instruction stringlengths 49 63 ⌀ | input stringlengths 0 69 | output stringlengths 221 18.7k |
|---|---|---|
Provide detailed information about CVE-2022-43758. | CVE ID: CVE-2022-43758
Date Updated: 2024-08-03T13:40:06.453Z
Date Published: 2023-02-07T00:00:00
Description:
A Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in SUSE Rancher allows code execution for user with the ability to add an untrusted Helm catalog or modifying the URL configuration used to download KDM (only admin users by default) This issue affects: SUSE Rancher Rancher versions prior to 2.5.17; Rancher versions prior to 2.6.10; Rancher versions prior to 2.7.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.suse.com/show_bug.cgi?id=1205294
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-40772. | CVE ID: CVE-2021-40772
Date Updated: 2024-09-16T16:43:53.465Z
Date Published: 2021-11-22T15:19:19.101337Z
Description:
Adobe Prelude version 10.1 (and earlier) is affected by a memory corruption vulnerability due to insecure handling of a malicious M4A file, potentially resulting in arbitrary code execution in the context of the current user. User interaction is required in that the victim must open a specially crafted file to exploit this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/prelude/apsb21-96.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-46140. | CVE ID: CVE-2022-46140
Date Updated: 2024-08-03T14:24:03.297Z
Date Published: 2022-12-13T00:00:00
Description:
Affected devices use a weak encryption scheme to encrypt the debug zip file. This could allow an authenticated attacker to decrypt the contents of the file and retrieve debug information about the system.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-413565.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-37572. | CVE ID: CVE-2021-37572
Date Updated: 2024-08-04T01:23:01.328Z
Date Published: 2021-12-25T23:23:02
Description:
MediaTek microchips, as used in NETGEAR devices through 2021-11-11 and other devices, mishandle IEEE 1905 protocols. (Affected Chipsets MT7603E, MT7613, MT7615, MT7622, MT7628, MT7629, MT7915; Affected Software Versions 2.0.2; Missing authorization).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://kb.netgear.com/000064368/Security-Advisory-for-WiFi-WPS-and-IEEE-1905-Vulnerabilities-on-Multiple-Products-PSV-2021-0298-PSV-2021-0300
- https://corp.mediatek.com/product-security-bulletin/January-2022
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-46204. | CVE ID: CVE-2021-46204
Date Updated: 2024-08-04T05:02:11.068Z
Date Published: 2022-01-19T17:44:31
Description:
Taocms v3.0.2 was discovered to contain an arbitrary file read vulnerability via the path parameter. SQL injection vulnerability via taocms\include\Model\Article.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/taogogo/taocms/issues/14
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-40904. | CVE ID: CVE-2021-40904
Date Updated: 2024-08-04T02:51:07.776Z
Date Published: 2022-03-25T22:19:59
Description:
The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allows a misconfiguration of the web-app Dokuwiki (installed by default), which allows embedded php code. As a result, remote code execution is achieved. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session by a user with the role of administrator.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://checkmk.com
- https://github.com/Edgarloyola/CVE-2021-40904
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-9394. | CVE ID: CVE-2016-9394
Date Updated: 2024-08-06T02:50:37.438Z
Date Published: 2017-03-23T18:00:00
Description:
The jas_seq2d_create function in jas_seq.c in JasPer before 1.900.17 allows remote attackers to cause a denial of service (assertion failure) via a crafted file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/94372
- https://blogs.gentoo.org/ago/2016/11/16/jasper-multiple-assertion-failure
- https://github.com/mdadams/jasper/commit/f7038068550fba0e41e1d0c355787f1dcd5bf330
- https://access.redhat.com/errata/RHSA-2017:1208
- http://www.openwall.com/lists/oss-security/2016/11/17/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1396975
- https://usn.ubuntu.com/3693-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-1154. | CVE ID: CVE-2017-1154
Date Updated: 2024-08-05T13:25:17.299Z
Date Published: 2017-03-31T18:00:00
Description:
IBM Algorithmics One-Algo Risk Application 4.9.1, 5.0, and 5.1.0 could allow a user to gain access to files in the local environment which should not be viewed by application users. IBM Reference #: 1999892.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.ibm.com/support/docview.wss?uid=swg21999892
- http://www.securityfocus.com/bid/97248
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-33941. | CVE ID: CVE-2024-33941
Date Updated: 2024-08-02T02:42:59.662Z
Date Published: 2024-05-03T07:26:32.006Z
Description:
Missing Authorization vulnerability in Avirtum iPanorama 360 WordPress Virtual Tour Builder.This issue affects iPanorama 360 WordPress Virtual Tour Builder: from n/a through 1.8.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/ipanorama-360-virtual-tour-builder-lite/wordpress-ipanorama-360-plugin-1-8-1-broken-access-control-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-47688. | CVE ID: CVE-2023-47688
Date Updated: 2024-08-28T15:15:07.179Z
Date Published: 2023-11-16T22:06:00.967Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in Alexufo Youtube SpeedLoad plugin <= 0.6.3 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/youtube-speedload/wordpress-youtube-speedload-plugin-0-6-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-1637. | CVE ID: CVE-2021-1637
Date Updated: 2024-08-03T16:18:10.972Z
Date Published: 2021-01-12T19:41:55
Description:
Windows DNS Query Information Disclosure Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1637
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-8844. | CVE ID: CVE-2016-8844
Date Updated: 2017-01-03T19:57:01
Date Published: 2017-01-03T20:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4900. | CVE ID: CVE-2010-4900
Date Updated: 2024-08-07T04:02:30.449Z
Date Published: 2011-10-08T10:00:00
Description:
Open redirect vulnerability in c.php in CMS WebManager-Pro 8.1 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://securityreason.com/securityalert/8438
- http://www.securityfocus.com/archive/1/513485/100/0/threaded
- http://packetstormsecurity.org/1009-exploits/webmanagerpro-sql.txt
- http://websecurity.com.ua/4146/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-18581. | CVE ID: CVE-2017-18581
Date Updated: 2024-08-05T21:28:55.784Z
Date Published: 2019-08-22T13:35:13
Description:
The time-sheets plugin before 1.5.0 for WordPress has XSS via the old timesheet list.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/time-sheets/#developers
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2014-0266 | CVE-CVE-2014-0266 is a vulnerability in n/a. It is related to the MITRE ATT&CK technique T1204.002: Malicious File. The vulnerability is classified as a uncategorized type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2014 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2016-10091. | CVE ID: CVE-2016-10091
