instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-25166.
CVE ID: CVE-2020-25166 Date Updated: 2024-08-04T15:26:10.204Z Date Published: 2022-04-14T20:05:59 Description: An improper verification of the cryptographic signature of firmware updates of the B. Braun Melsungen AG SpaceCom Version L81/U61 and earlier, and the Data module compactplus Versions A10 and A11 allows attackers to generate valid firmware updates with arbitrary content that can be used to tamper with devices. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.cisa.gov/uscert/ics/advisories/icsma-20-296-02 - https://www.bbraun.com/en/products-and-therapies/services/b-braun-vulnerability-disclosure-policy/security-advisory.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1135.
CVE ID: CVE-2024-1135 Date Updated: 2024-08-01T18:26:30.502Z Date Published: 2024-04-16T00:00:14.938Z Description: Gunicorn fails to properly validate Transfer-Encoding headers, leading to HTTP Request Smuggling (HRS) vulnerabilities. By crafting requests with conflicting Transfer-Encoding headers, attackers can bypass security restrictions and access restricted endpoints. This issue is due to Gunicorn's handling of Transfer-Encoding headers, where it incorrectly processes requests with multiple, conflicting Transfer-Encoding headers, treating them as chunked regardless of the final encoding specified. This vulnerability allows for a range of attacks including cache poisoning, session manipulation, and data exposure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.com/bounties/22158e34-cfd5-41ad-97e0-a780773d96c1 - https://lists.debian.org/debian-lts-announce/2024/06/msg00027.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-33271.
CVE ID: CVE-2024-33271 Date Updated: 2024-08-02T02:27:53.609Z Date Published: 2024-04-29T00:00:00 Description: An issue in FME Modules eventsmanager before 4.4.0 allows an attacker to obtain sensitive information from the ps_customer component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.friendsofpresta.org/modules/2024/04/25/eventsmanager.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11070.
CVE ID: CVE-2018-11070 Date Updated: 2024-09-16T19:36:17.519Z Date Published: 2018-09-11T19:00:00Z Description: RSA BSAFE Crypto-J versions prior to 6.2.4 and RSA BSAFE SSL-J versions prior to 6.2.4 contain a Covert Timing Channel vulnerability during PKCS #1 unpadding operations, also known as a Bleichenbacher attack. A remote attacker may be able to recover a RSA key. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1041615 - http://www.securitytracker.com/id/1041614 - https://seclists.org/fulldisclosure/2018/Sep/7 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1395.
CVE ID: CVE-2024-1395 Date Updated: 2024-08-01T18:40:20.595Z Date Published: 2024-05-03T13:24:26.606Z Description: Use After Free vulnerability in Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user to make improper GPU memory processing operations. If the system’s memory is carefully prepared by the user, then this in turn could give them access to already freed memory. This issue affects Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r47p0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25504.
CVE ID: CVE-2023-25504 Date Updated: 2024-08-02T11:25:18.492Z Date Published: 2023-04-17T16:29:43.729Z Description: A malicious actor who has been authenticated and granted specific permissions in Apache Superset may use the import dataset feature in order to conduct Server-Side Request Forgery attacks and query internal resources on behalf of the server where Superset is deployed. This vulnerability exists in Apache Superset versions up to and including 2.0.1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/tdnzkocfsqg2sbbornnp9g492fn4zhtx - http://www.openwall.com/lists/oss-security/2023/04/18/8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-37929.
CVE ID: CVE-2021-37929 Date Updated: 2024-08-04T01:30:09.019Z Date Published: 2021-10-07T15:22:26 Description: Zoho ManageEngine ADManager Plus version 7110 and prior allows unrestricted file upload which leads to remote code execution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.manageengine.com - https://www.manageengine.com/products/ad-manager/release-notes.html#7111 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-44438.
CVE ID: CVE-2023-44438 Date Updated: 2024-09-18T18:30:28.997Z Date Published: 2024-05-03T02:14:02.806Z Description: Ashlar-Vellum Argon Uncontrolled Search Path Element Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Argon. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of various file types. The process loads a library from an unsecured location. An attacker can leverage this vulnerability to execute code in the context of the current process. . Was ZDI-CAN-21678. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-23-1596/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-16836.
CVE ID: CVE-2018-16836 Date Updated: 2024-08-05T10:32:54.126Z Date Published: 2018-09-11T16:00:00 Description: Rubedo through 3.4.0 contains a Directory Traversal vulnerability in the theme component, allowing unauthenticated attackers to read and execute arbitrary files outside of the service root path, as demonstrated by a /theme/default/img/%2e%2e/..//etc/passwd URI. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/maroueneboubakri/CVE/tree/master/rubedo-cms - https://www.exploit-db.com/exploits/45385/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-29093.
CVE ID: CVE-2022-29093 Date Updated: 2024-09-17T04:14:51.831Z Date Published: 2022-06-10T20:05:16.999373Z Description: Dell SupportAssist Client Consumer versions (3.10.4 and versions prior) and Dell SupportAssist Client Commercial versions (3.1.1 and versions prior) contain an arbitrary file deletion vulnerability. Authenticated non-admin user could exploit the issue and delete arbitrary files on the system. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000200456/dsa-2022-139-dell-supportassist-for-home-pcs-and-business-pcs-security-update-for-multiple-security-vulnerabilities No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1020018.
CVE ID: CVE-2019-1020018 Date Updated: 2024-08-05T03:14:15.913Z Date Published: 2019-07-29T13:14:16 Description: Discourse before 2.3.0 and 2.4.x before 2.4.0.beta3 lacks a confirmation screen when logging in via an email link. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/discourse/discourse/commit/b8340c6c8e50a71ff1bca9654b9126ca5a84ce9a - https://github.com/discourse/discourse/commit/52387be4a44cdeaca5421ee955ba1343e836bade No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-6497.
CVE ID: CVE-2012-6497 Date Updated: 2024-08-06T21:28:39.841Z Date Published: 2013-01-04T02:00:00 Description: The Authlogic gem for Ruby on Rails, when used with certain versions before 3.2.10, makes potentially unsafe find_by_id method calls, which might allow remote attackers to conduct CVE-2012-6496 SQL injection attacks via a crafted parameter in environments that have a known secret_token value, as demonstrated by a value contained in secret_token.rb in an open-source product. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://blog.phusion.nl/2013/01/03/rails-sql-injection-vulnerability-hold-your-horses-here-are-the-facts/ - http://openwall.com/lists/oss-security/2013/01/03/12 - http://phenoelit.org/blog/archives/2012/12/21/let_me_github_that_for_you/index.html - http://www.securityfocus.com/bid/57084 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4386.
