instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2022-30949. | CVE ID: CVE-2022-30949
Date Updated: 2024-08-03T07:03:39.748Z
Date Published: 2022-05-17T14:06:09
Description:
Jenkins REPO Plugin 1.14.0 and earlier allows attackers able to configure pipelines to check out some SCM repositories stored on the Jenkins controller's file system using local paths as SCM URLs, obtaining limited information about other projects' SCM contents.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.jenkins.io/security/advisory/2022-05-17/#SECURITY-2478
- http://www.openwall.com/lists/oss-security/2022/05/17/8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-36479. | CVE ID: CVE-2024-36479
Date Updated: 2024-09-11T17:34:43.408Z
Date Published: 2024-06-24T13:56:51.367Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
fpga: bridge: add owner module and take its refcount
The current implementation of the fpga bridge assumes that the low-level
module registers a driver for the parent device and uses its owner pointer
to take the module's refcount. This approach is problematic since it can
lead to a null pointer dereference while attempting to get the bridge if
the parent device does not have a driver.
To address this problem, add a module owner pointer to the fpga_bridge
struct and use it to take the module's refcount. Modify the function for
registering a bridge to take an additional owner module parameter and
rename it to avoid conflicts. Use the old function name for a helper macro
that automatically sets the module that registers the bridge as the owner.
This ensures compatibility with existing low-level control modules and
reduces the chances of registering a bridge without setting the owner.
Also, update the documentation to keep it consistent with the new interface
for registering an fpga bridge.
Other changes: opportunistically move put_device() from __fpga_bridge_get()
to fpga_bridge_get() and of_fpga_bridge_get() to improve code clarity since
the bridge device is taken in these functions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/d7c4081c54a1d4068de9440957303a76f9e5c95b
- https://git.kernel.org/stable/c/6896b6b2e2d9ec4e1b0acb4c1698a75a4b34d125
- https://git.kernel.org/stable/c/1da11f822042eb6ef4b6064dc048f157a7852529
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2020-7004 | CVE-CVE-2020-7004 is a vulnerability in VBASE Editor. It is related to the MITRE ATT&CK technique T1068: Exploitation for Privilege Escalation. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2016-1514. | CVE ID: CVE-2016-1514
Date Updated: 2017-01-18T14:57:01
Date Published: 2017-01-06T21:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-48579. | CVE ID: CVE-2022-48579
Date Updated: 2024-08-03T15:17:55.271Z
Date Published: 2023-08-07T00:00:00
Description:
UnRAR before 6.2.3 allows extraction of files outside of the destination folder via symlink chains.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pmachapman/unrar/commit/2ecab6bb5ac4f3b88f270218445496662020205f#diff-ca3086f578522062d7e390ed2cd7e10f646378a8b8cbf287a6e4db5966df68ee
- https://lists.debian.org/debian-lts-announce/2023/08/msg00023.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-2622. | CVE ID: CVE-2009-2622
Date Updated: 2024-08-07T05:59:56.150Z
Date Published: 2009-07-28T17:00:00
Description:
Squid 3.0 through 3.0.STABLE16 and 3.1 through 3.1.0.11 allows remote attackers to cause a denial of service via malformed requests including (1) "missing or mismatched protocol identifier," (2) missing or negative status value," (3) "missing version," or (4) "missing or invalid status number," related to (a) HttpMsg.cc and (b) HttpReply.cc.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id?1022607
- http://www.squid-cache.org/Versions/v3/3.1/changesets/b9661.patch
- http://www.securityfocus.com/bid/35812
- http://www.vupen.com/english/advisories/2009/2013
- http://secunia.com/advisories/36007
- http://www.squid-cache.org/Advisories/SQUID-2009_2.txt
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:161
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:178
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-24234. | CVE ID: CVE-2021-24234
Date Updated: 2024-08-03T19:21:18.676Z
Date Published: 2021-04-22T21:00:50
Description:
The Search Forms page of the Ivory Search WordPress lugin before 4.6.1 did not properly sanitise the tab parameter before output it in the page, leading to a reflected Cross-Site Scripting issue when opening a malicious crafted link as a high privilege user. Knowledge of a form id is required to conduct the attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/ecc620be-8e29-4860-9d32-86b5814a3835
- https://www.getastra.com/blog/911/plugin-exploit/reflected-xss-vulnerability-in-ivory-search-wp-plugin/
- https://www.jinsonvarghese.com/reflected-xss-vulnerability-found-in-ivory-search-plugin/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-14513. | CVE ID: CVE-2020-14513
Date Updated: 2024-08-04T12:46:34.696Z
Date Published: 2020-09-16T19:49:37
Description:
CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-36729. | CVE ID: CVE-2023-36729
Date Updated: 2024-08-02T16:52:54.220Z
Date Published: 2023-10-10T17:07:32.341Z
Description:
Named Pipe File System Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36729
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide information about the following MITRE ATT&CK technique: | T1222.001 : Windows File and Directory Permissions Modification | Name: Windows File and Directory Permissions Modification
ID: T1222.001
URL: https://attack.mitre.org/techniques/T1222/001
Platforms: Windows
Kill Chain Phases: Defense Evasion
Description: Adversaries may modify file or directory permissions/attributes to evade access control lists (ACLs) and access protected files.(Citation: Hybrid Analysis Icacls1 June 2018)(Citation: Hybrid Analysis Icacls2 May 2018) File and directory permissions are commonly managed by ACLs configured by the file or directory owner, or users with the appropriate permissions. File and directory ACL implementations vary by platform, but generally explicitly designate which users or groups can perform which actions (read, write, execute, etc.).
Windows implements file and directory ACLs as Discretionary Access Control Lists (DACLs).(Citation: Microsoft DACL May 2018) Similar to a standard ACL, DACLs identifies the accounts that are allowed or denied access to a securable object. When an attempt is made to access a securable object, the system checks the access control entries in the DACL in order. If a matching entry is found, access to the object is granted. Otherwise, access is denied.(Citation: Microsoft Access Control Lists May 2018)
Adversaries can interact with the DACLs using built-in Windows commands, such as `icacls`, `cacls`, `takeown`, and `attrib`, which can grant adversaries higher permissions on specific files and folders. Further, [PowerShell](T1059.001) provides cmdlets that can be used to retrieve or modify file and directory DACLs. Specific file and directory modifications may be a required step for many techniques, such as establishing Persistence via [Accessibility Features](T1546.008), [Boot or Logon Initialization Scripts](T1037), or tainting/hijacking other instrumental binary/configuration files via [Hijack Execution Flow](T1574).
Data Sources: Command: Command Execution, Active Directory: Active Directory Object Modification, Process: Process Creation, File: File Metadata
Detection: Monitor and investigate attempts to modify DACLs and file/directory ownership. Many of the commands used to modify DACLs and file/directory ownership are built-in system utilities and may generate a high false positive alert rate, so compare against baseline knowledge for how systems are typically used and correlate modification events with other indications of malicious activity where possible.