Date Updated: 2024-08-06T03:07:32.082Z
Date Published: 2017-04-21T15:00:00
Description:
Multiple stack-based buffer overflows in unrtf 0.21.9 allow remote attackers to cause a denial-of-service by writing a negative integer to the (1) cmd_expand function, (2) cmd_emboss function, or (3) cmd_engrave function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://hg.savannah.gnu.org/hgweb/unrtf/rev/3b16893a6406
- http://www.securityfocus.com/bid/95173
- http://www.openwall.com/lists/oss-security/2016/12/31/3
- http://www.openwall.com/lists/oss-security/2017/01/01/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1409546
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-13646. | CVE ID: CVE-2020-13646
Date Updated: 2024-08-04T12:25:16.404Z
Date Published: 2020-06-05T20:46:04
Description:
In Cheetah free WiFi 5.1, the driver file (liebaonat.sys) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCtl 0x830020f8, 0x830020E0, 0x830020E4, or 0x8300210c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/y5s5k5/CVE-2020-13646
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-4695. | CVE ID: CVE-2010-4695
Date Updated: 2024-08-07T03:55:34.357Z
Date Published: 2011-01-14T17:00:00
Description:
A certain Fedora patch for gif2png.c in gif2png 2.5.1 and 2.5.2, as distributed in gif2png-2.5.1-1200.fc12 on Fedora 12 and gif2png_2.5.2-1 on Debian GNU/Linux, truncates a GIF pathname specified on the command line, which might allow remote attackers to create PNG files in unintended directories via a crafted command-line argument, as demonstrated by a CGI program that launches gif2png, a different vulnerability than CVE-2009-5018.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://security.gentoo.org/glsa/glsa-201203-15.xml
- http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?root=extras&r1=1.1&r2=1.2
- https://bugzilla.redhat.com/show_bug.cgi?id=547515
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64819
- http://cvs.fedoraproject.org/viewvc/rpms/gif2png/devel/gif2png-overflow.patch?root=extras&view=log
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=550978
- http://www.securityfocus.com/bid/45920
- http://lists.fedoraproject.org/pipermail/package-announce/2010-November/051229.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25658. | CVE ID: CVE-2023-25658
Date Updated: 2024-08-02T11:25:19.407Z
Date Published: 2023-03-24T23:42:46.482Z
Description:
TensorFlow is an open source platform for machine learning. Prior to versions 2.12.0 and 2.11.1, an out of bounds read is in GRUBlockCellGrad. A fix is included in TensorFlow 2.12.0 and 2.11.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/tensorflow/tensorflow/security/advisories/GHSA-68v3-g9cm-rmm6
- https://github.com/tensorflow/tensorflow/commit/ff459137c2716a2a60f7d441b855fcb466d778cb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-5573. | CVE ID: CVE-2013-5573
Date Updated: 2024-08-06T17:15:21.406Z
Date Published: 2013-12-31T15:00:00
Description:
Cross-site scripting (XSS) vulnerability in the default markup formatter in Jenkins 1.523 allows remote attackers to inject arbitrary web script or HTML via the Description field in the user configuration.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/64414
- http://www.osvdb.org/101187
- http://seclists.org/bugtraq/2013/Dec/104
- http://seclists.org/fulldisclosure/2013/Dec/159
- http://www.exploit-db.com/exploits/30408
- http://packetstormsecurity.com/files/124513
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89872
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-6649. | CVE ID: CVE-2013-6649
Date Updated: 2024-08-06T17:46:22.256Z
Date Published: 2014-01-28T11:00:00
Description:
Use-after-free vulnerability in the RenderSVGImage::paint function in core/rendering/svg/RenderSVGImage.cpp in Blink, as used in Google Chrome before 32.0.1700.102, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors involving a zero-size SVG image.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://src.chromium.org/viewvc/blink?revision=164536&view=revision
- http://googlechromereleases.blogspot.com/2014/01/stable-channel-update_27.html
- http://lists.opensuse.org/opensuse-security-announce/2014-02/msg00008.html
- http://crbug.com/330420
- http://www.debian.org/security/2014/dsa-2862
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25971. | CVE ID: CVE-2023-25971
Date Updated: 2024-08-02T11:39:06.200Z
Date Published: 2023-05-26T11:06:05.388Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in FixBD Educare plugin <= 1.4.1 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/educare/wordpress-educare-students-result-management-system-plugin-1-4-1-cross-site-request-forgery-csrf?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-5295. | CVE ID: CVE-2008-5295
Date Updated: 2024-08-07T10:49:12.368Z
Date Published: 2008-12-01T15:00:00
Description:
SQL injection vulnerability in index.php in Jamit Job Board 3.4.10 allows remote attackers to execute arbitrary SQL commands via the show_emp parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/7235
- http://www.securityfocus.com/bid/32478
- http://secunia.com/advisories/32797
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46873
- http://securityreason.com/securityalert/4671
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-3812. | CVE ID: CVE-2020-3812
Date Updated: 2024-09-16T16:39:08.837Z
Date Published: 2020-05-26T13:04:14.769312Z
Description:
qmail-verify as used in netqmail 1.06 is prone to an information disclosure vulnerability. A local attacker can test for the existence of files and directories anywhere in the filesystem because qmail-verify runs as root and tests for the existence of files in the attacker's home directory, without dropping its privileges first.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.openwall.com/lists/oss-security/2020/05/19/8
- https://bugs.debian.org/961060
- https://www.debian.org/security/2020/dsa-4692
- https://lists.debian.org/debian-lts-announce/2020/06/msg00002.html
- https://usn.ubuntu.com/4556-1/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-15497. | CVE ID: CVE-2017-15497
Date Updated: 2018-01-23T16:57:02
Date Published: 2018-01-23T17:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-6132. | CVE ID: CVE-2023-6132
Date Updated: 2024-08-22T18:02:51.796Z
Date Published: 2024-02-29T17:40:05.162Z
Description:
The vulnerability, if exploited, could allow a malicious entity with access to the file system to achieve arbitrary code execution and privilege escalation by tricking AVEVA Edge to load an unsafe DLL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-03
- https://www.aveva.com/en/support-and-success/cyber-security-updates/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-30787. | CVE ID: CVE-2021-30787
Date Updated: 2024-08-03T22:40:32.176Z
Date Published: 2021-09-08T13:48:51