CVE ID: CVE-2017-4386 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4197.
CVE ID: CVE-2009-4197 Date Updated: 2024-08-07T06:54:09.926Z Date Published: 2009-12-04T11:00:00 Description: rpwizPppoe.htm in Huawei MT882 V100R002B020 ARG-T running firmware 3.7.9.98 contains a form that does not disable the autocomplete setting for the password parameter, which makes it easier for local users or physically proximate attackers to obtain the password from web browsers that support autocomplete. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/10276 - https://exchange.xforce.ibmcloud.com/vulnerabilities/54528 - http://www.securityfocus.com/bid/37194 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-5006.
CVE ID: CVE-2019-5006 Date Updated: 2024-09-17T02:02:45.145Z Date Published: 2019-01-03T23:00:00Z Description: An issue was discovered in Foxit Reader and PhantomPDF before 9.4 on Windows. It is a NULL pointer dereference during PDF parsing. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.foxitsoftware.com/support/security-bulletins.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5076.
CVE ID: CVE-2012-5076 Date Updated: 2024-08-06T20:58:01.707Z Date Published: 2012-10-16T21:29:00 Description: Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 7 and earlier allows remote attackers to affect confidentiality, integrity, and availability, related to JAX-WS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2012-10/msg00016.html - http://security.gentoo.org/glsa/glsa-201406-32.xml - http://rhn.redhat.com/errata/RHSA-2012-1386.html - http://rhn.redhat.com/errata/RHSA-2012-1391.html - http://secunia.com/advisories/51029 - http://secunia.com/advisories/51390 - http://rhn.redhat.com/errata/RHSA-2012-1467.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16641 - http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html - http://secunia.com/advisories/51326 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46251.
CVE ID: CVE-2021-46251 Date Updated: 2024-08-04T05:02:11.258Z Date Published: 2022-02-15T22:13:31 Description: A reflected cross-site scripting (XSS) in ScratchOAuth2 before commit 1603f04e44ef67dde6ccffe866d2dca16defb293 allows attackers to execute arbitrary web scripts or HTML via a crafted POST request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ScratchVerifier/ScratchOAuth2/commit/1603f04e44ef67dde6ccffe866d2dca16defb293 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-2254.
CVE ID: CVE-2016-2254 Date Updated: 2017-01-02T09:57:01 Date Published: 2017-01-02T09:46:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-52893.
CVE ID: CVE-2023-52893 Date Updated: 2024-09-12T17:33:14.166Z Date Published: 2024-08-21T06:10:33.043Z Description: In the Linux kernel, the following vulnerability has been resolved: gsmi: fix null-deref in gsmi_get_variable We can get EFI variables without fetching the attribute, so we must allow for that in gsmi. commit 859748255b43 ("efi: pstore: Omit efivars caching EFI varstore access layer") added a new get_variable call with attr=NULL, which triggers panic in gsmi. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/ee5763ef829bd923033510de6d1df7c73f085e4b - https://git.kernel.org/stable/c/32313c11bdc8a02c577abaf865be3664ab30410a - https://git.kernel.org/stable/c/ffef77794fb5f1245c3249b86342bad2299accb5 - https://git.kernel.org/stable/c/ae2a9dcc8caa60b1e14671294e5ec902ea5d1dfd - https://git.kernel.org/stable/c/eb0421d90f916dffe96b4c049ddf01c0c50620d2 - https://git.kernel.org/stable/c/6646d769fdb0ce4318ef9afd127f8526d1ca8393 - https://git.kernel.org/stable/c/a769b05eeed7accc4019a1ed9799dd72067f1ce8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-23455.
CVE ID: CVE-2022-23455 Date Updated: 2024-08-03T03:43:46.108Z Date Published: 2023-01-30T21:36:24.359Z Description: Potential security vulnerabilities have been identified in HP Support Assistant. These vulnerabilities include privilege escalation, compromise of integrity, allowed communication with untrusted clients, and unauthorized modification of files. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.hp.com/us-en/document/ish_5585999-5586023-16/hpsbgn03762 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11804.
CVE ID: CVE-2019-11804 Date Updated: 2023-05-12T00:00:00 Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14208.
CVE ID: CVE-2017-14208 Date Updated: 2020-03-06T23:50:25 Date Published: 2020-03-06T23:50:25 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1672.
CVE ID: CVE-2011-1672 Date Updated: 2024-08-06T22:37:25.758Z Date Published: 2011-04-10T01:29:00 Description: The Dell KACE K2000 Systems Deployment Appliance 3.3.36822 and earlier contains a peinst CIFS share, which allows remote attackers to obtain sensitive information by reading the (1) unattend.xml or (2) sysprep.inf file, as demonstrated by reading a password. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/47172 - http://www.kb.cert.org/vuls/id/598700 - http://www.vupen.com/english/advisories/2011/0883 - https://exchange.xforce.ibmcloud.com/vulnerabilities/66630 - http://www.kace.com/support/kb/index.php?action=artikel&cat=1&id=1104 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3188.
CVE ID: CVE-2024-3188 Date Updated: 2024-08-01T20:05:07.524Z Date Published: 2024-04-26T05:00:05.277Z Description: The WP Shortcodes Plugin — Shortcodes Ultimate WordPress plugin before 7.1.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/bc273e75-7faf-4eaf-8ebd-efc5d6e9261f/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-32836.
CVE ID: CVE-2023-32836 Date Updated: 2024-08-02T15:25:37.055Z Date Published: 2023-11-06T03:50:48.561Z Description: In display, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08126725; Issue ID: ALPS08126725. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://corp.mediatek.com/product-security-bulletin/November-2023 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3505.
CVE ID: CVE-2024-3505 Date Updated: 2024-08-01T20:12:07.415Z Date Published: 2024-04-15T07:42:27.975Z Description: JFrog Artifactory Self-Hosted versions below 7.77.3, are vulnerable to sensitive information disclosure whereby a low-privileged authenticated user can read the proxy configuration. This does not affect JFrog cloud deployments. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-49710.
CVE ID: CVE-2023-49710 Date Updated: 2024-02-14T16:42:09.407Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-5949.