Consider enabling file/directory permission change auditing on folders containing key binary/configuration files. For example, Windows Security Log events (Event ID 4670) are created when DACLs are modified.(Citation: EventTracker File Permissions Feb 2014) |
Provide detailed information about CVE-2024-28354. | CVE ID: CVE-2024-28354
Date Updated: 2024-08-02T20:20:36.382Z
Date Published: 2024-03-15T00:00:00
Description:
There is a command injection vulnerability in the TRENDnet TEW-827DRU router with firmware version 2.10B01. An attacker can inject commands into the post request parameters usapps.@smb[%d].username in the apply.cgi interface, thereby gaining root shell privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://warp-desk-89d.notion.site/TEW-827DRU-c732df50b2454ecaa5451b02f3adda6a
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-46280. | CVE ID: CVE-2023-46280
Date Updated: 2024-09-10T09:36:15.458Z
Date Published: 2024-05-14T10:01:52.069Z
Description:
A vulnerability has been identified in S7-PCT (All versions), Security Configuration Tool (SCT) (All versions), SIMATIC Automation Tool (All versions < V5.0 SP2), SIMATIC BATCH V9.1 (All versions < V9.1 SP2 Upd5), SIMATIC NET PC Software V16 (All versions < V16 Update 8), SIMATIC NET PC Software V17 (All versions), SIMATIC NET PC Software V18 (All versions < V18 SP1), SIMATIC NET PC Software V19 (All versions), SIMATIC PCS 7 V9.1 (All versions < V9.1 SP2 UC05), SIMATIC PDM V9.2 (All versions < V9.2 SP2 Upd3), SIMATIC Route Control V9.1 (All versions < V9.1 SP2 Upd3), SIMATIC STEP 7 V5 (All versions), SIMATIC WinCC OA V3.17 (All versions), SIMATIC WinCC OA V3.18 (All versions < V3.18 P025), SIMATIC WinCC OA V3.19 (All versions < V3.19 P010), SIMATIC WinCC Runtime Advanced (All versions), SIMATIC WinCC Runtime Professional V16 (All versions < V16 Update 6), SIMATIC WinCC Runtime Professional V17 (All versions < V17 Update 8), SIMATIC WinCC Runtime Professional V18 (All versions < V18 Update 4), SIMATIC WinCC Runtime Professional V19 (All versions < V19 Update 2), SIMATIC WinCC Unified PC Runtime V18 (All versions), SIMATIC WinCC V7.4 (All versions), SIMATIC WinCC V7.5 (All versions < V7.5 SP2 Update 17), SIMATIC WinCC V8.0 (All versions < V8.0 Update 5), SINAMICS Startdrive (All versions < V19 SP1), SINEC NMS (All versions < V3.0), SINUMERIK ONE virtual (All versions < V6.23), SINUMERIK PLC Programming Tool (All versions), TIA Portal Cloud Connector (All versions < V2.0), Totally Integrated Automation Portal (TIA Portal) V15.1 (All versions), Totally Integrated Automation Portal (TIA Portal) V16 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions < V18 Update 4), Totally Integrated Automation Portal (TIA Portal) V19 (All versions < V19 Update 2). The affected applications contain an out of bounds read vulnerability. This could allow an attacker to cause a Blue Screen of Death (BSOD) crash of the underlying Windows kernel.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/html/ssa-962515.html
- https://cert-portal.siemens.com/productcert/html/ssa-784301.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-1831. | CVE ID: CVE-2019-1831
Date Updated: 2024-09-17T00:11:12.022Z
Date Published: 2019-04-18T01:20:26.675817Z
Description:
A vulnerability in the email message scanning of Cisco AsyncOS Software for Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass configured content filters on the device. The vulnerability is due to improper input validation of the email body. An attacker could exploit this vulnerability by inserting specific character strings in the message. A successful exploit could allow the attacker to bypass configured content filters that would normally drop the email.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-esa-filter-bypass
- http://www.securityfocus.com/bid/108021
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-17946. | CVE ID: CVE-2018-17946
Date Updated: 2024-09-17T03:08:19.485Z
Date Published: 2018-10-03T08:00:00Z
Description:
The Tribulant Slideshow Gallery plugin before 1.6.6.1 for WordPress has XSS via the id, method, Gallerymessage, Galleryerror, or Galleryupdated parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/slideshow-gallery/#developers
- http://www.defensecode.com/advisories/DC-2017-01-014_WordPress_Tribulant_Slideshow_Gallery_Plugin_Advisory.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-26589. | CVE ID: CVE-2023-26589
Date Updated: 2024-08-30T15:22:29.533Z
Date Published: 2023-11-14T19:04:51.170Z
Description:
Use after free in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allowed an authenticated user to potentially enable denial of service via local access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-6442. | CVE ID: CVE-2018-6442
Date Updated: 2024-08-05T06:01:49.263Z
Date Published: 2018-11-08T14:00:00
Description:
A vulnerability in the Brocade Webtools firmware update section of Brocade Fabric OS before 8.2.1, 8.1.2f, 8.0.2f, 7.4.2d could allow remote authenticated attackers to execute arbitrary commands.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2018-735
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-7294. | CVE ID: CVE-2013-7294
Date Updated: 2024-08-06T18:01:20.334Z
Date Published: 2014-01-16T02:00:00
Description:
The ikev2parent_inI1outR1 function in pluto/ikev2_parent.c in libreswan before 3.7 allows remote attackers to cause a denial of service (restart) via an IKEv2 I1 notification without a KE payload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/56276
- http://secunia.com/advisories/56915
- https://lists.libreswan.org/pipermail/swan-announce/2013/000007.html
- https://github.com/libreswan/libreswan/commit/2899351224fe2940aec37d7656e1e392c0fe07f0
- http://www.osvdb.org/101573
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-23718. | CVE ID: CVE-2022-23718
Date Updated: 2024-08-03T03:51:46.036Z
Date Published: 2022-06-30T19:25:30
Description:
PingID Windows Login prior to 2.8 uses known vulnerable components that can lead to remote code execution. An attacker capable of achieving a sophisticated man-in-the-middle position, or to compromise Ping Identity web servers, could deliver malicious code that would be executed as SYSTEM by the PingID Windows Login application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.pingidentity.com/en/resources/downloads/pingid.html
- https://docs.pingidentity.com/bundle/pingid/page/zhy1653552428545.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4643. | CVE ID: CVE-2010-4643
Date Updated: 2024-08-07T03:51:17.961Z
Date Published: 2011-01-28T21:13:00
Description:
Heap-based buffer overflow in Impress in OpenOffice.org (OOo) 2.x and 3.x before 3.3 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted Truevision TGA (TARGA) file in an ODF or Microsoft Office document.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/40775
- http://www.securityfocus.com/bid/46031
- http://www.debian.org/security/2011/dsa-2151
- http://secunia.com/advisories/60799
- http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
- http://www.gentoo.org/security/en/glsa/glsa-201408-19.xml
- http://secunia.com/advisories/43118
- http://secunia.com/advisories/43065
- http://www.vupen.com/english/advisories/2011/0230
- http://www.securitytracker.com/id?1025002
- http://www.vupen.com/english/advisories/2011/0232
- http://osvdb.org/70718
- http://www.redhat.com/support/errata/RHSA-2011-0182.html
- https://bugzilla.redhat.com/show_bug.cgi?id=667588
- http://ubuntu.com/usn/usn-1056-1
- http://www.redhat.com/support/errata/RHSA-2011-0181.html
- http://www.vupen.com/english/advisories/2011/0279
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65441
- http://secunia.com/advisories/43105
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:027
- http://secunia.com/advisories/42999
- http://www.openoffice.org/security/cves/CVE-2010-4643.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-0862. | CVE ID: CVE-2013-0862
Date Updated: 2024-08-06T14:41:47.552Z
Date Published: 2013-11-23T18:00:00
Description:
Multiple integer overflows in the process_frame_obj function in libavcodec/sanm.c in FFmpeg before 1.1.2 allow remote attackers to have an unspecified impact via crafted image dimensions in LucasArts Smush video data, which triggers an out-of-bounds array access.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://git.videolan.org/?p=ffmpeg.git%3Ba=commit%3Bh=f4fb841ad13bab66d4fb0c7ff2a94770df7815d8
- http://www.ffmpeg.org/security.html
- https://security.gentoo.org/glsa/201603-06