Description:
This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. An application may be able to cause unexpected system termination or write kernel memory.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT212602
- https://support.apple.com/en-us/HT212600
- https://support.apple.com/en-us/HT212603
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-10076. | CVE ID: CVE-2019-10076
Date Updated: 2024-08-04T22:10:09.207Z
Date Published: 2019-05-20T20:31:41
Description:
A carefully crafted malicious attachment could trigger an XSS vulnerability on Apache JSPWiki 2.9.0 to 2.11.0.M3, which could lead to session hijacking.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.apache.org/thread.html/aac253cfc33c0429b528e2fcbe82d3a42d742083c528f58d192dfd16%40%3Ccommits.jspwiki.apache.org%3E
- http://www.openwall.com/lists/oss-security/2019/05/19/4
- https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2019-10076
- http://www.securityfocus.com/bid/108437
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-3028. | CVE ID: CVE-2021-3028
Date Updated: 2024-08-03T16:45:50.632Z
Date Published: 2021-01-13T16:14:20
Description:
git-big-picture before 1.0.0 mishandles ' characters in a branch name, leading to code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/git-big-picture/git-big-picture/pull/62
- https://github.com/git-big-picture/git-big-picture/pull/27
- https://github.com/git-big-picture/git-big-picture/releases/tag/v1.0.0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-1695. | CVE ID: CVE-2022-1695
Date Updated: 2024-08-03T00:10:03.866Z
Date Published: 2022-06-06T08:51:30
Description:
The WP Simple Adsense Insertion WordPress plugin before 2.1 does not perform CSRF checks on updates to its admin page, allowing an attacker to trick a logged in user to manipulate ads and inject arbitrary javascript via submitting a form.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/2ac5b87b-1390-41ce-af6e-c50e5709baaa
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-52812. | CVE ID: CVE-2023-52812
Date Updated: 2024-08-02T23:11:36.059Z
Date Published: 2024-05-21T15:31:20.940Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
drm/amd: check num of link levels when update pcie param
In SR-IOV environment, the value of pcie_table->num_of_link_levels will
be 0, and num_of_levels - 1 will cause array index out of bounds
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/5b4574b663d0a1a0a62d5232429b7db9ae6d0670
- https://git.kernel.org/stable/c/09f617219fe9ccd8d7b65dc3e879b5889f663b5a
- https://git.kernel.org/stable/c/406e8845356d18bdf3d3a23b347faf67706472ec
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-6101. | CVE ID: CVE-2013-6101
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-11101. | CVE ID: CVE-2017-11101
Date Updated: 2024-09-16T18:09:08.729Z
Date Published: 2017-07-07T18:00:00Z
Description:
When SWFTools 0.9.2 processes a crafted file in swfcombine, it can lead to a NULL Pointer Dereference in the swf_Relocate() function in lib/modules/swftools.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/matthiaskramm/swftools/issues/26
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-2729. | CVE ID: CVE-2016-2729
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-12211. | CVE ID: CVE-2019-12211
Date Updated: 2024-08-04T23:17:38.126Z
Date Published: 2019-05-20T15:05:02
Description:
When FreeImage 3.18.0 reads a tiff file, it will be handed to the Load function of the PluginTIFF.cpp file, but a memcpy occurs in which the destination address and the size of the copied data are not considered, resulting in a heap overflow.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://sourceforge.net/p/freeimage/discussion/36111/thread/e06734bed5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PUWVVP67FYM4GMWD7TPQ7C7JPPRUZHYE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VZ7KBYPPNRMX7RRWVJSX4T63E3TFB6TG/
- https://lists.debian.org/debian-lts-announce/2019/12/msg00012.html
- https://www.debian.org/security/2019/dsa-4593
- https://seclists.org/bugtraq/2019/Dec/45
- https://usn.ubuntu.com/4529-1/
- https://security.gentoo.org/glsa/202107-02
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-41566. | CVE ID: CVE-2022-41566
Date Updated: 2024-08-03T12:49:41.888Z
Date Published: 2023-02-22T00:00:00
Description:
The server component of TIBCO Software Inc.'s TIBCO EBX Add-ons contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute stored XSS on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO EBX Add-ons: versions 5.6.0 and below.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.tibco.com/services/support/advisories
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-14924. | CVE ID: CVE-2019-14924
Date Updated: 2024-08-05T00:34:51.695Z
Date Published: 2019-08-10T18:34:17
Description:
An issue was discovered in GCDWebServer before 3.5.3. The method moveItem in the GCDWebUploader class checks the FileExtension of newAbsolutePath but not oldAbsolutePath. By leveraging this vulnerability, an adversary can make an inaccessible file be available (the credential of the app, for instance).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/swisspol/GCDWebServer/issues/433
- https://github.com/swisspol/GCDWebServer/commit/02738433bf2e1b820ef48f04edd15df304081802
- https://github.com/swisspol/GCDWebServer/compare/3.5.2...3.5.3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-20052. | CVE ID: CVE-2017-20052
Date Updated: 2024-08-05T21:45:25.243Z
Date Published: 2022-06-16T06:15:20
Description:
A vulnerability classified as problematic was found in Python 2.7.13. This vulnerability affects unknown code of the component pgAdmin4. The manipulation leads to uncontrolled search path. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://seclists.org/fulldisclosure/2017/Feb/92
- https://vuldb.com/?id.97822
- https://security.netapp.com/advisory/ntap-20220804-0005/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-7374. | CVE ID: CVE-2015-7374
Date Updated: 2024-08-06T07:51:27.163Z
Date Published: 2015-09-25T14:00:00
Description:
The Remote Agent component in Schneider Electric InduSoft Web Studio before 8.0 allows remote attackers to execute arbitrary code via unspecified vectors, aka ZDI-CAN-2649.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.zerodayinitiative.com/advisories/ZDI-15-451
- http://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2015-251-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-0822. | CVE ID: CVE-2008-0822
Date Updated: 2024-08-07T08:01:39.183Z
Date Published: 2008-02-19T20:00:00
Description:
Directory traversal vulnerability in index.php in Scribe 0.2 allows remote attackers to read arbitrary local files via a .. (dot dot) in the page parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/488140/100/0/threaded
- http://securityreason.com/securityalert/3668
- http://www.securityfocus.com/bid/27803
- https://www.exploit-db.com/exploits/5123
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-4107. | CVE ID: CVE-2020-4107