CVE ID: CVE-2023-5949 Date Updated: 2024-08-02T08:14:25.139Z Date Published: 2023-12-18T20:08:03.243Z Description: The SmartCrawl WordPress plugin before 3.8.3 does not prevent unauthorised users from accessing password-protected posts' content. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/3cec27ca-f470-402d-ae3e-271cb59cf407 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-10148.
CVE ID: CVE-2016-10148 Date Updated: 2024-08-06T03:14:42.275Z Date Published: 2017-01-18T21:00:00 Description: The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/96847 - http://www.openwall.com/lists/oss-security/2016/08/20/1 - https://core.trac.wordpress.org/changeset/38168 - https://sumofpwn.nl/advisory/2016/path_traversal_vulnerability_in_wordpress_core_ajax_handlers.html - https://core.trac.wordpress.org/ticket/37490 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34438.
CVE ID: CVE-2021-34438 Date Updated: 2024-10-01T15:53:28.648Z Date Published: 2021-07-16T20:19:31 Description: Windows Font Driver Host Remote Code Execution Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34438 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-24888.
CVE ID: CVE-2022-24888 Date Updated: 2024-08-03T04:29:01.545Z Date Published: 2022-04-27T14:25:11 Description: Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp - https://github.com/nextcloud/server/pull/29895 - https://hackerone.com/reports/1402249 - https://security.gentoo.org/glsa/202208-17 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-9616.
CVE ID: CVE-2014-9616 Date Updated: 2024-08-06T13:47:41.843Z Date Published: 2017-09-19T15:00:00 Description: Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to obtain sensitive information by making a request that redirects to the deny page. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://packetstormsecurity.com/files/133034/Netsweeper-Bypass-XSS-Redirection-SQL-Injection-Execution.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-4198.
CVE ID: CVE-2015-4198 Date Updated: 2024-08-06T06:04:02.986Z Date Published: 2015-06-20T14:00:00 Description: Cross-site scripting (XSS) vulnerability in the web framework on Cisco Web Security Appliance (WSA) devices with software 8.5.0-497 allows remote attackers to inject arbitrary web script or HTML via an unspecified HTTP header, aka Bug ID CSCuu24409. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/viewAlert.x?alertId=39422 - http://www.securityfocus.com/bid/75326 - http://www.securitytracker.com/id/1032676 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-0368.
CVE ID: CVE-2014-0368 Date Updated: 2024-08-06T09:13:10.449Z Date Published: 2014-01-15T01:33:00 Description: Unspecified vulnerability in Oracle Java SE 5.0u55, 6u65, and 7u45, and Java SE Embedded 7u45, allows remote attackers to affect confidentiality via unknown vectors related to Networking. NOTE: the previous information is from the January 2014 CPU. Oracle has not commented on third-party claims that the issue is related to incorrect permission checks when listening on a socket, which allows attackers to escape the sandbox. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/56432 - https://access.redhat.com/errata/RHSA-2014:0414 - http://rhn.redhat.com/errata/RHSA-2014-0136.html - http://lists.opensuse.org/opensuse-updates/2014-01/msg00105.html - http://marc.info/?l=bugtraq&m=139402749111889&w=2 - http://rhn.redhat.com/errata/RHSA-2014-0135.html - http://secunia.com/advisories/56535 - http://www.ubuntu.com/usn/USN-2089-1 - http://rhn.redhat.com/errata/RHSA-2014-0030.html - http://rhn.redhat.com/errata/RHSA-2014-0097.html - http://secunia.com/advisories/56485 - http://marc.info/?l=bugtraq&m=139402697611681&w=2 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04166777 - https://bugzilla.redhat.com/show_bug.cgi?id=1052919 - http://www.securityfocus.com/bid/64930 - http://secunia.com/advisories/59339 - http://marc.info/?l=bugtraq&m=139402697611681&w=2 - http://rhn.redhat.com/errata/RHSA-2014-0027.html - http://secunia.com/advisories/56486 - http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00024.html - http://marc.info/?l=bugtraq&m=139402749111889&w=2 - http://www.securitytracker.com/id/1029608 - http://www.ubuntu.com/usn/USN-2124-1 - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00012.html - http://www-01.ibm.com/support/docview.wss?uid=swg21676978 - http://rhn.redhat.com/errata/RHSA-2014-0026.html - http://hg.openjdk.java.net/jdk7u/jdk7u/jdk/rev/e6160aedadd5 - http://www.securityfocus.com/bid/64758 - http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00009.html - http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html - http://rhn.redhat.com/errata/RHSA-2014-0134.html - http://secunia.com/advisories/59235 - http://lists.opensuse.org/opensuse-updates/2014-02/msg00000.html - http://lists.opensuse.org/opensuse-updates/2014-01/msg00107.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-8199.
CVE ID: CVE-2014-8199 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-20276.
CVE ID: CVE-2019-20276 Date Updated: 2022-09-29T16:51:48 Date Published: 2020-01-02T20:33:07 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1486.
CVE ID: CVE-2024-1486 Date Updated: 2024-08-16T18:15:02.675Z Date Published: 2024-05-14T15:10:22.262Z Description: Elevation of privileges via misconfigured access control list in GE HealthCare ultrasound devices No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://securityupdate.gehealthcare.com/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-42237.
CVE ID: CVE-2024-42237 Date Updated: 2024-09-11T17:34:32.028Z Date Published: 2024-08-07T15:14:26.221Z Description: In the Linux kernel, the following vulnerability has been resolved: firmware: cs_dsp: Validate payload length before processing block Move the payload length check in cs_dsp_load() and cs_dsp_coeff_load() to be done before the block is processed. The check that the length of a block payload does not exceed the number of remaining bytes in the firwmware file buffer was being done near the end of the loop iteration. However, some code before that check used the length field without validating it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/259955eca9b7acf1299b1ac077d8cfbe12df35d8 - https://git.kernel.org/stable/c/3a9cd924aec1288d675df721f244da4dd7e16cff - https://git.kernel.org/stable/c/71d9e313d8f7e18c543a9c80506fe6b1eb1fe0c8 - https://git.kernel.org/stable/c/6598afa9320b6ab13041616950ca5f8f938c0cf1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2233.
CVE ID: CVE-2014-2233 Date Updated: 2024-08-06T10:05:59.897Z Date Published: 2014-12-01T15:00:00 Description: Server-side request forgery (SSRF) vulnerability in the MapAPI in Infoware MapSuite before 1.0.36 and 1.1.x before 1.1.49 allows remote attackers to trigger requests to intranet servers via unspecified vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.christian-schneider.net/advisories/CVE-2014-2233.txt - http://iw.mapandroute.de/MapAPI-1.1/releaseHistory.jsp - http://iw.mapandroute.de/MapAPI-1.0/releaseHistory.jsp No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-4808.