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-4886. | CVE ID: CVE-2018-4886
Date Updated: 2024-08-05T05:18:26.932Z
Date Published: 2018-02-27T05:00:00
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation occurs in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to handling of bitmap rectangles. A successful attack can lead to sensitive data exposure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/102996
- https://helpx.adobe.com/security/products/acrobat/apsb18-02.html
- http://www.securitytracker.com/id/1040364
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-51683. | CVE ID: CVE-2023-51683
Date Updated: 2024-08-02T22:40:34.178Z
Date Published: 2024-02-28T16:45:07.490Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in Scott Paterson Easy PayPal & Stripe Buy Now Button.This issue affects Easy PayPal & Stripe Buy Now Button: from n/a through 1.8.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/wp-ecommerce-paypal/wordpress-easy-paypal-stripe-buy-now-button-plugin-1-8-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-33006. | CVE ID: CVE-2024-33006
Date Updated: 2024-08-02T02:27:53.232Z
Date Published: 2024-05-14T04:16:06.647Z
Description:
An unauthenticated attacker can upload a malicious file to the server which when accessed by a victim can allow an attacker to completely compromise system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://me.sap.com/notes/3448171
- https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-50440. | CVE ID: CVE-2023-50440
Date Updated: 2024-08-02T22:16:46.889Z
Date Published: 2023-12-13T00:00:00
Description:
ZED containers produced by PRIMX ZED! for Windows before Q.2020.3 (ANSSI qualification submission); ZED! for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before Q.2021.2 (ANSSI qualification submission); ZONECENTRAL for Windows before 2023.5; ZEDMAIL for Windows before 2023.5; ZED! for Windows, Mac, Linux before 2023.5; ZEDFREE for Windows, Mac, Linux before 2023.5; or ZEDPRO for Windows, Mac, Linux before 2023.5 can be modified by an unauthenticated attacker to include a UNC reference so that it could trigger network access to an attacker-controlled computer when opened by the victim.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.primx.eu/fr/blog/
- https://www.primx.eu/en/bulletins/security-bulletin-23B30931/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide information about the following MITRE ATT&CK technique: | T1569 : System Services | Name: System Services
ID: T1569
URL: https://attack.mitre.org/techniques/T1569
Platforms: Windows, macOS, Linux
Kill Chain Phases: Execution
Description: Adversaries may abuse system services or daemons to execute commands or programs. Adversaries can execute malicious content by interacting with or creating services either locally or remotely. Many services are set to run at boot, which can aid in achieving persistence ([Create or Modify System Process](T1543)), but adversaries can also abuse services for one-time or temporary execution.
Data Sources: Windows Registry: Windows Registry Key Modification, Process: Process Creation, Service: Service Creation, File: File Modification, Command: Command Execution
Detection: Monitor for command line invocations of tools capable of modifying services that doesn’t correspond to normal usage patterns and known software, patch cycles, etc. Also monitor for changes to executables and other files associated with services. Changes to Windows services may also be reflected in the Registry. |
Provide detailed information about CVE-2024-30285. | CVE ID: CVE-2024-30285
Date Updated: 2024-08-02T01:32:06.954Z
Date Published: 2024-06-13T08:24:29.279Z
Description:
Audition versions 24.2, 23.6.4 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service condition. An attacker could exploit this vulnerability to crash the application, leading to a denial of service. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/audition/apsb24-32.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-4625. | CVE ID: CVE-2016-4625
Date Updated: 2024-08-06T00:32:25.977Z
Date Published: 2016-07-22T01:00:00
Description:
Use-after-free vulnerability in IOSurface in Apple OS X before 10.11.6 allows local users to gain privileges via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/91824
- https://www.exploit-db.com/exploits/40669/
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- https://www.exploit-db.com/exploits/40653/
- http://www.securitytracker.com/id/1036348
- https://support.apple.com/HT206903
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-3151. | CVE ID: CVE-2024-3151
Date Updated: 2024-08-01T20:05:07.593Z
Date Published: 2024-04-02T17:00:04.919Z
Description:
A vulnerability, which was classified as problematic, was found in Bdtask Multi-Store Inventory Management System up to 20240325. Affected is an unknown function of the file /stockmovment/stockmovment/delete/ of the component Stock Movement Page. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-258924. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.258924
- https://vuldb.com/?ctiid.258924
- https://vuldb.com/?submit.303898
- https://drive.google.com/file/d/1oTqULJy357Z4dk85vPR_yMFXRNhwZywX/view?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-41954. | CVE ID: CVE-2022-41954
Date Updated: 2024-08-03T12:56:38.609Z
Date Published: 2022-11-25T00:00:00
Description:
MPXJ is an open source library to read and write project plans from a variety of file formats and databases. On Unix-like operating systems (not Windows or macos), MPXJ's use of `File.createTempFile(..)` results in temporary files being created with the permissions `-rw-r--r--`. This means that any other user on the system can read the contents of this file. When MPXJ is reading a schedule file which requires the creation of a temporary file or directory, a knowledgeable local user could locate these transient files while they are in use and would then be able to read the schedule being processed by MPXJ. The problem has been patched, MPXJ version 10.14.1 and later includes the necessary changes. Users unable to upgrade may set `java.io.tmpdir` to a directory to which only the user running the application has access will prevent other users from accessing these temporary files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/joniles/mpxj/security/advisories/GHSA-jf2p-4gqj-849g
- https://github.com/joniles/mpxj/commit/ae0af24345d79ad45705265d9927fe55e94a5721
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-6808. | CVE ID: CVE-2020-6808
Date Updated: 2024-08-04T09:11:05.026Z
Date Published: 2020-03-25T21:13:32
Description:
When a JavaScript URL (javascript:) is evaluated and the result is a string, this string is parsed to create an HTML document, which is then presented. Previously, this document's URL (as reported by the document.location property, for example) was the originating javascript: URL which could lead to spoofing attacks; it is now correctly the URL of the originating document. This vulnerability affects Firefox < 74.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1247968
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-45730. | CVE ID: CVE-2022-45730
Date Updated: 2024-08-03T14:17:04.118Z
Date Published: 2023-01-25T00:00:00
Description:
A cross-site scripting (XSS) vulnerability in Doctor Appointment Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://phpgurukul.com/doctor-appointment-management-system-using-php-and-mysql/
- https://github.com/Rajeshwar40/CVE/blob/main/CVE-2022-45730
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-1856. | CVE ID: CVE-2016-1856
Date Updated: 2024-08-05T23:10:40.300Z
Date Published: 2016-05-20T10:00:00
Description:
WebKit, as used in Apple iOS before 9.3.2, Safari before 9.1.1, and tvOS before 9.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, a different vulnerability than CVE-2016-1854, CVE-2016-1855, and CVE-2016-1857.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2016/May/msg00005.html
- http://www.securitytracker.com/id/1035888
- http://packetstormsecurity.com/files/137229/WebKitGTK-Code-Execution-Denial-Of-Service-Memory-Corruption.html
- https://support.apple.com/HT206564
- http://www.zerodayinitiative.com/advisories/ZDI-16-342
- http://lists.apple.com/archives/security-announce/2016/May/msg00002.html
- https://support.apple.com/HT206565
- http://www.securityfocus.com/archive/1/538522/100/0/threaded
- https://support.apple.com/HT206568
- http://lists.apple.com/archives/security-announce/2016/May/msg00001.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-20726. | CVE ID: CVE-2022-20726
