox Firmware Version 1.6 and prior. This device uses IP addresses to maintain communication after a successful login, which would increase the ease of exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.us-cert.gov/ics/advisories/icsa-19-281-01 - http://packetstormsecurity.com/files/154789/SMA-Solar-Technology-AG-Sunny-WebBox-1.6-Cross-Site-Request-Forgery.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21401.
CVE ID: CVE-2023-21401 Date Updated: 2024-08-02T09:36:34.455Z Date Published: 2023-12-04T22:40:49.129Z Description: In DevmemIntChangeSparse of devicemem_server.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege in the kernel with no additional execution privileges needed. User interaction is not needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2023-12-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-34524.
CVE ID: CVE-2024-34524 Date Updated: 2024-08-02T02:59:20.793Z Date Published: 2024-05-05T00:00:00 Description: In XLANG OpenAgents through fe73ac4, the allowed_file protection mechanism can be bypassed by using an incorrect file extension for the nature of the file content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/xlang-ai/OpenAgents/issues/112 - https://github.com/xlang-ai/OpenAgents/blob/880e26adfe380e999962fc645fc8fc80bd72f103/backend/utils/utils.py#L31 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-37286.
CVE ID: CVE-2023-37286 Date Updated: 2024-08-02T17:09:34.186Z Date Published: 2023-07-10T00:00:00 Description: SmartSoft SmartBPM.NET has a vulnerability of using hard-coded machine key. An unauthenticated remote attacker can use the machine key to send serialized payload to the server to execute arbitrary code and disrupt service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.twcert.org.tw/tw/cp-132-7221-438c6-1.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32118.
CVE ID: CVE-2023-32118 Date Updated: 2024-08-02T15:03:29.086Z Date Published: 2023-06-12T14:56:58.606Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in WPoperation SALERT – Fake Sales Notification WooCommerce plugin <= 1.2.1 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/salert/wordpress-salert-plugin-1-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-47662.
CVE ID: CVE-2022-47662 Date Updated: 2024-08-03T15:02:36.177Z Date Published: 2023-01-05T00:00:00 Description: GPAC MP4Box 2.1-DEV-rev649-ga8f438d20 has a segment fault (/stack overflow) due to infinite recursion in Media_GetSample isomedia/media.c:662 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gpac/gpac/issues/2359 - https://www.debian.org/security/2023/dsa-5411 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-38283.
CVE ID: CVE-2022-38283 Date Updated: 2024-08-03T10:54:02.673Z Date Published: 2022-09-09T13:40:50 Description: JFinal CMS 5.1.0 is vulnerable to SQL Injection via /admin/video/list. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jflyfox/jfinal_cms/issues/52 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-7326.
CVE ID: CVE-2019-7326 Date Updated: 2024-09-17T01:20:56.775Z Date Published: 2019-02-04T19:00:00Z Description: Self - Stored Cross Site Scripting (XSS) exists in ZoneMinder through 1.32.3, allowing an attacker to execute HTML or JavaScript code via a vulnerable 'Host' parameter value in the view console (console.php) because proper filtration is omitted. This relates to the index.php?view=monitor Host Name field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ZoneMinder/zoneminder/issues/2452 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-20763.
CVE ID: CVE-2022-20763 Date Updated: 2024-09-16T20:32:18.701Z Date Published: 2022-04-06T18:13:18.345587Z Description: A vulnerability in the login authorization components of Cisco Webex Meetings could allow an authenticated, remote attacker to inject arbitrary Java code. This vulnerability is due to improper deserialization of Java code within login requests. An attacker could exploit this vulnerability by sending malicious login requests to the Cisco Webex Meetings service. A successful exploit could allow the attacker to inject arbitrary Java code and take arbitrary actions within the Cisco Webex Meetings application. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-java-MVX6crH9 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-8947.
CVE ID: CVE-2017-8947 Date Updated: 2024-09-16T17:32:58.762Z Date Published: 2018-02-15T22:00:00Z Description: A Remote Code Execution vulnerability in HPE UCMDB version v10.10, v10.11, v10.20, v10.21, v10.22, v10.30, v10.31 was found. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/98960 - https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbgn03758en_us - http://www.securitytracker.com/id/1038643 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-2249.