CVE ID: CVE-2016-4808 Date Updated: 2024-08-06T00:39:26.205Z Date Published: 2017-01-11T16:00:00 Description: Web2py versions 2.14.5 and below was affected by CSRF (Cross Site Request Forgery) vulnerability, which allows an attacker to trick a logged in user to perform some unwanted actions i.e An attacker can trick an victim to disable the installed application just by sending a URL to victim. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/39821/ - http://packetstormsecurity.com/files/137070/Web2py-2.14.5-CSRF-XSS-Local-File-Inclusion.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7716.
CVE ID: CVE-2014-7716 Date Updated: 2024-08-06T12:56:12.362Z Date Published: 2014-10-21T10:00:00 Description: The Ultimate Christian Radios (aka com.ngg.ultimatechristianradios) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/585225 - http://www.kb.cert.org/vuls/id/582497 - https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-2039.
CVE ID: CVE-2017-2039 Date Updated: 2018-01-05T13:57:01 Date Published: 2018-01-05T14:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-2028.
CVE ID: CVE-2019-2028 Date Updated: 2024-08-04T18:35:52.469Z Date Published: 2019-04-19T19:23:22 Description: In numerous hand-crafted functions in libmpeg2, NEON registers are not preserved. This could lead to remote code execution with no additional execution privileges needed. User interaction is needed for exploitation. Product: Android. Versions: Android-7.0 Android-7.1.1 Android-7.1.2 Android-8.0 Android-8.1 Android-9. Android ID: A-120644655. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2019-04-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4515.
CVE ID: CVE-2008-4515 Date Updated: 2024-08-07T10:17:09.774Z Date Published: 2008-10-09T16:00:00 Description: Blue Coat K9 Web Protection 4.0.230 Beta relies on client-side JavaScript as a protection mechanism, which allows remote attackers to bypass authentication and access the (1) summary, (2) detail, (3) overrides, and (4) pwemail pages by disabling JavaScript. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://seclists.org/fulldisclosure/2008/Oct/0070.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/45696 - http://www.securityfocus.com/bid/31584 - http://dicas3000.blogspot.com/2008/10/blue-coat-k9-web-protection-v40230-beta.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the vulnerability CVE-CVE-2020-9818
CVE-CVE-2020-9818 is a vulnerability in iOS. It is related to the MITRE ATT&CK technique T1203: Exploitation for Client Execution. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
Provide detailed information about CVE-2022-43764.
CVE ID: CVE-2022-43764 Date Updated: 2024-08-03T13:40:06.235Z Date Published: 2023-02-08T10:12:50.627Z Description: Insufficient validation of input parameters when changing configuration on Tbase server in B&R APROL versions < R 4.2-07 could result in buffer overflow. This may lead to Denial-of-Service conditions or execution of arbitrary code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.br-automation.com/downloads_br_productcatalogue/assets/1674823095245-en-original-1.0.pdf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11598.
CVE ID: CVE-2018-11598 Date Updated: 2024-09-16T17:39:06.848Z Date Published: 2018-05-31T16:00:00Z Description: Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Information Disclosure with user crafted input files via a Buffer Overflow or Out-of-bounds Read during syntax parsing of certain for loops in jsparse.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/espruino/Espruino/files/2025968/test_2.txt - https://github.com/espruino/Espruino/files/2025956/test_0.txt - https://github.com/espruino/Espruino/files/2025963/test_1.txt - https://github.com/espruino/Espruino/commit/bf4416ab9129ee3afd56739ea4e3cd0da5484b6b - https://github.com/espruino/Espruino/issues/1437 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-46649.
CVE ID: CVE-2021-46649 Date Updated: 2024-08-04T05:10:35.399Z Date Published: 2022-02-18T19:46:29 Description: This vulnerability allows remote attackers to disclose sensitive information on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DGN files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-15535. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.bentley.com/en/common-vulnerability-exposure/BE-2021-0009 - https://www.zerodayinitiative.com/advisories/ZDI-22-236/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-46252.
CVE ID: CVE-2023-46252 Date Updated: 2024-09-04T15:22:43.945Z Date Published: 2023-11-07T19:00:58.743Z Description: Squidex is an open source headless CMS and content management hub. Affected versions are missing origin verification in a postMessage handler which introduces a Cross-Site Scripting (XSS) vulnerability. The editor-sdk.js file defines three different class-like functions, which employ a global message event listener: SquidexSidebar, SquidexWidget, and SquidexFormField. The registered event listener takes some action based on the type of the received message. For example, when the SquidexFormField receives a message with the type valueChanged, the value property is updated. The SquidexFormField class is for example used in the editor-editorjs.html file, which can be accessed via the public wwwroot folder. It uses the onValueChanged method to register a callback function, which passes the value provided from the message event to the editor.render. Passing an attacker-controlled value to this function introduces a Cross-Site Scripting (XSS) vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/Squidex/squidex/security/advisories/GHSA-7q4f-fprr-5jw8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-36730.
CVE ID: CVE-2022-36730 Date Updated: 2024-08-03T10:14:27.906Z Date Published: 2022-08-30T20:43:47 Description: Library Management System v1.0 was discovered to contain a SQL injection vulnerability via the bookId parameter at /librarian/delete.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/k0xx11/bug_report/blob/main/vendors/kingbhob02/library-management-system/SQLi-20.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4110.
CVE ID: CVE-2023-4110 Date Updated: 2024-08-02T07:17:11.835Z Date Published: 2023-08-03T02:31:03.086Z Description: A vulnerability has been found in PHP Jabbers Availability Booking Calendar 5.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument session_id leads to cross site scripting. The attack can be launched remotely. The identifier VDB-235957 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.235957 - https://vuldb.com/?ctiid.235957 - http://packetstormsecurity.com/files/173926/PHPJabbers-Availability-Booking-Calendar-5.0-Cross-Site-Scripting.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21819.
CVE ID: CVE-2023-21819 Date Updated: 2024-08-02T09:51:51.176Z Date Published: 2023-02-14T19:33:20.984Z Description: Windows Secure Channel Denial of Service Vulnerability No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21819 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43078.