Date Updated: 2024-09-16T18:43:22.070Z
Date Published: 2022-04-15T14:20:55.850833Z
Description:
Multiple vulnerabilities in the Cisco IOx application hosting environment on multiple Cisco platforms could allow an attacker to inject arbitrary commands into the underlying host operating system, execute arbitrary code on the underlying host operating system, install applications without being authenticated, or conduct a cross-site scripting (XSS) attack against a user of the affected software. For more information about these vulnerabilities, see the Details section of this advisory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-3409. | CVE ID: CVE-2011-3409
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-36100. | CVE ID: CVE-2023-36100
Date Updated: 2024-10-01T16:28:43.974Z
Date Published: 2023-09-01T00:00:00
Description:
An issue was discovered in IceCMS version 2.0.1, allows attackers to escalate privileges and gain sensitive information via UserID parameter in api/User/ChangeUser.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/Thecosy/IceCMS/issues/15
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-8761. | CVE ID: CVE-2015-8761
Date Updated: 2024-09-16T22:14:18.500Z
Date Published: 2016-01-08T19:00:00Z
Description:
The Values module 7.x-1.x before 7.x-1.2 for Drupal does not properly check permissions, which allows remote administrators with the "Import value sets" permission to execute arbitrary PHP code via the exported values list in a ctools import.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://cgit.drupalcode.org/values/commit/?id=5942ee9
- http://www.securityfocus.com/bid/79656
- https://www.drupal.org/node/2636344
- https://www.drupal.org/node/2622534
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-23926. | CVE ID: CVE-2021-23926
Date Updated: 2024-08-03T19:14:09.643Z
Date Published: 2021-01-14T14:45:18
Description:
The XML parsers used by XMLBeans up to version 2.6.0 did not set the properties needed to protect the user from malicious XML input. Vulnerabilities include possibilities for XML Entity Expansion attacks. Affects XMLBeans up to and including v2.6.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://poi.apache.org/
- https://issues.apache.org/jira/browse/XMLBEANS-517
- https://lists.apache.org/thread.html/r2dc5588009dc9f0310b7382269f932cc96cae4c3901b747dda1a7fed%40%3Cjava-dev.axis.apache.org%3E
- https://lists.apache.org/thread.html/rbb01d10512098894cd5f22325588197532c64f1c818ea7e4120d40c1%40%3Cjava-dev.axis.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/06/msg00024.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://security.netapp.com/advisory/ntap-20210513-0004/
- https://www.oracle.com/security-alerts/cpujul2022.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-0391. | CVE ID: CVE-2019-0391
Date Updated: 2024-08-04T17:51:26.799Z
Date Published: 2019-11-13T22:00:44
Description:
Under certain conditions SAP NetWeaver AS Java (corrected in 7.10, 7.20, 7.30, 7.31, 7.40, 7.50) allows an attacker to access information which would otherwise be restricted.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=528880390
- https://launchpad.support.sap.com/#/notes/2835226
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-1873. | CVE ID: CVE-2008-1873
Date Updated: 2024-08-07T08:40:59.130Z
Date Published: 2008-04-17T17:00:00
Description:
Cross-site scripting (XSS) vulnerability in the private message feature in Nuke ET 3.2 and 3.4, when using Internet Explorer, allows remote authenticated users to inject arbitrary web script or HTML via a CSS property in the STYLE attribute of a DIV element in the mensaje parameter. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/29651
- http://mrzayas.es/wp-content/poc/nukeet.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/41646
- http://www.mrzayas.es/2008/04/04/xploitnukeet3/
- http://www.securityfocus.com/bid/28614
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-10379. | CVE ID: CVE-2016-10379
Date Updated: 2024-08-06T03:21:50.842Z
Date Published: 2017-05-29T19:00:00
Description:
The VirtueMart com_virtuemart component 3.0.14 for Joomla! allows SQL injection by remote authenticated administrators via the virtuemart_paymentmethod_id or virtuemart_shipmentmethod_id parameter to administrator/index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/98753
- http://code610.blogspot.com/2016/08/testing-sql-injections-in-comvirtuemart.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-2170. | CVE ID: CVE-2013-2170
Date Updated: 2014-01-20T02:57:00
Date Published: 2014-01-20T02:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-5364. | CVE ID: CVE-2018-5364
Date Updated: 2024-08-05T05:33:44.174Z
Date Published: 2018-01-12T09:00:00
Description:
The WPGlobus plugin 1.9.6 for WordPress has XSS via the wpglobus_option[browser_redirect][redirect_by_language] parameter to wp-admin/options.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/d4wner/Vulnerabilities-Report/blob/master/wpglobus.md
- https://wpvulndb.com/vulnerabilities/9003
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-33185. | CVE ID: CVE-2022-33185
Date Updated: 2024-08-03T08:01:20.233Z
Date Published: 2022-10-25T00:00:00
Description:
Several commands in Brocade Fabric OS before Brocade Fabric OS v.9.0.1e, and v9.1.0 use unsafe string functions to process user input. Authenticated local attackers could abuse these vulnerabilities to exploit stack-based buffer overflows, allowing arbitrary code execution as the root user account.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2022-2078
- https://security.netapp.com/advisory/ntap-20230127-0010/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-9379. | CVE ID: CVE-2019-9379
Date Updated: 2024-08-04T21:46:30.635Z
Date Published: 2019-09-27T18:05:17
Description:
In libstagefright, there is a possible resource exhaustion due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-124329638
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-18634. | CVE ID: CVE-2019-18634
Date Updated: 2024-08-05T01:54:14.581Z
Date Published: 2020-01-29T17:23:26
Description:
In Sudo before 1.8.26, if pwfeedback is enabled in /etc/sudoers, users can trigger a stack-based buffer overflow in the privileged sudo process. (pwfeedback is a default setting in Linux Mint and elementary OS; however, it is NOT the default for upstream and many other packages, and would exist only if enabled by an administrator.) The attacker needs to deliver a long string to the stdin of getln() in tgetpass.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT210919
- https://seclists.org/bugtraq/2020/Jan/44
- https://www.sudo.ws/security.html
- https://www.sudo.ws/alerts/pwfeedback.html
- http://www.openwall.com/lists/oss-security/2020/01/30/6
- http://www.openwall.com/lists/oss-security/2020/01/31/1
- http://seclists.org/fulldisclosure/2020/Jan/40
- https://www.debian.org/security/2020/dsa-4614
- https://lists.debian.org/debian-lts-announce/2020/02/msg00002.html
- https://seclists.org/bugtraq/2020/Feb/3
- https://seclists.org/bugtraq/2020/Feb/2
- http://packetstormsecurity.com/files/156174/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/156189/Sudo-1.8.25p-Buffer-Overflow.html
- http://www.openwall.com/lists/oss-security/2020/02/05/2
- http://www.openwall.com/lists/oss-security/2020/02/05/5
- https://usn.ubuntu.com/4263-1/
- https://security.netapp.com/advisory/ntap-20200210-0001/
- https://usn.ubuntu.com/4263-2/
- https://access.redhat.com/errata/RHSA-2020:0487
- https://access.redhat.com/errata/RHSA-2020:0509
- https://access.redhat.com/errata/RHSA-2020:0540
- http://lists.opensuse.org/opensuse-security-announce/2020-02/msg00029.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IY6DZ7WMDKU4ZDML6MJLDAPG42B5WVUC/
- https://access.redhat.com/errata/RHSA-2020:0726
- https://security.gentoo.org/glsa/202003-12
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/I6TKF36KOQUVJNBHSVJFA7BU3CCEYD2F/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-26057. | CVE ID: CVE-2021-26057
Date Updated: 2022-01-19T03:26:53
Date Published: 2022-01-19T03:26:53
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-23631. | CVE ID: CVE-2023-23631
Date Updated: 2024-08-02T10:35:33.625Z
Date Published: 2023-02-09T20:46:22.930Z
Description:
github.com/ipfs/go-unixfsnode is an ADL IPLD prime node that wraps go-codec-dagpb's implementation of protobuf to enable pathing. In versions priot to 1.5.2 trying to read malformed HAMT sharded directories can cause panics and virtual memory leaks.