CVE ID: CVE-2015-2249 Date Updated: 2024-08-06T05:10:15.611Z Date Published: 2020-01-27T18:28:22 Description: Zimbra Collaboration before 8.6.0 patch5 has XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0480.
CVE ID: CVE-2020-0480 Date Updated: 2024-08-04T06:02:51.951Z Date Published: 2020-12-15T15:54:49 Description: In callUnchecked of DocumentsProvider.java, there is a possible permissions bypass due to a missing permission check. This could lead to local escalation of privilege allowing a caller to copy, move, or delete files accessible to DocumentsProvider with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-157320716 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2020-12-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-18887.
CVE ID: CVE-2019-18887 Date Updated: 2024-08-05T02:02:39.852Z Date Published: 2019-11-21T22:18:04 Description: An issue was discovered in Symfony 2.8.0 through 2.8.50, 3.4.0 through 3.4.34, 4.2.0 through 4.2.11, and 4.3.0 through 4.3.7. The UriSigner was subject to timing attacks. This is related to symfony/http-kernel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://symfony.com/blog/symfony-4-3-8-released - https://github.com/symfony/symfony/releases/tag/v4.3.8 - https://symfony.com/blog/cve-2019-18887-use-constant-time-comparison-in-urisigner - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DZNXRVHDQBNZQUCNRVZICPPBFRAUWUJX/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXEAOEANNIVYANTMOJ42NKSU6BGNBULZ/ - https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UED22BOXTL2SSFMGYKA64ZFHGLLJG3EA/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5538.
CVE ID: CVE-2023-5538 Date Updated: 2024-08-02T07:59:44.945Z Date Published: 2023-10-18T04:32:21.682Z Description: The MpOperationLogs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the IP Request Headers in versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/bc5f1b00-acee-4dc8-acd7-2d3f3493f253?source=cve - https://plugins.trac.wordpress.org/browser/mpoperationlogs/trunk/common.php#L10 - https://plugins.trac.wordpress.org/browser/mpoperationlogs/trunk/template/ipslist_td.php - https://github.com/juweihuitao/MpOperationLogs/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-33458.
CVE ID: CVE-2021-33458 Date Updated: 2024-08-03T23:50:42.664Z Date Published: 2022-07-26T12:36:51 Description: An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in find_cc() in modules/preprocs/nasm/nasm-pp.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/yasm/yasm/issues/170 - https://gist.github.com/Clingto/bb632c0c463f4b2c97e4f65f751c5e6d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-41391.
CVE ID: CVE-2021-41391 Date Updated: 2024-08-04T03:08:32.429Z Date Published: 2021-09-17T20:56:21 Description: In Ericsson ECM before 18.0, it was observed that Security Management Endpoint in User Profile Management Section is vulnerable to stored XSS via a name, leading to session hijacking and full account takeover. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://the-it-wonders.blogspot.com/2021/09/ericsson-ecm-enterprise-content.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6230.
CVE ID: CVE-2013-6230 Date Updated: 2024-08-06T17:38:58.810Z Date Published: 2013-11-08T02:00:00 Description: The Winsock WSAIoctl API in Microsoft Windows Server 2008, as used in ISC BIND 9.6-ESV before 9.6-ESV-R10-P1, 9.8 before 9.8.6-P1, 9.9 before 9.9.4-P1, 9.9.3-S1, 9.9.4-S1, and other products, does not properly support the SIO_GET_INTERFACE_LIST command for netmask 255.255.255.255, which allows remote attackers to bypass intended IP address restrictions by leveraging misinterpretation of this netmask as a 0.0.0.0 netmask. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.isc.org/article/AA-01063 - http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.518391 - https://kb.isc.org/article/AA-01062 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3274.
CVE ID: CVE-2013-3274 Date Updated: 2024-09-17T01:10:51.514Z Date Published: 2013-07-18T22:00:00Z Description: EMC Avamar Server and Avamar Virtual Edition before 7.0 on Data Store Gen3, Gen4, and Gen4s platforms do not properly determine authorization for calls to Java RMI methods, which allows remote authenticated users to execute arbitrary code via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2013-07/0114.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-22363.