CVE ID: CVE-2023-43078 Date Updated: 2024-08-28T22:31:00.645Z Date Published: 2024-08-28T05:33:16.899Z Description: Dell Dock Firmware and Dell Client Platform contain an Improper Link Resolution vulnerability during installation resulting in arbitrary folder deletion, which could lead to Privilege Escalation or Denial of Service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.dell.com/support/kbdoc/en-us/000217981/dsa-2023-362-security-update-for-dell-dock-firmware-and-dell-client-platform-for-an-improper-link-resolution-vulnerability No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4798.
CVE ID: CVE-2009-4798 Date Updated: 2024-08-07T07:17:25.665Z Date Published: 2010-04-22T14:00:00 Description: Multiple SQL injection vulnerabilities in Diskos CMS 6.x allow remote attackers to execute arbitrary SQL commands via the (1) kat parameter to side.asp, and the (2) brugerid and (3) password fields to the administration login feature. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.exploit-db.com/exploits/8307 - http://www.securityfocus.com/bid/34289 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49509 - https://exchange.xforce.ibmcloud.com/vulnerabilities/49510 - http://secunia.com/advisories/34540 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-41409.
CVE ID: CVE-2022-41409 Date Updated: 2024-08-03T12:42:46.199Z Date Published: 2023-07-18T00:00:00 Description: Integer overflow vulnerability in pcre2test before 10.41 allows attackers to cause a denial of service or other unspecified impacts via negative input. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/PCRE2Project/pcre2/issues/141 - https://github.com/PCRE2Project/pcre2/commit/94e1c001761373b7d9450768aa15d04c25547a35 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2690.
CVE ID: CVE-2023-2690 Date Updated: 2024-08-02T06:33:05.782Z Date Published: 2023-05-14T08:00:04.716Z Description: A vulnerability, which was classified as critical, has been found in SourceCodester Personnel Property Equipment System 1.0. This issue affects some unknown processing of the file admin/returned_reuse_form.php of the component GET Parameter Handler. The manipulation of the argument client_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-228971. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.228971 - https://vuldb.com/?ctiid.228971 - https://github.com/LeozhangCA/CVEReport/blob/main/SQL.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-15543.
CVE ID: CVE-2018-15543 Date Updated: 2024-08-05T09:54:03.612Z Date Published: 2018-10-09T15:00:00 Description: An issue was discovered in the org.telegram.messenger application 4.8.11 for Android. The FingerprintManager class for Biometric validation allows authentication bypass through the callback method from onAuthenticationFailed to onAuthenticationSucceeded with null, because the fingerprint API in conjunction with the Android keyGenerator class is not implemented. In other words, an attacker could authenticate with an arbitrary fingerprint. NOTE: the vendor indicates that this is not an attack of interest within the context of their threat model, which excludes Android devices on which rooting has occurred No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gist.github.com/tanprathan/d286c0d5b02e344606287774304a1ccd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-1205.
CVE ID: CVE-2013-1205 Date Updated: 2024-09-17T02:20:44.376Z Date Published: 2013-06-06T10:00:00Z Description: The Event Center module in Cisco WebEx Meetings Server does not perform request authentication in all intended circumstances, which allows remote attackers to discover host keys and event passwords via crafted URLs, aka Bug ID CSCue62485. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1205 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-45165.
CVE ID: CVE-2024-45165 Date Updated: 2024-08-22T13:05:04.056Z Date Published: 2024-08-22T00:00:00 Description: An issue was discovered in UCI IDOL 2 (aka uciIDOL or IDOL2) through 2.12. Data is sent between client and server with encryption. However, the key is derived from the string "(c)2007 UCI Software GmbH B.Boll" (without quotes). The key is both static and hardcoded. With access to messages, this results in message decryption and encryption by an attacker. Thus, it enables passive and active man-in-the-middle attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.syss.de/en/responsible-disclosure-policy - https://uci.de/products/index.html - https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-048.txt - https://uci.de/download/idol2-client.html - http://download.uci.de/idol2/idol2Client_2_12.exe No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3357.
CVE ID: CVE-2008-3357 Date Updated: 2024-08-07T09:37:26.579Z Date Published: 2008-08-05T19:20:00 Description: Untrusted search path vulnerability in ingvalidpw in Ingres 2.6, Ingres 2006 release 1 (aka 9.0.4), and Ingres 2006 release 2 (aka 9.1.0) on Linux and HP-UX allows local users to gain privileges via a crafted shared library, related to a "pointer overwrite vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securitytracker.com/id?1020614 - http://www.ingres.com/support/security-alert-080108.php - http://www.vupen.com/english/advisories/2008/2292 - http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=733 - http://secunia.com/advisories/31398 - http://www.vupen.com/english/advisories/2008/2313 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44181 - http://secunia.com/advisories/31357 - http://www.securityfocus.com/archive/1/495177/100/0/threaded - http://www.securityfocus.com/bid/30512 - https://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=181989 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-7318.
CVE ID: CVE-2014-7318 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0593.
CVE ID: CVE-2024-0593 Date Updated: 2024-08-01T18:11:35.677Z Date Published: 2024-02-21T06:47:56.419Z Description: The Simple Job Board plugin for WordPress is vulnerable to unauthorized access of data| due to insufficient authorization checking on the fetch_quick_job() function in all versions up to, and including, 2.10.8. This makes it possible for unauthenticated attackers to fetch arbitrary posts, which can be password protected or private and contain sensitive information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/0a28a161-3dbc-4ef0-a2ce-4c102cf3cbb0?source=cve - https://plugins.trac.wordpress.org/changeset/3038476/simple-job-board/trunk/includes/class-simple-job-board-ajax.php No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-4120.
CVE ID: CVE-2023-4120 Date Updated: 2024-08-02T07:17:12.140Z Date Published: 2023-08-03T09:00:06.902Z Description: A vulnerability was found in Byzoro Smart S85F Management Platform up to 20230722 and classified as critical. This issue affects some unknown processing of the file importhtml.php. The manipulation of the argument sql leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-235967. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.235967 - https://vuldb.com/?ctiid.235967 - https://vuldb.com/?submit.185751 - https://github.com/RCEraser/cve/blob/main/rce.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-5359.