If you are reading untrusted user input, an attacker can then trigger a panic. This is caused by bogus fanout parameter in the HAMT directory nodes. Users are advised to upgrade. There are no known workarounds for this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/ipfs/go-unixfsnode/security/advisories/GHSA-4gj3-6r43-3wfc
- https://github.com/ipfs/go-unixfsnode/commit/59050ea8bc458ae55246ae09243e6e165923e076
- https://github.com/ipfs/go-unixfsnode/commit/91b3d39d33ef0cd2aff2c95d50b2329350944b68
- https://github.com/ipfs/go-unixfsnode/commit/a4ed723727e0bdc2277158337c2fc0d82802d122
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-40848. | CVE ID: CVE-2021-40848
Date Updated: 2024-08-04T02:51:07.439Z
Date Published: 2021-11-03T10:11:45
Description:
In Mahara before 20.04.5, 20.10.3, 21.04.2, and 21.10.0, exported CSV files could contain characters that a spreadsheet program could interpret as a command, leading to execution of a malicious string locally on a device, aka CSV injection.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.launchpad.net/mahara/+bug/1930471
- https://mahara.org/interaction/forum/topic.php?id=8950
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-1737. | CVE ID: CVE-2012-1737
Date Updated: 2024-08-06T19:08:38.350Z
Date Published: 2012-07-17T22:00:00
Description:
Unspecified vulnerability in the Enterprise Manager for Oracle Database component in Oracle Database Server 11.1.0.7, 11.2.0.2, and 11.2.0.3, and Enterprise Manager Grid Control EM Base Platform 10.2.0.5, EM Base Platform 11.1.0.1, EM Plugin for DB 12.1.0.1, and EM Plugin for DB 12.1.0.2, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to DB Performance Advisories/UIs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00018.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77014
- http://osvdb.org/83945
- http://www.securitytracker.com/id?1027260
- http://www.securityfocus.com/bid/54569
- http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-6923. | CVE ID: CVE-2017-6923
Date Updated: 2024-09-16T17:42:46.607Z
Date Published: 2019-01-22T16:00:00Z
Description:
In Drupal 8.x prior to 8.3.7 When creating a view, you can optionally use Ajax to update the displayed data via filter parameters. The views subsystem/module did not restrict access to the Ajax endpoint to only views configured to use Ajax. This is mitigated if you have access restrictions on the view. It is best practice to always include some form of access restrictions on all views, even if you are using another module to display them.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/100368
- https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple
- http://www.securitytracker.com/id/1039200
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-50885. | CVE ID: CVE-2023-50885
Date Updated: 2024-08-02T22:23:43.816Z
Date Published: 2024-04-18T11:00:34.490Z
Description:
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in AGILELOGIX Store Locator WordPress.This issue affects Store Locator WordPress: from n/a through 1.4.14.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/agile-store-locator/wordpress-store-locator-wordpress-plugin-1-4-14-arbitrary-file-deletion-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-4971. | CVE ID: CVE-2024-4971
Date Updated: 2024-08-01T20:55:10.435Z
Date Published: 2024-05-22T05:32:46.886Z
Description:
The LearnPress – WordPress LMS Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 4.2.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/10b08a05-3561-4d05-985b-6a2339a547a7?source=cve
- https://wordpress.org/plugins/learnpress/#developers
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-22170. | CVE ID: CVE-2022-22170
Date Updated: 2024-09-17T04:23:57.528Z
Date Published: 2022-01-19T00:21:17.254985Z
Description:
A Missing Release of Resource after Effective Lifetime vulnerability in the Packet Forwarding Engine (PFE) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause a Denial of Service (DoS) by sending specific packets over VXLAN which cause heap memory to leak and on exhaustion the PFE to reset. The heap memory utilization can be monitored with the command: user@host> show chassis fpc This issue affects: Juniper Networks Junos OS 19.4 versions prior to 19.4R2-S6, 19.4R3-S6; 20.1 versions prior to 20.1R3-S2; 20.2 versions prior to 20.2R3-S3; 20.3 versions prior to 20.3R3-S1; 20.4 versions prior to 20.4R3; 21.1 versions prior to 21.1R3; 21.2 versions prior to 21.2R2. This issue does not affect versions of Junos OS prior to 19.4R1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.juniper.net/JSA11277
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-4973. | CVE ID: CVE-2016-4973
Date Updated: 2024-08-06T00:46:39.910Z
Date Published: 2017-06-07T20:00:00
Description:
Binaries compiled against targets that use the libssp library in GCC for stack smashing protection (SSP) might allow local users to perform buffer overflow attacks by leveraging lack of the Object Size Checking feature.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1324759
- http://www.securityfocus.com/bid/92530
- http://www.openwall.com/lists/oss-security/2016/08/17/6
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-3005. | CVE ID: CVE-2014-3005
Date Updated: 2024-08-06T10:28:46.259Z
Date Published: 2018-02-01T17:00:00
Description:
XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html
- http://www.securityfocus.com/bid/68075
- https://support.zabbix.com/browse/ZBX-8151
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html
- http://seclists.org/fulldisclosure/2014/Jun/87
- https://bugzilla.redhat.com/show_bug.cgi?id=1110496
- https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-2570. | CVE ID: CVE-2014-2570
Date Updated: 2024-08-06T10:21:35.895Z
Date Published: 2015-08-31T18:00:00
Description:
Cross-site scripting (XSS) vulnerability in www/make_subset.php in PHP Font Lib before 0.3.1 allows remote attackers to inject arbitrary web script or HTML via the name parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/PhenX/php-font-lib/commit/d13682b7e27d14a6323c441426f3dde1cd86c751
- http://osvdb.org/show/osvdb/104896
- https://github.com/PhenX/php-font-lib/releases/tag/0.3.1
- http://www.securityfocus.com/bid/66380
- http://codalabs.net/cla-2014-001
- http://www.securityfocus.com/archive/1/531587/100/0/threaded
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-9897. | CVE ID: CVE-2016-9897
Date Updated: 2024-08-06T03:07:30.797Z
Date Published: 2018-06-11T21:00:00
Description:
Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox < 50.1, Firefox ESR < 45.6, and Thunderbird < 45.6.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.mozilla.org/security/advisories/mfsa2016-94/
- https://www.mozilla.org/security/advisories/mfsa2016-95/
- http://www.securityfocus.com/bid/94885
- https://bugzilla.mozilla.org/show_bug.cgi?id=1301381
- http://www.securitytracker.com/id/1037461
- https://security.gentoo.org/glsa/201701-15
- https://www.debian.org/security/2017/dsa-3757