Date Updated: 2024-09-16T21:03:04.792Z
Date Published: 2022-05-19T21:25:10.514010Z
Description:
HCL Domino is affected by an Insufficient Access Control vulnerability. An authenticated attacker with local access to the system could exploit this vulnerability to attain escalation of privileges, denial of service, or information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0090221
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-0022. | CVE ID: CVE-2023-0022
Date Updated: 2024-08-02T04:54:32.575Z
Date Published: 2023-01-10T03:25:36.853Z
Description:
SAP BusinessObjects Business Intelligence Analysis edition for OLAP allows an authenticated attacker to inject malicious code that can be executed by the application over the network. On successful exploitation, an attacker can perform operations that may completely compromise the application causing a high impact on the confidentiality, integrity, and availability of the application.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://launchpad.support.sap.com/#/notes/3262810
- https://www.sap.com/documents/2022/02/fa865ea4-167e-0010-bca6-c68f7e60039b.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-13506. | CVE ID: CVE-2019-13506
Date Updated: 2024-08-04T23:57:38.722Z
Date Published: 2019-07-11T13:07:05
Description:
@nuxt/devalue before 1.2.3, as used in Nuxt.js before 2.6.2, mishandles object keys, leading to XSS.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/nuxt/nuxt.js/releases/tag/v2.6.2
- https://github.com/nuxt/devalue/pull/8
- https://github.com/nuxt/nuxt.js/commit/0d5dfe71917191c5b07f373896311f2d8f6b75be
- https://github.com/nuxt/devalue/releases/tag/v1.2.3
- https://github.com/nuxt/nuxt.js/compare/c0776eb...8d14cd4
- https://www.npmjs.com/advisories/814
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28645. | CVE ID: CVE-2023-28645
Date Updated: 2024-08-02T13:43:23.193Z
Date Published: 2023-03-31T22:08:14.938Z
Description:
Nextcloud richdocuments is a Nextcloud app integrating the office suit Collabora Online. In affected versions the secure view feature of the rich documents app can be bypassed by using unprotected internal API endpoint of the rich documents app. It is recommended that the Nextcloud Office app (richdocuments) is upgraded to 8.0.0-beta.1, 7.0.2 or 6.3.2. Users unable to upgrade may mitigate the issue by taking steps to restrict the ability to download documents. This includes ensuring that the `WOPI configuration` is configured to only serve documents between Nextcloud and Collabora. It is highly recommended to define the list of Collabora server IPs as the allow list within the Office admin settings of Nextcloud.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-95j6-p5cj-5hh5
- https://github.com/nextcloud/richdocuments/pull/2604
- https://docs.nextcloud.com/server/latest/admin_manual/office/configuration.html#wopi-settings
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-35854. | CVE ID: CVE-2020-35854
Date Updated: 2024-08-04T17:16:12.496Z
Date Published: 2021-01-25T14:41:16
Description:
Textpattern 4.8.4 is affected by cross-site scripting (XSS) in the Body parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://textpattern.com
- https://www.textpattern.co/demo
- https://riteshgohil-25.medium.com/textpattern-4-8-4-is-affected-by-cross-site-scripting-xss-in-the-body-parameter-b9a3d7da2a88
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-25566. | CVE ID: CVE-2023-25566
Date Updated: 2024-08-02T11:25:19.220Z
Date Published: 2023-02-14T17:35:48.482Z
Description:
GSS-NTLMSSP is a mechglue plugin for the GSSAPI library that implements NTLM authentication. Prior to version 1.2.0, a memory leak can be triggered when parsing usernames which can trigger a denial-of-service. The domain portion of a username may be overridden causing an allocated memory area the size of the domain name to be leaked. An attacker can leak memory via the main `gss_accept_sec_context` entry point, potentially causing a denial-of-service. This issue is fixed in version 1.2.0.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/gssapi/gss-ntlmssp/security/advisories/GHSA-mfm4-6g58-jw74
- https://github.com/gssapi/gss-ntlmssp/commit/8660fb16474054e692a596e9c79670cd4d3954f4
- https://github.com/gssapi/gss-ntlmssp/releases/tag/v1.2.0
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-3697. | CVE ID: CVE-2015-3697
Date Updated: 2024-08-06T05:56:15.474Z
Date Published: 2015-07-03T01:00:00
Description:
Buffer overflow in the Intel Graphics Driver in Apple OS X before 10.10.4 allows local users to gain privileges via unspecified vectors, a different vulnerability than CVE-2015-3695, CVE-2015-3696, CVE-2015-3698, CVE-2015-3699, CVE-2015-3700, CVE-2015-3701, and CVE-2015-3702.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://www.securityfocus.com/bid/75493
- http://www.securitytracker.com/id/1032760
- http://support.apple.com/kb/HT204942
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-7914. | CVE ID: CVE-2014-7914
Date Updated: 2024-08-06T13:03:27.533Z
Date Published: 2020-02-21T01:38:36
Description:
btif/src/btif_dm.c in Android before 5.1 does not properly enforce the temporary nature of a Bluetooth pairing, which allows user-assisted remote attackers to bypass intended access restrictions via crafted Bluetooth packets after the tapping of a crafted NFC tag.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://android.googlesource.com/platform/external/bluetooth/bluedroid/+/0360aa7c418152a3e5e335a065ac3629cbb09559
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-46482. | CVE ID: CVE-2023-46482
Date Updated: 2024-09-12T19:50:35.788Z
Date Published: 2023-11-01T00:00:00
Description:
SQL injection vulnerability in wuzhicms v.4.1.0 allows a remote attacker to execute arbitrary code via the Database Backup Functionality in the coreframe/app/database/admin/index.php component.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/XTo-o1/PHP/blob/main/wuzhicms/WUZHI%20CMS%20v4.1.0%20SQL%20Injection%20Vulnerability%20in%20Database%20Backup%20Functionality.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-6335. | CVE ID: CVE-2013-6335
Date Updated: 2024-08-06T17:39:00.637Z
Date Published: 2014-08-26T10:00:00
Description:
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and restore operations, which allows local users to bypass intended access restrictions via standard filesystem operations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21680453
- http://www-01.ibm.com/support/docview.wss?uid=swg1IC96095
- http://secunia.com/advisories/60482
- https://exchange.xforce.ibmcloud.com/vulnerabilities/89054
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-4256. | CVE ID: CVE-2019-4256
Date Updated: 2024-09-17T03:22:51.438Z
Date Published: 2019-05-29T15:10:24.357586Z
Description:
IBM API Connect 5.0.0.0 through 5.0.8.6 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 159944.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.ibm.com/support/docview.wss?uid=ibm10882968
- https://exchange.xforce.ibmcloud.com/vulnerabilities/159944