CVE ID: CVE-2014-5359 Date Updated: 2024-08-06T11:41:48.993Z Date Published: 2014-12-16T18:00:00 Description: Directory traversal vulnerability in SafeNet Authentication Service (SAS) Outlook Web Access Agent (formerly CRYPTOCard) before 1.03.30109 allows remote attackers to read arbitrary files via a .. (dot dot) in the GetFile parameter to owa/owa. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.safenet-inc.com/technical-support/security-updates/ - http://appcheck-ng.com/safenet-sas-owa-agent-directory-traversal-vulnerability/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-28719.
CVE ID: CVE-2022-28719 Date Updated: 2024-08-03T06:03:52.606Z Date Published: 2022-04-28T08:25:12 Description: Missing authentication for critical function in AssetView prior to Ver.13.2.0 allows a remote unauthenticated attacker with some knowledge on the system configuration to upload a crafted configuration file to the managing server, which may result in the managed clients to execute arbitrary code with the administrative privilege. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.hammock.jp/assetview/info/220422.html - https://jvn.jp/en/jp/JVN54857505/index.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-19203.
CVE ID: CVE-2020-19203 Date Updated: 2024-08-04T14:08:30.664Z Date Published: 2021-07-12T15:39:07 Description: An authenticated Cross-Site Scripting (XSS) vulnerability was found in widgets/widgets/wake_on_lan_widget.php, a component of the pfSense software WebGUI, on version 2.4.4-p2 and earlier. The widget did not encode the descr (description) parameter of wake-on-LAN entries in its output, leading to a possible stored XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.pfsense.org/download/ - https://docs.netgate.com/pfsense/en/latest/releases/2-4-4-p3.html - https://gist.github.com/dharmeshbaskaran/55d546496bfb0ba28117e846d8b785db - https://www.netgate.com/assets/downloads/advisories/pfSense-SA-19_04.webgui.asc No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-25826.
CVE ID: CVE-2023-25826 Date Updated: 2024-08-02T11:32:12.704Z Date Published: 2023-05-03T18:33:59.306Z Description: Due to insufficient validation of parameters passed to the legacy HTTP query API, it is possible to inject crafted OS commands into multiple parameters and execute malicious code on the OpenTSDB host system. This exploit exists due to an incomplete fix that was made when this vulnerability was previously disclosed as CVE-2020-35476. Regex validation that was implemented to restrict allowed input to the query API does not work as intended, allowing crafted commands to bypass validation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.synopsys.com/blogs/software-security/opentsdb/ - https://github.com/OpenTSDB/opentsdb/pull/2275 - http://packetstormsecurity.com/files/174570/OpenTSDB-2.4.1-Unauthenticated-Command-Injection.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50164.
CVE ID: CVE-2023-50164 Date Updated: 2024-08-02T22:09:49.645Z Date Published: 2023-12-07T08:49:19.853Z Description: An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://lists.apache.org/thread/yh09b3fkf6vz5d6jdgrlvmg60lfwtqhj - https://www.openwall.com/lists/oss-security/2023/12/07/1 - http://packetstormsecurity.com/files/176157/Struts-S2-066-File-Upload-Remote-Code-Execution.html - https://security.netapp.com/advisory/ntap-20231214-0010/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-26843.
CVE ID: CVE-2023-26843 Date Updated: 2024-08-02T11:53:54.595Z Date Published: 2023-04-25T00:00:00 Description: A stored Cross-site scripting (XSS) vulnerability in ChurchCRM 4.5.3 allows remote attackers to inject arbitrary web script or HTML via the NoteEditor.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ChurchCRM/CRM - https://github.com/10splayaSec/CVE-Disclosures/tree/main/ChurchCRM/CVE-2023-26843 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-3429.
CVE ID: CVE-2021-3429 Date Updated: 2024-08-03T16:53:17.576Z Date Published: 2023-04-19T21:42:02.402Z Description: When instructing cloud-init to set a random password for a new user account, versions before 21.2 would write that password to the world-readable log file /var/log/cloud-init-output.log. This could allow a local user to log in as another user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/canonical/cloud-init/commit/b794d426b9ab43ea9d6371477466070d86e10668 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3124.
CVE ID: CVE-2024-3124 Date Updated: 2024-08-27T15:38:16.509Z Date Published: 2024-04-01T12:31:04.539Z Description: A vulnerability classified as problematic has been found in fridgecow smartalarm 1.8.1 on Android. This affects an unknown part of the file androidmanifest.xml of the component Backup File Handler. The manipulation leads to exposure of backup file to an unauthorized control sphere. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-258867. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.258867 - https://vuldb.com/?ctiid.258867 - https://vuldb.com/?submit.307752 - https://github.com/ctflearner/Android_Findings/blob/main/Smartalarm/Backup.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-24673.
CVE ID: CVE-2021-24673 Date Updated: 2024-08-03T19:42:16.089Z Date Published: 2021-10-04T11:20:18 Description: The Appointment Hour Booking WordPress plugin before 1.3.16 does not escape some of the Calendar Form settings, allowing high privilege users to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/75a67932-d831-4dfb-a70d-a07650eaa755 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10473.
CVE ID: CVE-2019-10473 Date Updated: 2024-08-04T22:24:18.418Z Date Published: 2019-10-23T12:45:44 Description: A missing permission check in Jenkins Libvirt Slaves Plugin in form-related methods allowed users with Overall/Read access to enumerate credentials ID of credentials stored in Jenkins. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1014%20%282%29 - http://www.openwall.com/lists/oss-security/2019/10/23/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0962.
CVE ID: CVE-2015-0962 Date Updated: 2024-08-06T04:26:11.559Z Date Published: 2015-05-25T22:00:00 Description: Barracuda Web Filter 7.x and 8.x before 8.1.0.005, when SSL Inspection is enabled, uses the same root Certification Authority certificate across different customers' installations, which makes it easier for remote attackers to conduct man-in-the-middle attacks against SSL sessions by leveraging the certificate's trust relationship. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.kb.cert.org/vuls/id/534407 - https://techlib.barracuda.com/BWF/UpdateSSLCerts - https://www.barracuda.com/support/techalerts - https://blog.barracuda.com/2015/04/28/barracuda-delivers-updated-ssl-inspection-feature/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-3670.
CVE ID: CVE-2015-3670 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-3060.
CVE ID: CVE-2010-3060 Date Updated: 2024-09-16T20:27:28.895Z Date Published: 2010-08-20T17:00:00Z Description: Unspecified vulnerability in the message-protocol implementation in the Server in IBM Tivoli Storage Manager (TSM) FastBack 5.x.x before 5.5.7, and 6.1.0.0, allows remote attackers to cause a denial of service (daemon outage) via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www-01.ibm.com/support/docview.wss?uid=swg21443820 - http://secunia.com/advisories/41044 - http://www-01.ibm.com/support/docview.wss?uid=swg1IC69883 - http://www.securityfocus.com/bid/42549 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2228.