- https://www.mozilla.org/security/advisories/mfsa2016-96/
- http://rhn.redhat.com/errata/RHSA-2016-2946.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-12174. | CVE ID: CVE-2017-12174
Date Updated: 2024-08-05T18:28:16.599Z
Date Published: 2018-03-07T22:00:00Z
Description:
It was found that when Artemis and HornetQ before 2.4.0 are configured with UDP discovery and JGroups discovery a huge byte array is created when receiving an unexpected multicast message. This may result in a heap memory exhaustion, full GC, or OutOfMemoryError.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://access.redhat.com/errata/RHSA-2018:0479
- https://access.redhat.com/errata/RHSA-2018:0481
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-12174
- https://access.redhat.com/errata/RHSA-2018:0269
- https://access.redhat.com/errata/RHSA-2018:0270
- https://access.redhat.com/errata/RHSA-2018:0271
- https://access.redhat.com/errata/RHSA-2018:0268
- https://access.redhat.com/errata/RHSA-2018:0480
- https://access.redhat.com/errata/RHSA-2018:0275
- https://access.redhat.com/errata/RHSA-2018:0478
- https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088%40%3Ccommits.activemq.apache.org%3E
- https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d%40%3Ccommits.activemq.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-3799. | CVE ID: CVE-2017-3799
Date Updated: 2024-08-05T14:39:40.622Z
Date Published: 2017-01-26T07:45:00
Description:
A vulnerability in a URL parameter of Cisco WebEx Meeting Center could allow an unauthenticated, remote attacker to perform site redirection. More Information: CSCzu78401. Known Affected Releases: T28.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1037647
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-wms4
- http://www.securityfocus.com/bid/95642
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-41948. | CVE ID: CVE-2023-41948
Date Updated: 2024-09-24T14:22:57.223Z
Date Published: 2023-09-25T00:36:50.648Z
Description:
Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in Christoph Rado Cookie Notice & Consent plugin <= 1.6.0 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/cookie-notice-consent/wordpress-cookie-notice-consent-plugin-1-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30484. | CVE ID: CVE-2024-30484
Date Updated: 2024-08-02T01:38:59.645Z
Date Published: 2024-06-04T19:08:24.494Z
Description:
Missing Authorization vulnerability in RT Easy Builder – Advanced addons for Elementor.This issue affects RT Easy Builder – Advanced addons for Elementor: from n/a through 2.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/rt-easy-builder-advanced-addons-for-elementor/wordpress-rt-easy-builder-plugin-2-0-broken-access-control-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-27548. | CVE ID: CVE-2022-27548
Date Updated: 2024-09-16T18:12:59.889Z
Date Published: 2022-07-06T20:25:13.132112Z
Description:
HCL Launch stores user credentials in plain clear text which can be read by a local user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0099253
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-0390. | CVE ID: CVE-2018-0390
Date Updated: 2024-08-05T03:21:15.483Z
Date Published: 2018-07-18T23:00:00
Description:
A vulnerability in the web framework of Cisco Webex could allow an unauthenticated, remote attacker to conduct a Document Object Model-based (DOM-based) cross-site scripting (XSS) attack against the user of the web interface of an affected system. The vulnerability is due to insufficient input validation of certain parameters that are passed to the affected software by using the HTTP POST method. An attacker who can submit malicious scripts to the affected user interface element could execute arbitrary script or HTML code in the user's browser in the context of the affected site. Cisco Bug IDs: CSCvj33287.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180718-webex-DOM-xss
- http://www.securityfocus.com/bid/104865
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-31639. | CVE ID: CVE-2022-31639
Date Updated: 2024-08-03T07:26:01.085Z
Date Published: 2023-06-13T16:14:12.282Z
Description:
Potential time-of-check to time-of-use (TOCTOU) vulnerabilities have been identified in the BIOS for certain HP PC products, which might allow arbitrary code execution, escalation of privilege, denial of service, and information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hp.com/us-en/document/ish_7149996-7150021-16/hpsbhf03814
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-32944. | CVE ID: CVE-2021-32944
Date Updated: 2024-08-03T23:33:55.939Z
Date Published: 2021-06-17T12:50:37
Description:
A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service condition or execute code in the context of the current process.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://us-cert.cisa.gov/ics/advisories/icsa-21-159-02
- https://cert-portal.siemens.com/productcert/pdf/ssa-365397.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-21-987/
- https://www.zerodayinitiative.com/advisories/ZDI-21-990/
- https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15698. | CVE ID: CVE-2017-15698
Date Updated: 2024-09-16T16:12:41.804Z
Date Published: 2018-01-31T14:00:00Z
Description:
When parsing the AIA-Extension field of a client certificate, Apache Tomcat Native Connector 1.2.0 to 1.2.14 and 1.1.23 to 1.1.34 did not correctly handle fields longer than 127 bytes. The result of the parsing error was to skip the OCSP check. It was therefore possible for client certificates that should have been rejected (if the OCSP check had been made) to be accepted. Users not using OCSP checks are not affected by this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.debian.org/security/2018/dsa-4118
- https://lists.debian.org/debian-lts-announce/2018/02/msg00011.html
- https://access.redhat.com/errata/RHSA-2018:0465
- http://www.securitytracker.com/id/1040390
- https://lists.apache.org/thread.html/6eb0a53e5827d97db1a05c736d01101fec21202a5b8fc77bb0eaaed8%40%3Cannounce.tomcat.apache.org%3E
- https://access.redhat.com/errata/RHSA-2018:0466
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/f8e0814e11c7f21f42224b6de111cb3f5e5ab5c15b78924c516d4ec2%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/re3b72cbb13e1dfe85c4a06959a3b6ca6d939b407ecca80db12b54220%40%3Cdev.tomcat.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-11665. | CVE ID: CVE-2019-11665
Date Updated: 2024-08-04T23:03:32.335Z
Date Published: 2019-09-17T19:01:27
Description:
Data exposure in Micro Focus Service Manager product versions 9.30, 9.31, 9.32, 9.33, 9.34, 9.35, 9.40, 9.41, 9.50, 9.51, 9.52, 9.60, 9.61, 9.62. The vulnerability could be exploited to allow sensitive data exposure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://softwaresupport.softwaregrp.com/doc/KM03518316
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-4224. | CVE ID: CVE-2014-4224
Date Updated: 2024-08-06T11:12:34.079Z
Date Published: 2014-07-17T02:36:00
Description:
Unspecified vulnerability in Oracle Sun Solaris 8, 9, 10, and 11.1 allows local users to affect availability via unknown vectors related to sockfs.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.securityfocus.com/archive/1/534161/100/0/threaded
- https://exchange.xforce.ibmcloud.com/vulnerabilities/94610
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://seclists.org/fulldisclosure/2014/Dec/23
- http://www.securitytracker.com/id/1030588
- http://secunia.com/advisories/59504
- http://www.securityfocus.com/bid/68574
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-42903. | CVE ID: CVE-2024-42903
Date Updated: 2024-09-03T20:32:11.537Z
Date Published: 2024-09-03T00:00:00
Description:
A Host header injection vulnerability in the password reset function of LimeSurvey v.6.6.1+240806 and before allows attackers to send users a crafted password reset link that will direct victims to a malicious domain.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/LimeSurvey/LimeSurvey/pull/3920
- https://github.com/LimeSurvey/LimeSurvey/compare/6.6.0+240729...6.6.1+240806
- https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42903
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-40277. | CVE ID: CVE-2022-40277
Date Updated: 2024-08-03T12:14:40.043Z
Date Published: 2022-09-30T16:20:59
Description:
Joplin version 2.8.8 allows an external attacker to execute arbitrary commands remotely on any client that opens a link in a malicious markdown file, via Joplin. This is possible because the application does not properly validate the schema/protocol of existing links in the markdown file before passing them to the 'shell.openExternal' function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://fluidattacks.com/advisories/skrillex/
- https://github.com/laurent22/joplin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-5707. | CVE ID: CVE-2017-5707
Date Updated: 2024-09-17T02:21:15.030Z
Date Published: 2017-11-21T14:00:00Z
Description:
Multiple buffer overflows in kernel in Intel Trusted Execution Engine Firmware 3.0 allow attacker with local access to the system to execute arbitrary code.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.netapp.com/advisory/ntap-20171120-0001/
- https://twitter.com/PTsecurity_UK/status/938447926128291842
- http://www.securityfocus.com/bid/101919
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr
- https://www.synology.com/support/security/Synology_SA_17_73
- https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf
- https://www.asus.com/News/wzeltG5CjYaIwGJ0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-44939. | CVE ID: CVE-2022-44939
Date Updated: 2024-08-03T14:01:31.440Z
Date Published: 2023-01-06T00:00:00
Description:
Efs Software Easy Chat Server Version 3.1 was discovered to contain a DLL hijacking vulnerability via the component TextShaping.dll. This vulnerability allows attackers to execute arbitrary code via a crafted DLL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/RashidKhanPathan/WindowsPrivilegeEscalation/blob/main/DLL%20Hijacking/CVE-2022-44939/Research.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-5622. | CVE ID: CVE-2017-5622
Date Updated: 2024-08-05T15:04:15.319Z
Date Published: 2017-03-26T20:00:00
Description:
With OxygenOS before 4.0.3, when a charger is connected to a powered-off OnePlus 3 or 3T device, the platform starts with adbd enabled. Therefore, a malicious charger or a physical attacker can open up, without authorization, an ADB session with the device, in order to further exploit other vulnerabilities and/or exfiltrate sensitive information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://alephsecurity.com/vulns/aleph-2017004
- http://www.securityfocus.com/bid/97092
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-2595. | CVE ID: CVE-2016-2595
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-25521. | CVE ID: CVE-2022-25521
Date Updated: 2024-08-03T04:42:49.697Z
Date Published: 2022-03-29T00:00:00
Description:
NUUO v03.11.00 was discovered to contain access control issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://medium.com/%40dnyaneshgawande111/use-of-default-credentials-to-unauthorised-remote-access-of-internal-panel-of-network-video-5490d107fa0
- http://nuuo.com
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-35019. | CVE ID: CVE-2023-35019
Date Updated: 2024-08-02T16:17:04.347Z
Date Published: 2023-07-31T00:27:01.113Z
Description:
IBM Security Verify Governance, Identity Manager 10.0 could allow a remote authenticated attacker to execute arbitrary commands on the system by sending a specially crafted request. IBM X-Force ID: 257873.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/7014397
- https://exchange.xforce.ibmcloud.com/vulnerabilities/257873
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-33047. | CVE ID: CVE-2023-33047
Date Updated: 2024-08-02T15:32:46.561Z
Date Published: 2023-11-07T05:26:48.751Z
Description:
Transient DOS in WLAN Firmware while parsing no-inherit IES.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/november-2023-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-10556. | CVE ID: CVE-2016-10556
Date Updated: 2024-09-17T03:47:51.757Z
Date Published: 2018-05-29T20:00:00Z
Description:
sequelize is an Object-relational mapping, or a middleman to convert things from Postgres, MySQL, MariaDB, SQLite and Microsoft SQL Server into usable data for NodeJS In Postgres, SQLite, and Microsoft SQL Server there is an issue where arrays are treated as strings and improperly escaped. This causes potential SQL injection in sequelize 3.19.3 and earlier, where a malicious user could put `["test", "'); DELETE TestTable WHERE Id = 1 --')"]` inside of ``` database.query('SELECT * FROM TestTable WHERE Name IN (:names)', { replacements: { names: directCopyOfUserInput } }); ``` and cause the SQL statement to become `SELECT Id FROM Table WHERE Name IN ('test', '\'); DELETE TestTable WHERE Id = 1 --')`. In Postgres, MSSQL, and SQLite, the backslash has no special meaning. This causes the the statement to delete whichever Id has a value of 1 in the TestTable table.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/sequelize/sequelize/issues/5671
- https://nodesecurity.io/advisories/102
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15463. | CVE ID: CVE-2017-15463
Date Updated: 2018-01-23T16:57:02
Date Published: 2018-01-23T17:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-36911. | CVE ID: CVE-2024-36911
Date Updated: 2024-08-02T03:43:49.175Z
Date Published: 2024-05-30T15:29:09.475Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
hv_netvsc: Don't free decrypted memory
In CoCo VMs it is possible for the untrusted host to cause
set_memory_encrypted() or set_memory_decrypted() to fail such that an
error is returned and the resulting memory is shared. Callers need to
take care to handle these errors to avoid returning decrypted (shared)
memory to the page allocator, which could lead to functional or security
issues.