- http://www.securityfocus.com/bid/108530
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-5829. | CVE ID: CVE-2020-5829
Date Updated: 2024-08-04T08:39:25.936Z
Date Published: 2020-02-11T17:11:31
Description:
Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.symantec.com/us/en/article.SYMSA1505.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-6250. | CVE ID: CVE-2020-6250
Date Updated: 2024-08-04T08:55:22.282Z
Date Published: 2020-05-12T17:52:19
Description:
SAP Adaptive Server Enterprise, version 16.0, allows an authenticated attacker to exploit certain misconfigured endpoints exposed over the adjacent network, to read system administrator password leading to Information Disclosure. This could help the attacker to read/write any data and even stop the server like an administrator.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222
- https://launchpad.support.sap.com/#/notes/2917022
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-7960. | CVE ID: CVE-2024-7960
Date Updated: 2024-09-12T20:49:51.544Z
Date Published: 2024-09-12T20:15:09.946Z
Description:
The Rockwell Automation affected product contains a vulnerability that allows a threat actor to view sensitive information and change settings. The vulnerability exists due to having an incorrect privilege matrix that allows users to have access to functions they should not.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1695.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-24385. | CVE ID: CVE-2023-24385
Date Updated: 2024-09-13T15:55:11.492Z
Date Published: 2023-10-17T08:58:24.999Z
Description:
Auth. (author+) Stored Cross-Site Scripting (XSS) vulnerability in David Lingren Media Library Assistant plugin <= 3.11 versions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/media-library-assistant/wordpress-media-library-assistant-plugin-3-11-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-6173. | CVE ID: CVE-2014-6173
Date Updated: 2024-08-06T12:10:12.604Z
Date Published: 2014-12-19T02:00:00
Description:
Cross-site scripting (XSS) vulnerability in the Process Inspector in IBM Business Process Manager (BPM) 8.0.x through 8.0.1.3 and 8.5.x through 8.5.5 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www-01.ibm.com/support/docview.wss?uid=swg21690553
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98418
- http://www-01.ibm.com/support/docview.wss?uid=swg1JR50241
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-6635. | CVE ID: CVE-2024-6635
Date Updated: 2024-08-01T21:41:04.272Z
Date Published: 2024-07-20T07:38:03.542Z
Description:
The WooCommerce - Social Login plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.3. This is due to insufficient controls in the 'woo_slg_login_email' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, excluding an administrator, if they know the email of user.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/37836722-eb25-4393-8cdf-91057642ba3f?source=cve
- https://codecanyon.net/item/social-login-wordpress-woocommerce-plugin/8495883
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-10937. | CVE ID: CVE-2017-10937
Date Updated: 2024-09-17T00:55:35.698Z
Date Published: 2018-07-25T15:00:00Z
Description:
SQL injection vulnerability in all versions prior to V2.01.05.09 of the ZTE ZXIPTV-UCM product allows remote attackers to execute arbitrary SQL commands via the opertype parameter, resulting in the disclosure of database information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1008782
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-5973. | CVE ID: CVE-2008-5973
Date Updated: 2024-08-07T11:13:13.699Z
Date Published: 2009-01-27T01:00:00
Description:
SQL injection vulnerability in login.aspx in Active Web Mail 4.0 allows remote attackers to execute arbitrary SQL commands via the password parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/7281
- https://exchange.xforce.ibmcloud.com/vulnerabilities/46915
- http://secunia.com/advisories/32921
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-0459. | CVE ID: CVE-2008-0459
Date Updated: 2024-08-07T07:46:54.566Z
Date Published: 2008-01-25T15:00:00
Description:
Directory traversal vulnerability in update/index.php in Liquid-Silver CMS 0.35, when magic_quotes_gpc is disabled, allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the update parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.exploit-db.com/exploits/4976
- http://www.securityfocus.com/bid/27425
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39895
- http://secunia.com/advisories/28619
- http://www.vupen.com/english/advisories/2008/0309
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-4687. | CVE ID: CVE-2016-4687
Date Updated: 2017-05-11T13:57:01
Date Published: 2017-05-11T14:01:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30325. | CVE ID: CVE-2024-30325
Date Updated: 2024-08-08T21:07:07.508Z
Date Published: 2024-04-03T16:21:32.080Z
Description:
Foxit PDF Reader AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PDF Reader. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the handling of Doc objects in AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22592.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.zerodayinitiative.com/advisories/ZDI-24-314/
- https://www.foxit.com/support/security-bulletins.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-0222. | CVE ID: CVE-2015-0222
Date Updated: 2024-08-06T04:03:10.434Z
Date Published: 2015-01-16T16:00:00
Description:
ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148608.html
- http://ubuntu.com/usn/usn-2469-1
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148696.html
- http://secunia.com/advisories/62285
- http://lists.opensuse.org/opensuse-updates/2015-09/msg00035.html
- https://www.djangoproject.com/weblog/2015/jan/13/security/
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00001.html
- http://secunia.com/advisories/62309
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:109
- http://advisories.mageia.org/MGASA-2015-0026.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/148485.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-7857. | CVE ID: CVE-2019-7857
Date Updated: 2024-08-04T21:02:18.975Z
Date Published: 2019-08-02T21:12:21
Description:
A cross-site request forgery vulnerability in Magento 2.1 prior to 2.1.18, Magento 2.2 prior to 2.2.9, Magento 2.3 prior to 2.3.2 can cause unwanted items to be added to a shopper's cart due to an insufficiently robust anti-CSRF token implementation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://magento.com/security/patches/magento-2.3.2-2.2.9-and-2.1.18-security-update-33
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-2013. | CVE ID: CVE-2022-2013
Date Updated: 2024-08-03T00:24:43.695Z
Date Published: 2022-06-12T23:50:09
Description:
In Octopus Server after version 2022.1.1495 and before 2022.1.2647 if private spaces were enabled via the experimental feature flag all new users would have access to the Script Console within their private space.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://advisories.octopus.com/post/2022/sa2022-05/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-42837. | CVE ID: CVE-2022-42837