CVE ID: CVE-2022-2228 Date Updated: 2024-08-03T00:32:09.424Z Date Published: 2022-07-01T16:08:11 Description: Information exposure in GitLab EE affecting all versions from 12.0 prior to 14.10.5, 15.0 prior to 15.0.4, and 15.1 prior to 15.1.1 allows an attacker with the appropriate access tokens to obtain CI variables in a group with using IP-based access restrictions even if the GitLab Runner is calling from outside the allowed IP range No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://gitlab.com/gitlab-org/security/gitlab/-/issues/682 - https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2228.json No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-2101.
CVE ID: CVE-2024-2101 Date Updated: 2024-08-01T19:03:38.483Z Date Published: 2024-04-17T05:00:02.552Z Description: The Salon booking system WordPress plugin before 9.6.3 does not properly sanitize and escape the 'Mobile Phone' field when booking an appointment, allowing customers to conduct Stored Cross-Site Scripting attacks. The payload gets triggered when an admin visits the 'Customers' page and the malicious script is executed in the admin context. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/b3a0bb3f-50b2-4dcb-b23c-b08480363a4a/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-2635.
CVE ID: CVE-2014-2635 Date Updated: 2024-08-06T10:21:35.701Z Date Published: 2014-10-10T01:00:00 Description: Unspecified vulnerability in HP Sprinter 12.01 allows remote attackers to execute arbitrary code via unknown vectors, aka ZDI-CAN-2343. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04454636 - https://h20564.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04454636 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-47372.
CVE ID: CVE-2021-47372 Date Updated: 2024-09-11T17:33:46.945Z Date Published: 2024-05-21T15:03:37.135Z Description: In the Linux kernel, the following vulnerability has been resolved: net: macb: fix use after free on rmmod plat_dev->dev->platform_data is released by platform_device_unregister(), use of pclk and hclk is a use-after-free. Since device unregister won't need a clk device we adjust the function call sequence to fix this issue. [ 31.261225] BUG: KASAN: use-after-free in macb_remove+0x77/0xc6 [macb_pci] [ 31.275563] Freed by task 306: [ 30.276782] platform_device_release+0x25/0x80 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/a7d521cc726f30b8e679a6f36d04b18a8ab3c536 - https://git.kernel.org/stable/c/46670fb832ee80943715df618632ca13c2e96f2b - https://git.kernel.org/stable/c/1da750d1e2140ef43d64d17f301ff6f41b45541e - https://git.kernel.org/stable/c/7721221e87d25c9840d9ca6b986dbdc410d5ce2b - https://git.kernel.org/stable/c/4ad6f2d23b0f6ac0d3e5f3102a4256d1c86c90f5 - https://git.kernel.org/stable/c/d82d5303c4c539db86588ffb5dc5b26c3f1513e8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-30463.
CVE ID: CVE-2024-30463 Date Updated: 2024-08-02T01:32:07.447Z Date Published: 2024-03-29T16:22:56.312Z Description: Missing Authorization vulnerability in realmag777 BEAR.This issue affects BEAR: from n/a through 1.1.4.3. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/woo-bulk-editor/wordpress-bear-plugin-1-1-4-3-broken-access-control-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-1418.
CVE ID: CVE-2024-1418 Date Updated: 2024-08-01T18:40:20.935Z Date Published: 2024-04-04T05:34:20.695Z Description: The CGC Maintenance Mode plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2 via the REST API. This makes it possible for unauthenticated attackers to view protected posts via REST API even when maintenance mode is enabled. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.wordfence.com/threat-intel/vulnerabilities/id/1cd5fa89-ed3b-4ac1-9200-9f5eb26cb534?source=cve - https://wordpress.org/plugins/cgc-maintenance-mode/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0609.
CVE ID: CVE-2013-0609 Date Updated: 2024-08-06T14:33:05.314Z Date Published: 2013-01-10T11:00:00 Description: Integer overflow in Adobe Reader and Acrobat 9.x before 9.5.3, 10.x before 10.1.5, and 11.x before 11.0.1 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0613. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00004.html - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00005.html - http://lists.opensuse.org/opensuse-updates/2013-01/msg00081.html - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16120 - http://lists.opensuse.org/opensuse-updates/2013-01/msg00028.html - http://www.adobe.com/support/security/bulletins/apsb13-02.html - http://rhn.redhat.com/errata/RHSA-2013-0150.html - http://security.gentoo.org/glsa/glsa-201308-03.xml No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-7474.
CVE ID: CVE-2017-7474 Date Updated: 2024-08-05T16:04:11.544Z Date Published: 2017-05-12T19:00:00 Description: It was found that the Keycloak Node.js adapter 2.5 - 3.0 did not handle invalid tokens correctly. An attacker could use this flaw to bypass authentication and gain access to restricted information, or to possibly conduct further attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://bugzilla.redhat.com/show_bug.cgi?id=1445271 - http://rhn.redhat.com/errata/RHSA-2017-1203.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-0361.
CVE ID: CVE-2013-0361 Date Updated: 2024-08-06T14:25:10.021Z Date Published: 2013-01-17T01:30:00 Description: Unspecified vulnerability in the Mobile Server component in Oracle Database Mobile/Lite Server (formerly Oracle Database Lite) 10.3.0.3 and 11.1.0.0 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-0366. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/topics/security/cpujan2013-1515902.html - http://secunia.com/advisories/57126 - http://www.mandriva.com/security/advisories?name=MDVSA-2013:150 - http://marc.info/?l=bugtraq&m=139344343412337&w=2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-28573.
CVE ID: CVE-2020-28573 Date Updated: 2024-08-04T16:40:59.551Z Date Published: 2020-12-01T18:40:37 Description: An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://success.trendmicro.com/solution/000281949 - https://success.trendmicro.com/solution/000281947 - https://www.zerodayinitiative.com/advisories/ZDI-20-1374/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-1749.