The netvsc driver could free decrypted/shared pages if
set_memory_decrypted() fails. Check the decrypted field in the gpadl
to decide whether to free the memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/a56fe611326332bf6b7126e5559590c57dcebad4
- https://git.kernel.org/stable/c/4aaed9dbe8acd2b6114458f0498a617283d6275b
- https://git.kernel.org/stable/c/bbf9ac34677b57506a13682b31a2a718934c0e31
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-2886. | CVE ID: CVE-2019-2886
Date Updated: 2024-10-01T16:33:26.518Z
Date Published: 2019-10-16T17:40:53
Description:
Vulnerability in the Oracle Forms product of Oracle Fusion Middleware (component: Services). The supported version that is affected is 12.2.1.3.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Forms. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle Forms, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Forms accessible data as well as unauthorized read access to a subset of Oracle Forms accessible data. CVSS 3.0 Base Score 6.1 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-4905. | CVE ID: CVE-2008-4905
Date Updated: 2024-08-07T10:31:28.250Z
Date Published: 2008-11-04T00:00:00
Description:
Typo 5.1.3 and earlier uses a hard-coded salt for calculating password hashes, which makes it easier for attackers to guess passwords via a brute force attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/497970
- http://secunia.com/advisories/32272
- http://securityreason.com/securityalert/4550
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-31844. | CVE ID: CVE-2024-31844
Date Updated: 2024-08-08T13:30:36.712Z
Date Published: N/A
Description:
An issue was discovered in Italtel Embrace 1.6.4. The server does not properly handle application errors. In some cases, this leads to a disclosure of information about the server. An unauthenticated user is able craft specific requests in order to make the application generate an error. Inside an error message, some information about the server is revealed, such as the absolute path of the source code of the application. This kind of information can help an attacker to perform other attacks against the system. This can be exploited without authentication.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.gruppotim.it/it/footer/red-team.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-4408. | CVE ID: CVE-2014-4408
Date Updated: 2024-08-06T11:12:35.516Z
Date Published: 2014-09-18T10:00:00
Description:
The rt_setgate function in the kernel in Apple iOS before 8 and Apple TV before 7 allows local users to gain privileges or cause a denial of service (out-of-bounds read and device crash) via a crafted call.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.apple.com/kb/HT6441
- http://www.securitytracker.com/id/1030866
- http://www.securityfocus.com/bid/69939
- http://support.apple.com/kb/HT6442
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
- http://archives.neohapsis.com/archives/bugtraq/2014-09/0107.html
- http://www.securityfocus.com/bid/69882
- https://support.apple.com/kb/HT6535
- http://archives.neohapsis.com/archives/bugtraq/2014-09/0106.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96086
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-29665. | CVE ID: CVE-2021-29665
Date Updated: 2024-09-17T00:21:32.420Z
Date Published: 2021-05-31T14:50:18.877701Z
Description:
IBM Security Verify Access 20.07 is vulnerable to a stack based buffer overflow, caused by improper bounds checking which could allow a local attacker to execute arbitrary code on the system with elevated privileges.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/pages/node/6457315
- https://exchange.xforce.ibmcloud.com/vulnerabilities/199399
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-8884. | CVE ID: CVE-2020-8884
Date Updated: 2024-08-04T10:12:10.986Z
Date Published: 2021-01-06T13:42:22
Description:
rcdsvc in the Proofpoint Insider Threat Management Windows Agent (formerly ObserveIT Windows Agent) before 7.9 allows remote authenticated users to execute arbitrary code as SYSTEM because of improper deserialization over named pipes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.proofpoint.com/us/blog
- https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2020-0002
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-0561. | CVE ID: CVE-2024-0561
Date Updated: 2024-08-01T18:11:35.631Z
Date Published: 2024-03-11T17:56:07.112Z
Description:
The Ultimate Posts Widget WordPress plugin before 2.3.1 does not validate and escape some of its Widget options before outputting them back in attributes, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/99b6aa8b-deb9-48f8-8896-f3c8118a4f70/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-42094. | CVE ID: CVE-2023-42094
Date Updated: 2024-08-02T19:16:50.475Z
Date Published: 2024-05-03T02:13:07.356Z
Description:
Foxit PDF Reader Annotation Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Annotation objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-21873.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-23-1427/
- https://www.foxit.com/support/security-bulletins.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-0874. | CVE ID: CVE-2022-0874
Date Updated: 2024-08-02T23:40:04.506Z
Date Published: 2022-05-09T16:50:38
Description:
The WP Social Buttons WordPress plugin through 2.1 does not sanitise and escape its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/36cdd130-9bb7-4274-bac6-07d00008d810
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-10629. | CVE ID: CVE-2020-10629
Date Updated: 2024-08-04T11:06:10.190Z
Date Published: 2020-04-09T13:12:17
Description:
WebAccess/NMS (versions prior to 3.0.2) does not sanitize XML input. Specially crafted XML input could allow an attacker to read sensitive files.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.us-cert.gov/ics/advisories/icsa-20-098-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-2312. | CVE ID: CVE-2024-2312
Date Updated: 2024-08-29T17:44:12.763Z
Date Published: 2024-04-05T19:40:02.848Z
Description:
GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.launchpad.net/ubuntu/+source/grub2-unsigned/+bug/2054127
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312
- https://security.netapp.com/advisory/ntap-20240426-0003/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-7016. | CVE ID: CVE-2019-7016
Date Updated: 2020-04-02T13:41:33
Date Published: 2020-04-02T13:41:33
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-48882. | CVE ID: CVE-2022-48882
Date Updated: 2024-09-12T17:32:52.633Z
Date Published: 2024-08-21T06:10:13.640Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix macsec possible null dereference when updating MAC security entity (SecY)
Upon updating MAC security entity (SecY) in hw offload path, the macsec
security association (SA) initialization routine is called. In case of
extended packet number (epn) is enabled the salt and ssci attributes are
retrieved using the MACsec driver rx_sa context which is unavailable when
updating a SecY property such as encoding-sa hence the null dereference.
Fix by using the provided SA to set those attributes.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/514d9c6a39213d8200884e70f60ce7faef1ee597
- https://git.kernel.org/stable/c/9828994ac492e8e7de47fe66097b7e665328f348
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-16299. | CVE ID: CVE-2020-16299
Date Updated: 2024-08-04T13:37:54.246Z
Date Published: 2020-08-13T02:08:45
Description:
A Division by Zero vulnerability in bj10v_print_page() in contrib/japanese/gdev10v.c of Artifex Software GhostScript v9.50 allows a remote attacker to cause a denial of service via a crafted PDF file. This is fixed in v9.51.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugs.ghostscript.com/show_bug.cgi?id=701801
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=4fcbece46870
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=19cebe708b9ee3d9e0f8bcdd79dbc6ef9ddc70d2
- https://lists.debian.org/debian-lts-announce/2020/08/msg00032.html
- https://www.debian.org/security/2020/dsa-4748
- https://security.gentoo.org/glsa/202008-20
- https://usn.ubuntu.com/4469-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-13119. | CVE ID: CVE-2017-13119
Date Updated: 2019-03-05T19:57:01
Date Published: 2019-03-05T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-31627. | CVE ID: CVE-2024-31627
Date Updated: 2024-06-05T17:04:54.658Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-24579. | CVE ID: CVE-2024-24579
Date Updated: 2024-08-23T16:26:39.050Z
Date Published: 2024-01-31T16:40:35.385Z
Description:
stereoscope is a go library for processing container images and simulating a squash filesystem. Prior to version 0.0.1, it is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Specifically, use of `github.com/anchore/stereoscope/pkg/file.UntarToDirectory()` function, the `github.com/anchore/stereoscope/pkg/image/oci.TarballImageProvider` struct, or the higher level `github.com/anchore/stereoscope/pkg/image.Image.Read()` function express this vulnerability. As a workaround, if you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/anchore/stereoscope/security/advisories/GHSA-hpxr-w9w7-g4gv
- https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-0631. | CVE ID: CVE-2008-0631
Date Updated: 2024-08-07T07:54:23.297Z
Date Published: 2008-02-06T20:00:00
Description:
Multiple ActiveX controls in MailBee.dll in MailBee Objects 5.5 allow remote attackers to (1) overwrite arbitrary files via the SaveToDisk method, or (2) modify files via the AddStringToFile method.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/27481
- https://exchange.xforce.ibmcloud.com/vulnerabilities/40011
- https://www.exploit-db.com/exploits/4999
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-5038. | CVE ID: CVE-2023-5038
Date Updated: 2024-08-02T07:44:53.791Z
Date Published: 2024-06-25T02:14:06.610Z
Description:
badmonkey, a Security Researcher has found a flaw that allows for a unauthenticated DoS attack on the camera. An attacker runs a crafted URL, nobody can access the web management page of the camera. and must manually restart the device or re-power it. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.hanwhavision.com/wp-content/uploads/2024/06/Camera-Vulnerability-Report-CVE-2023-5037-5038.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2012-5947. | CVE ID: CVE-2012-5947
Date Updated: 2024-08-06T21:21:28.308Z
Date Published: 2013-04-30T01:00:00
Description:
Buffer overflow in the vsflex7l ActiveX control in IBM SPSS SamplePower 3.0 before FP1 allows remote attackers to execute arbitrary code via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21635511
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80563
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.