Date Updated: 2024-08-03T13:19:04.843Z
Date Published: 2022-12-15T00:00:00
Description:
An issue existed in the parsing of URLs. This issue was addressed with improved input validation. This issue is fixed in iOS 16.2 and iPadOS 16.2, macOS Ventura 13.1, iOS 15.7.2 and iPadOS 15.7.2, watchOS 9.2. A remote user may be able to cause unexpected app termination or arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT213535
- https://support.apple.com/en-us/HT213532
- https://support.apple.com/en-us/HT213530
- https://support.apple.com/en-us/HT213531
- https://support.apple.com/en-us/HT213536
- http://seclists.org/fulldisclosure/2022/Dec/20
- http://seclists.org/fulldisclosure/2022/Dec/21
- http://seclists.org/fulldisclosure/2022/Dec/23
- http://seclists.org/fulldisclosure/2022/Dec/27
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2014-7310. | CVE ID: CVE-2014-7310
Date Updated: 2024-08-06T12:47:32.291Z
Date Published: 2014-10-19T10:00:00
Description:
The Ali Visual (aka com.ali.visual) application 1.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/976033
- http://www.kb.cert.org/vuls/id/582497
- https://docs.google.com/spreadsheets/d/1t5GXwjw82SyunALVJb2w0zi3FoLRIkfGPc7AMjRF0r4/edit?usp=sharing
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-8831. | CVE ID: CVE-2015-8831
Date Updated: 2024-08-06T08:29:22.031Z
Date Published: 2017-02-09T15:00:00
Description:
Cross-site scripting (XSS) vulnerability in admin/comments.php in Dotclear before 2.8.2 allows remote attackers to inject arbitrary web script or HTML via the author name in a comment.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://packetstormsecurity.com/files/134353/dotclear-2.8.1-Cross-Site-Scripting.html
- http://www.openwall.com/lists/oss-security/2016/03/07/5
- https://blog.curesec.com/article/blog/dotclear-281-XSS-94.html
- http://www.openwall.com/lists/oss-security/2016/03/05/4
- http://dotclear.org/blog/post/2015/10/25/Dotclear-2.8.2
- http://www.securityfocus.com/bid/96377
- https://hg.dotclear.org/dotclear/rev/65e65154dadf
- http://seclists.org/fulldisclosure/2015/Nov/59
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-6396. | CVE ID: CVE-2008-6396
Date Updated: 2024-08-07T11:27:35.950Z
Date Published: 2009-03-04T17:00:00
Description:
Cross-site scripting (XSS) vulnerability in account.php in Celerondude Uploader 6.1 allows remote attackers to inject arbitrary web script or HTML via the username parameter. NOTE: some of these details are obtained from third party information.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/31010
- http://packetstormsecurity.org/0809-exploits/uploader6-xss.txt
- https://exchange.xforce.ibmcloud.com/vulnerabilities/44897
- http://secunia.com/advisories/31735
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2015-8726. | CVE ID: CVE-2015-8726
Date Updated: 2024-08-06T08:29:21.728Z
Date Published: 2016-01-04T02:00:00
Description:
wiretap/vwr.c in the VeriWave file parser in Wireshark 1.12.x before 1.12.9 and 2.0.x before 2.0.1 does not validate certain signature and Modulation and Coding Scheme (MCS) data, which allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b8fa3d463c1bdd9b84c897441e7a5c8ad1f0f292
- http://www.securityfocus.com/bid/79382
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11789
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=185911de7d337246044c8e99da2f5b4bac74c0d5
- http://www.debian.org/security/2016/dsa-3505
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=11791
- https://security.gentoo.org/glsa/201604-05
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.wireshark.org/security/wnpa-sec-2015-44.html
- http://www.securitytracker.com/id/1034551
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-46355. | CVE ID: CVE-2022-46355
Date Updated: 2024-08-03T14:31:46.361Z
Date Published: 2022-12-13T00:00:00
Description:
A vulnerability has been identified in SCALANCE X204RNA (HSR) (All versions < V3.2.7), SCALANCE X204RNA (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (HSR) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP) (All versions < V3.2.7), SCALANCE X204RNA EEC (PRP/HSR) (All versions < V3.2.7). The affected products are vulnerable to an "Exposure of Sensitive Information to an Unauthorized Actor" vulnerability by leaking sensitive data in the HTTP Referer.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-363821.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-12562. | CVE ID: CVE-2020-12562
Date Updated: 2022-12-30T00:00:00
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-3091. | CVE ID: CVE-2018-3091
Date Updated: 2024-10-02T19:50:08.565Z
Date Published: 2018-07-18T13:00:00
Description:
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). The supported version that is affected is Prior to 5.2.16. Easily exploitable vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.0 Base Score 6.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.securityfocus.com/bid/104764
- http://www.securitytracker.com/id/1041296
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2020-5071. | CVE ID: CVE-2020-5071
Date Updated: 2021-01-05T18:54:07
Date Published: 2021-01-05T18:54:07
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-0182. | CVE ID: CVE-2008-0182
Date Updated: 2024-09-17T02:27:19.192Z
Date Published: 2008-02-04T23:00:00Z
Description:
Cross-site request forgery (CSRF) vulnerability in the Admin portlet in Liferay Portal before 4.4.0 allows remote authenticated users to perform unspecified actions as unspecified other authenticated users via the Shutdown message.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.kb.cert.org/vuls/id/767825
- http://secunia.com/advisories/28742
- http://support.liferay.com/browse/LEP-4739
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-32543. | CVE ID: CVE-2021-32543
Date Updated: 2024-09-16T22:24:59.184Z
Date Published: 2021-05-28T08:10:28.395920Z
Description:
The CTS Web transaction system related to authentication management is implemented incorrectly. After login, remote attackers can manipulate cookies to access other accounts and trade in the stock market with spoofed identity.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.twcert.org.tw/tw/cp-132-4759-92eab-1.html
- https://www.chtsecurity.com/news/40e165e2-e539-49bc-bcf1-e3b27c29e344
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-3139. | CVE ID: CVE-2013-3139
Date Updated: 2024-08-06T16:00:09.980Z
Date Published: 2013-06-12T01:00:00
Description:
Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3112, CVE-2013-3113, CVE-2013-3121, and CVE-2013-3142.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.us-cert.gov/ncas/alerts/TA13-168A
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-047
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16517
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-41981. | CVE ID: CVE-2023-41981