CVE ID: CVE-2008-1749 Date Updated: 2024-08-07T08:32:01.277Z Date Published: 2008-05-14T18:00:00 Description: Memory leak in Cisco Content Switching Module (CSM) 4.2(3) up to 4.2(8) and Cisco Content Switching Module with SSL (CSM-S) 2.1(2) up to 2.1(7) allows remote attackers to cause a denial of service (memory consumption) via TCP segments with an unspecified combination of TCP flags. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/29216 - http://www.securitytracker.com/id?1020021 - http://www.cisco.com/en/US/products/products_security_advisory09186a0080995684.shtml - https://exchange.xforce.ibmcloud.com/vulnerabilities/42409 - http://secunia.com/advisories/30223 - http://www.vupen.com/english/advisories/2008/1532/references No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-5934.
CVE ID: CVE-2013-5934 Date Updated: 2024-09-16T18:54:18.720Z Date Published: 2013-09-25T10:00:00Z Description: Open-Xchange AppSuite 7.0.x before 7.0.2-rev15 and 7.2.x before 7.2.2-rev16 has a hardcoded password for node join operations, which allows remote attackers to expand a cluster by finding this password in the source code and then sending the password in a Hazelcast cluster API call, a different vulnerability than CVE-2013-5200. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://archives.neohapsis.com/archives/bugtraq/2013-09/0032.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-4435.
CVE ID: CVE-2022-4435 Date Updated: 2024-08-03T01:41:44.620Z Date Published: 2023-01-05T17:33:08.775Z Description: A buffer over-read vulnerability was reported in the ThinkPadX13s BIOS LenovoRemoteConfigUpdateDxe driver that could allow a local attacker with elevated privileges to cause information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.lenovo.com/us/en/product_security/LEN-103709 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-0116.
CVE ID: CVE-2023-0116 Date Updated: 2024-08-02T05:02:43.700Z Date Published: 2023-05-26T00:00:00 Description: The reminder module lacks an authentication mechanism for broadcasts received. Successful exploitation of this vulnerability may affect availability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://consumer.huawei.com/en/support/bulletin/2023/5/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-11089.
CVE ID: CVE-2017-11089 Date Updated: 2024-09-16T21:03:37.824Z Date Published: 2017-11-16T22:00:00Z Description: In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, a buffer overread is observed in nl80211_set_station when user space application sends attribute NL80211_ATTR_LOCAL_MESH_POWER_MODE with data of size less than 4 bytes No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://usn.ubuntu.com/3620-2/ - https://source.android.com/security/bulletin/pixel/2017-11-01 - https://usn.ubuntu.com/3620-1/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-25645.
CVE ID: CVE-2022-25645 Date Updated: 2024-09-17T03:28:40.013Z Date Published: 2022-05-01T15:30:39.915755Z Description: All versions of package dset are vulnerable to Prototype Pollution via 'dset/merge' mode, as the dset function checks for prototype pollution by validating if the top-level path contains __proto__, constructor or protorype. By crafting a malicious object, it is possible to bypass this check and achieve prototype pollution. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://snyk.io/vuln/SNYK-JS-DSET-2330881 - https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-2431974 - https://github.com/lukeed/dset/blob/master/src/merge.js%23L9 - https://github.com/lukeed/dset/pull/38 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-46903.
CVE ID: CVE-2022-46903 Date Updated: 2024-08-03T14:47:27.602Z Date Published: 2022-12-12T00:00:00 Description: Insufficient processing of user input in WebSoft HCM 2021.2.3.327 allows an authenticated attacker to inject arbitrary HTML tags into the page processed by the user's browser, including scripts in the JavaScript programming language, which leads to Stored XSS. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://news.websoft.ru/_wt/wiki_base/7175851369410989446 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-25366.
CVE ID: CVE-2021-25366 Date Updated: 2024-08-03T20:03:05.615Z Date Published: 2021-03-25T16:14:25 Description: Improper access control in Samsung Internet prior to version 13.2.1.70 allows physically proximate attackers to bypass the secret mode's authentication. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/ - https://security.samsungmobile.com/serviceWeb.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-2996.
CVE ID: CVE-2022-2996 Date Updated: 2024-08-03T00:52:59.945Z Date Published: 2022-09-01T00:00:00 Description: A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c - https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-20509.
CVE ID: CVE-2023-20509 Date Updated: 2024-08-14T14:31:23.896Z Date Published: 2024-08-13T16:52:00.677Z Description: An insufficient DRAM address validation in PMFW may allow a privileged attacker to perform a DMA read from an invalid DRAM address to SRAM, potentially resulting in loss of data integrity. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6005.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1254.
CVE ID: CVE-2019-1254 Date Updated: 2024-08-04T18:13:29.582Z Date Published: 2019-09-11T21:24:59 Description: An information disclosure vulnerability exists when Windows Hyper-V writes uninitialized memory to disk, aka 'Windows Hyper-V Information Disclosure Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1254 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-30685.
CVE ID: CVE-2021-30685 Date Updated: 2024-08-03T22:40:31.893Z Date Published: 2021-09-08T14:30:23 Description: This issue was addressed with improved checks. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Security Update 2021-003 Catalina, macOS Big Sur 11.4, watchOS 7.5. Parsing a maliciously crafted audio file may lead to disclosure of user information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.apple.com/en-us/HT212528 - https://support.apple.com/en-us/HT212529 - https://support.apple.com/en-us/HT212532 - https://support.apple.com/en-us/HT212533 - https://support.apple.com/en-us/HT212530 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0064.
CVE ID: CVE-2009-0064 Date Updated: 2024-08-07T04:24:17.008Z Date Published: 2009-04-24T15:00:00 Description: Multiple unspecified vulnerabilities in the Control Center in Symantec Brightmail Gateway Appliance before 8.0.1 allow remote authenticated users to gain privileges, and possibly obtain sensitive information or hijack sessions of arbitrary users, via vectors involving (1) administrative scripts or (2) console functions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/50075 - http://securitytracker.com/id?1022117 - http://www.vupen.com/english/advisories/2009/1155 - http://osvdb.org/53945 - http://secunia.com/advisories/34885 - http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2009&suid=20090423_01 - http://www.securityfocus.com/bid/34639 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-13796.
CVE ID: CVE-2020-13796 Date Updated: 2024-08-04T12:25:16.502Z Date Published: 2020-06-03T21:49:01 Description: An issue was discovered in Navigate CMS through 2.8.7. It allows XSS because of a lack of purify calls in lib/packages/structure/structure.class.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/NavigateCMS/Navigate-CMS/commit/e690bb5d7bbe9df9052b13c403ca0ac5e58054d4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.