CVE ID: CVE-2024-22363 Date Updated: 2024-08-26T20:17:06.904Z Date Published: 2024-04-05T00:00:00 Description: SheetJS Community Edition before 0.20.2 is vulnerable.to Regular Expression Denial of Service (ReDoS). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cwe.mitre.org/data/definitions/1333.html - https://git.sheetjs.com/sheetjs/sheetjs/src/tag/v0.20.2 - https://cdn.sheetjs.com/advisories/CVE-2024-22363 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0488.
CVE ID: CVE-2009-0488 Date Updated: 2024-08-07T04:40:03.488Z Date Published: 2009-02-09T20:00:00 Description: Cross-site scripting (XSS) vulnerability in Phorum before 5.2.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/33657 - http://www.phorum.org/phorum5/read.php?64%2C136129 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-1000132.
CVE ID: CVE-2017-1000132 Date Updated: 2024-08-05T21:53:07.128Z Date Published: 2017-11-03T18:00:00 Description: Mahara 1.8 before 1.8.7 and 1.9 before 1.9.5 and 1.10 before 1.10.3 and 15.04 before 15.04.0 are vulnerable to a maliciously created .swf files that can have its code executed when a user tries to download the file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugs.launchpad.net/mahara/+bug/1190788 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-8333.
CVE ID: CVE-2016-8333 Date Updated: 2024-08-06T02:20:30.766Z Date Published: 2016-10-28T20:00:00 Description: An exploitable stack-based buffer overflow vulnerability exists in the ipfSetColourStroke functionality of Iceni Argus version 6.6.04 A specially crafted pdf file can cause a buffer overflow resulting in arbitrary code execution. An attacker can provide a malicious pdf file to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/93938 - http://www.talosintelligence.com/reports/2016-TALOS-0200/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3700.
CVE ID: CVE-2018-3700 Date Updated: 2024-09-16T22:35:13.239Z Date Published: 2019-02-18T17:00:00Z Description: Code injection vulnerability in the installer for Intel(R) USB 3.0 eXtensible Host Controller Driver for Microsoft Windows 7 before version 5.0.4.43v2 may allow a user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/107073 - https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00200.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2648.
CVE ID: CVE-2022-2648 Date Updated: 2024-08-03T00:46:03.224Z Date Published: 2022-08-04T08:41:25 Description: A vulnerability was found in SourceCodester Multi Language Hotel Management Software. It has been rated as critical. This issue affects some unknown processing. The manipulation of the argument room_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-205595. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/gdianq/Sparkz-Hotel-Management-Sqlinjection/tree/main - https://vuldb.com/?id.205595 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-1802.
CVE ID: CVE-2022-1802 Date Updated: 2024-08-03T00:17:00.467Z Date Published: 2022-12-22T00:00:00 Description: If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.mozilla.org/security/advisories/mfsa2022-19/ - https://bugzilla.mozilla.org/show_bug.cgi?id=1770137 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-4588.
CVE ID: CVE-2024-4588 Date Updated: 2024-08-01T20:47:41.133Z Date Published: 2024-05-07T13:00:07.853Z Description: A vulnerability was found in DedeCMS 5.7. It has been classified as problematic. Affected is an unknown function of the file /src/dede/mytag_add.php. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-263310 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.263310 - https://vuldb.com/?ctiid.263310 - https://vuldb.com/?submit.324956 - https://github.com/Hckwzh/cms/blob/main/19.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-42188.
CVE ID: CVE-2023-42188 Date Updated: 2024-09-10T16:11:03.243Z Date Published: 2023-10-26T00:00:00 Description: IceCMS v2.0.1 is vulnerable to Cross Site Request Forgery (CSRF). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Thecosy/IceCMS/issues/17 - https://topdayplus.github.io/2023/10/27/CVE-deatail/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4776.
CVE ID: CVE-2010-4776 Date Updated: 2024-08-07T03:55:35.201Z Date Published: 2011-03-23T21:00:00 Description: SQL injection vulnerability in takefreestart.php in PreProjects Pre Online Tests Generator Pro allows remote attackers to execute arbitrary SQL commands via the tid2 parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/63246 - http://packetstormsecurity.org/files/view/95817/potgp-sql.txt - http://www.exploit-db.com/exploits/15526 - http://securityreason.com/securityalert/8158 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30322.