Date Updated: 2024-09-24T13:51:29.299Z
Date Published: 2023-09-26T20:14:39.091Z
Description:
The issue was addressed with improved memory handling. This issue is fixed in macOS Ventura 13.6, tvOS 17, iOS 16.7 and iPadOS 16.7, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. An attacker that has already achieved kernel code execution may be able to bypass kernel memory mitigations.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/en-us/HT213938
- https://support.apple.com/en-us/HT213927
- https://support.apple.com/en-us/HT213931
- https://support.apple.com/en-us/HT213936
- https://support.apple.com/en-us/HT213940
- https://support.apple.com/en-us/HT213937
- http://seclists.org/fulldisclosure/2023/Oct/5
- http://seclists.org/fulldisclosure/2023/Oct/10
- http://seclists.org/fulldisclosure/2023/Oct/8
- http://seclists.org/fulldisclosure/2023/Oct/9
- http://seclists.org/fulldisclosure/2023/Oct/3
- http://seclists.org/fulldisclosure/2023/Oct/4
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2018-4504. | CVE ID: CVE-2018-4504
Date Updated: 2023-09-14T18:41:44.566Z
Date Published: N/A
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-3821. | CVE ID: CVE-2013-3821
Date Updated: 2024-08-06T16:22:00.823Z
Date Published: 2013-07-17T10:00:00
Description:
Unspecified vulnerability in the PeopleSoft Enterprise PeopleTools component in Oracle PeopleSoft Products 8.51, 8.52, and 8.53 allows remote attackers to affect confidentiality and availability via unknown vectors related to Integration Broker.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/85679
- http://osvdb.org/95292
- http://secunia.com/advisories/54233
- http://www.securityfocus.com/bid/61221
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-0203. | CVE ID: CVE-2013-0203
Date Updated: 2024-08-06T14:18:09.286Z
Date Published: 2019-11-22T18:53:44
Description:
Multiple cross-site scripting (XSS) vulnerabilities in ownCloud 4.5.5, 4.0.10, and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) unspecified parameters to apps/calendar/ajax/event/new.php or (2) url parameter to apps/bookmarks/ajax/addBookmark.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/81478
- https://owncloud.org/security/advisories/multiple-xss-vulnerabilities-3/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-48518. | CVE ID: CVE-2022-48518
Date Updated: 2024-08-03T15:17:54.788Z
Date Published: 2023-07-06T12:53:19.166Z
Description:
Vulnerability of signature verification in the iaware system being initialized later than the time when the system broadcasts are sent. Successful exploitation of this vulnerability may cause malicious apps to start upon power-on by spoofing the package names of apps in the startup trustlist, which affects system performance.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://consumer.huawei.com/en/support/bulletin/2023/7/
- https://device.harmonyos.com/en/docs/security/update/security-bulletins-202307-0000001587168858
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2013-5690. | CVE ID: CVE-2013-5690
Date Updated: 2024-09-16T22:29:53.924Z
Date Published: 2013-10-03T19:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in Open-Xchange AppSuite before 7.2.2 allow remote authenticated users to inject arbitrary web script or HTML via (1) content with the text/xml MIME type or (2) the Status comment field of an appointment.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/archive/1/528940
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-8128. | CVE ID: CVE-2024-8128
Date Updated: 2024-08-27T15:03:52.785Z
Date Published: 2024-08-24T11:31:05.389Z
Description:
A vulnerability, which was classified as critical, has been found in D-Link DNS-120, DNR-202L, DNS-315L, DNS-320, DNS-320L, DNS-320LW, DNS-321, DNR-322L, DNS-323, DNS-325, DNS-326, DNS-327L, DNR-326, DNS-340L, DNS-343, DNS-345, DNS-726-4, DNS-1100-4, DNS-1200-05 and DNS-1550-04 up to 20240814. This issue affects the function cgi_add_zip of the file /cgi-bin/webfile_mgr.cgi of the component HTTP POST Request Handler. The manipulation of the argument path leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed that the product is end-of-life. It should be retired and replaced.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.275699
- https://vuldb.com/?ctiid.275699
- https://vuldb.com/?submit.396237
- https://github.com/BuaaIOTTeam/Iot_Dlink_NAS/blob/main/DNS_cgi_add_zip.md
- https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10383
- https://www.dlink.com/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2023-28557. | CVE ID: CVE-2023-28557
Date Updated: 2024-08-02T13:43:23.051Z
Date Published: 2023-09-05T06:24:12.673Z
Description:
Memory corruption in WLAN HAL while processing command parameters from untrusted WMI payload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/september-2023-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2022-4967. | CVE ID: CVE-2022-4967
Date Updated: 2024-08-03T01:55:46.125Z
Date Published: 2024-05-13T12:09:19.104Z
Description:
strongSwan versions 5.9.2 through 5.9.5 are affected by authorization bypass through improper validation of certificate with host mismatch (CWE-297). When certificates are used to authenticate clients in TLS-based EAP methods, the IKE or EAP identity supplied by a client is not enforced to be contained in the client's certificate. So clients can authenticate with any trusted certificate and claim an arbitrary IKE/EAP identity as their own. This is problematic if the identity is used to make policy decisions. A fix was released in strongSwan version 5.9.6 in August 2022 (e4b4aabc4996fc61c37deab7858d07bc4d220136).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/strongswan/strongswan/commit/e4b4aabc4996fc61c37deab7858d07bc4d220136
- https://www.strongswan.org/blog/2024/05/13/strongswan-vulnerability-(cve-2022-4967).html
- https://www.cve.org/CVERecord?id=CVE-2022-4967
- https://security.netapp.com/advisory/ntap-20240614-0006/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2011-3653. | CVE ID: CVE-2011-3653
Date Updated: 2024-08-06T23:46:01.990Z
Date Published: 2011-11-09T11:00:00
Description:
Mozilla Firefox before 8.0 and Thunderbird before 8.0 on Mac OS X do not properly interact with the GPU memory behavior of a certain driver for Intel integrated GPUs, which allows remote attackers to bypass the Same Origin Policy and read image data via vectors related to WebGL textures.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.mozilla.org/security/announce/2011/mfsa2011-51.html
- http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00020.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=684882
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13347
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2010-0280. | CVE ID: CVE-2010-0280
Date Updated: 2024-08-07T00:45:11.980Z
Date Published: 2010-01-15T17:00:00
Description:
Array index error in Jan Eric Kyprianidis lib3ds 1.x, as used in Google SketchUp 7.x before 7.1 M2, allows remote attackers to cause a denial of service (memory corruption) or possibly execute arbitrary code via crafted structures in a 3DS file, probably related to mesh.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/38185
- http://www.securityfocus.com/archive/1/508913/100/0/threaded
- http://www.coresecurity.com/content/google-sketchup-vulnerability
- http://sketchup.google.com/support/bin/answer.py?hl=en&answer=141303
- http://secunia.com/advisories/38187
- http://www.vupen.com/english/advisories/2010/0133
- http://www.securityfocus.com/bid/37708
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2016-10751. | CVE ID: CVE-2016-10751
Date Updated: 2024-08-06T03:30:20.206Z
Date Published: 2019-05-24T17:40:09
Description:
osClass 3.6.1 allows oc-admin/plugins.php Directory Traversal via the plugin parameter. This is exploitable for remote PHP code execution because an administrator can upload an image that contains PHP code in the EXIF data via index.php?page=ajax&action=ajax_upload.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://demo.ripstech.com/projects/osclass_3.6.1
- https://blog.ripstech.com/2016/osclass-remote-code-execution-via-image-file/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2019-9381. | CVE ID: CVE-2019-9381
Date Updated: 2024-08-04T21:46:30.487Z
Date Published: 2019-09-27T18:05:17
Description:
In netd, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: AndroidVersions: Android-10Android ID: A-122677612
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-10
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2017-14257. | CVE ID: CVE-2017-14257
Date Updated: 2024-08-05T19:20:41.282Z
Date Published: 2017-09-11T09:00:00
Description:
In the SDK in Bento4 1.5.0-616, AP4_AtomSampleTable::GetSample in Core/Ap4AtomSampleTable.cpp contains a Read Memory Access Violation vulnerability. It is possible to exploit this vulnerability by opening a crafted .MP4 file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/axiomatic-systems/Bento4/issues/181
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2021-25175. | CVE ID: CVE-2021-25175
Date Updated: 2024-08-03T19:56:10.649Z
Date Published: 2021-01-18T07:13:53
Description:
An issue was discovered in Open Design Alliance Drawings SDK before 2021.11. A Type Conversion issue exists when rendering malformed .DXF and .DWG files. This can allow attackers to cause a crash, potentially enabling a denial of service attack (Crash, Exit, or Restart).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.opendesign.com/security-advisories
- https://cert-portal.siemens.com/productcert/pdf/ssa-663999.pdf
- https://www.zerodayinitiative.com/advisories/ZDI-21-245/
- https://www.zerodayinitiative.com/advisories/ZDI-21-246/
- https://www.zerodayinitiative.com/advisories/ZDI-21-244/
- https://www.zerodayinitiative.com/advisories/ZDI-21-223/
- https://www.zerodayinitiative.com/advisories/ZDI-21-224/
- https://www.zerodayinitiative.com/advisories/ZDI-21-218/
- https://cert-portal.siemens.com/productcert/pdf/ssa-155599.pdf
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2008-6142. | CVE ID: CVE-2008-6142
Date Updated: 2024-08-07T11:20:25.309Z
Date Published: 2009-02-16T17:00:00
Description:
Multiple SQL injection vulnerabilities in admin/usercheck.php in FlexPHPic 0.0.4 and FlexPHPic Pro 0.0.3, and other 0.0.x versions, allow remote attackers to execute arbitrary SQL commands via (1) the checkuser parameter (aka username field), or (2) the checkpass parameter (aka password field), to admin/index.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/33376
- https://www.exploit-db.com/exploits/7624
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47653
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-30257. | CVE ID: CVE-2024-30257
Date Updated: 2024-08-02T01:32:05.409Z
Date Published: 2024-04-18T14:56:56.270Z
Description:
1Panel is an open source Linux server operation and maintenance management panel. The password verification in the source code uses the != symbol instead hmac.Equal. This may lead to a timing attack vulnerability. This vulnerability is fixed in 1.10.3-lts.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/1Panel-dev/1Panel/security/advisories/GHSA-6m9h-2pr2-9j8f
- https://github.com/1Panel-dev/1Panel/blob/dev/backend/app/service/auth.go#L81C5-L81C26
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the MITRE ATT&CK technique T1565.001 | The MITRE ATT&CK technique T1565.001: Stored Data Manipulation is related to the vulnerability CVE-CVE-2020-3309. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as secondary_impact. |
Provide detailed information about CVE-2014-0090. | CVE ID: CVE-2014-0090
Date Updated: 2024-08-06T09:05:38.660Z
Date Published: 2014-05-08T14:00:00
Description:
Session fixation vulnerability in Foreman before 1.4.2 allows remote attackers to hijack web sessions via the session id cookie.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1072151
- http://projects.theforeman.org/issues/4457
- http://theforeman.org/security.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
null | Describe the vulnerability CVE-CVE-2020-15211 | CVE-CVE-2020-15211 is a vulnerability in tensorflow. It is related to the MITRE ATT&CK technique T1574: Hijack Execution Flow. The vulnerability is classified as a primary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2020 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021. |
Provide detailed information about CVE-2020-7653. | CVE ID: CVE-2020-7653
Date Updated: 2024-08-04T09:33:19.963Z
Date Published: 2020-05-29T20:40:22
Description:
All versions of snyk-broker before 4.80.0 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users with access to Snyk's internal network by creating symlinks to match whitelisted paths.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://snyk.io/vuln/SNYK-JS-SNYKBROKER-570612
- https://updates.snyk.io/snyk-broker-security-fixes-152338
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2024-38098. | CVE ID: CVE-2024-38098
Date Updated: 2024-09-19T21:52:43.979Z
Date Published: 2024-08-13T17:29:59.021Z
Description:
Azure Connected Machine Agent Elevation of Privilege Vulnerability
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38098
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. | |
Provide detailed information about CVE-2009-4631. | CVE ID: CVE-2009-4631
Date Updated: 2024-08-07T07:08:38.212Z
Date Published: 2010-02-10T02:00:00
Description:
Off-by-one error in the VP3 decoder (vp3.c) in FFmpeg 0.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a crafted VP3 file that triggers an out-of-bounds read and possibly memory corruption.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/36805
- http://www.securityfocus.com/bid/36465
- https://roundup.ffmpeg.org/roundup/ffmpeg/issue1240
- http://scarybeastsecurity.blogspot.com/2009/09/patching-ffmpeg-into-shape.html
- https://roundup.ffmpeg.org/roundup/ffmpeg/issue1483
- http://secunia.com/advisories/38643
- http://www.debian.org/security/2010/dsa-2000
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.