CVE ID: CVE-2022-30322 Date Updated: 2024-08-03T06:48:35.602Z Date Published: 2022-05-25T11:19:35 Description: go-getter up to 1.5.11 and 2.0.2 allowed asymmetric resource exhaustion when go-getter processed malicious HTTP responses. Fixed in 1.6.1 and 2.1.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://discuss.hashicorp.com - https://github.com/hashicorp/go-getter/releases - https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/39930 - https://discuss.hashicorp.com/t/hcsec-2022-13-multiple-vulnerabilities-in-go-getter-library/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-3188.
CVE ID: CVE-2011-3188 Date Updated: 2024-08-06T23:22:27.694Z Date Published: 2012-05-24T23:00:00 Description: The (1) IPv4 and (2) IPv6 implementations in the Linux kernel before 3.1 use a modified MD4 algorithm to generate sequence numbers and Fragment Identification values, which makes it easier for remote attackers to cause a denial of service (disrupted networking) or hijack network sessions by predicting these values and sending crafted packets. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/torvalds/linux/commit/bc0b96b54a21246e377122d54569eef71cec535f - http://www.openwall.com/lists/oss-security/2011/08/23/2 - https://github.com/torvalds/linux/commit/6e5714eaf77d79ae1c8b47e3e040ff5411b717ec - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=6e5714eaf77d79ae1c8b47e3e040ff5411b717ec - https://bugzilla.redhat.com/show_bug.cgi?id=732658 - http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.1 - http://marc.info/?l=bugtraq&m=139447903326211&w=2 - http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=bc0b96b54a21246e377122d54569eef71cec535f - https://support.f5.com/csp/article/K15301?utm_source=f5support&amp%3Butm_medium=RSS No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-1734.
CVE ID: CVE-2012-1734 Date Updated: 2024-08-06T19:08:37.479Z Date Published: 2012-07-17T22:00:00 Description: Unspecified vulnerability in Oracle MySQL Server 5.1.62 and earlier, and 5.5.23 and earlier, allows remote authenticated users to affect availability via unknown vectors related to Server Optimizer. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/77064 - http://rhn.redhat.com/errata/RHSA-2012-1462.html - http://www.securitytracker.com/id?1027263 - http://secunia.com/advisories/53372 - http://www.securityfocus.com/bid/54540 - http://security.gentoo.org/glsa/glsa-201308-06.xml - http://secunia.com/advisories/51309 - http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html - http://osvdb.org/83979 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-12051.
CVE ID: CVE-2020-12051 Date Updated: 2024-08-04T11:48:58.044Z Date Published: 2020-04-21T21:24:33 Description: The CentralAuth extension through REL1_34 for MediaWiki allows remote attackers to obtain sensitive hidden account information via an api.php?action=query&meta=globaluserinfo&guiuser= request. In other words, the information can be retrieved via the action API even though access would be denied when simply visiting wiki/Special:CentralAuth in a web browser. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://phabricator.wikimedia.org/T250594 - https://gerrit.wikimedia.org/r/#/q/I3c80641dc1202df7428714f0ca44717a51ff6021 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31406.
CVE ID: CVE-2021-31406 Date Updated: 2024-09-17T00:02:31.310Z Date Published: 2021-04-23T16:05:41.375797Z Description: Non-constant-time comparison of CSRF tokens in endpoint request handler in com.vaadin:flow-server versions 3.0.0 through 5.0.3 (Vaadin 15.0.0 through 18.0.6), and com.vaadin:fusion-endpoint version 6.0.0 (Vaadin 19.0.0) allows attacker to guess a security token for Fusion endpoints via timing attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vaadin.com/security/cve-2021-31406 - https://github.com/vaadin/flow/pull/10157 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-15724.
CVE ID: CVE-2019-15724 Date Updated: 2024-08-05T00:56:22.211Z Date Published: 2019-09-16T16:48:53 Description: An issue was discovered in GitLab Community and Enterprise Edition 11.10 through 12.2.1. Label descriptions are vulnerable to HTML injection. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/gitlab-ce/issues/60888 - https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.