instruction
stringlengths
49
63
input
stringlengths
0
69
output
stringlengths
221
18.7k
Provide detailed information about CVE-2020-29315.
CVE ID: CVE-2020-29315 Date Updated: 2024-08-04T16:48:01.582Z Date Published: 2020-12-01T16:55:08 Description: ThinkAdmin version v1 v6 has a stored XSS vulnerability which allows remote attackers to inject an arbitrary web script or HTML. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/zoujingli/ThinkAdmin/issues/255 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17427.
CVE ID: CVE-2019-17427 Date Updated: 2024-08-05T01:40:15.424Z Date Published: 2019-10-10T00:42:09 Description: In Redmine before 3.4.11 and 4.0.x before 4.0.4, persistent XSS exists due to textile formatting errors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.redmine.org/projects/redmine/wiki/Security_Advisories - https://www.debian.org/security/2019/dsa-4574 - https://seclists.org/bugtraq/2019/Nov/31 - https://usn.ubuntu.com/4200-1/ - https://github.com/RealLinkers/CVE-2019-17427 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-1294.
CVE ID: CVE-2020-1294 Date Updated: 2024-08-04T06:32:00.620Z Date Published: 2020-06-09T19:43:57 Description: An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory, aka 'Windows WalletService Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1287. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1294 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2011-1970.
CVE ID: CVE-2011-1970 Date Updated: 2024-08-06T22:46:00.817Z Date Published: 2011-08-10T21:16:00 Description: The DNS server in Microsoft Windows Server 2003 SP2 and Windows Server 2008 SP2, R2, and R2 SP1 does not properly initialize memory, which allows remote attackers to cause a denial of service (service outage) via a query for a nonexistent domain, aka "DNS Uninitialized Memory Corruption Vulnerability." No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12870 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-058 - http://www.us-cert.gov/cas/techalerts/TA11-221A.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-33404.
CVE ID: CVE-2023-33404 Date Updated: 2024-08-02T15:47:05.575Z Date Published: 2023-06-26T00:00:00 Description: An Unrestricted Upload vulnerability, due to insufficient validation on UploadControlled.cs file, in BlogEngine.Net version 3.3.8.0 and earlier allows remote attackers to execute remote code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/hacip/CVE-2023-33404 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-15925.
CVE ID: CVE-2020-15925 Date Updated: 2024-08-04T13:30:22.938Z Date Published: 2020-08-13T13:46:47 Description: A SQL injection vulnerability at a tpf URI in Loway QueueMetrics before 19.10.21 allows remote authenticated attackers to execute arbitrary SQL commands via the TPF_XPAR1 parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.divisionzero.co/2020/08/12/cve-2020-15925/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-11925.
CVE ID: CVE-2018-11925 Date Updated: 2024-08-05T08:24:03.433Z Date Published: 2019-05-24T16:33:01 Description: Data length received from firmware is not validated against the max allowed size which can result in buffer overflow. in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wired Infrastructure and Networking in IPQ4019, IPQ8064, IPQ8074, MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, QCS605, SD 425, SD 427, SD 430, SD 435, SD 450, SD 625, SD 636, SD 712 / SD 710 / SD 670, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM630, SDM660, SDX20, SDX24 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.codeaurora.org/security-bulletin/2019/04/01/april-2019-code-aurora-security-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-3040.
CVE ID: CVE-2024-3040 Date Updated: 2024-08-01T19:32:42.505Z Date Published: 2024-03-28T14:31:05.302Z Description: A vulnerability, which was classified as critical, was found in Netentsec NS-ASG Application Security Gateway 6.3. This affects an unknown part of the file /admin/list_crl_conf. The manipulation of the argument CRLId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-258429 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.258429 - https://vuldb.com/?ctiid.258429 - https://vuldb.com/?submit.302340 - https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-list_crl_conf.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-21114.
CVE ID: CVE-2023-21114 Date Updated: 2024-08-02T09:28:25.676Z Date Published: 2024-07-09T20:09:14.639Z Description: In multiple locations, there is a possible permission bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://android.googlesource.com/platform/packages/modules/Wifi/+/f88a2294f53cf382908cc48f992273742f817dd5 - https://android.googlesource.com/platform/packages/modules/Wifi/+/e6ca0c031758d8b1511f6a359bec316b6d2e22fe - https://android.googlesource.com/platform/packages/modules/Wifi/+/f39ed052916716ef974102b3bad7ae102d0164a5 - https://source.android.com/security/bulletin/2024-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-1614.
CVE ID: CVE-2009-1614 Date Updated: 2024-08-07T05:20:34.632Z Date Published: 2009-05-11T20:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Leap CMS 0.1.4 allow remote attackers to inject arbitrary web script or HTML via (1) the msg parameter (aka the message in an article comment) or (2) the searchterm parameter (aka the search post form). NOTE: some of these details are obtained from third party information. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/8577 - http://secunia.com/advisories/34943 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-12454.
CVE ID: CVE-2018-12454 Date Updated: 2024-08-05T08:38:06.264Z Date Published: 2018-06-17T12:00:00 Description: The _addguess function of a simplelottery smart contract implementation for 1000 Guess, an Ethereum gambling game, generates a random value with publicly readable variables such as the current block information and a private variable (which can be read with a getStorageAt call). Therefore, it allows attackers to always win and get rewards. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://medium.com/%40jonghyk.song/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-2626.
CVE ID: CVE-2009-2626 Date Updated: 2024-09-16T23:56:55.697Z Date Published: 2009-12-01T16:00:00Z Description: The zend_restore_ini_entry_cb function in zend_ini.c in PHP 5.3.0, 5.2.10, and earlier versions allows context-specific attackers to obtain sensitive information (memory contents) and cause a PHP crash by using the ini_set function to declare a variable, then using the ini_restore function to restore the variable. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/37482 - http://www.debian.org/security/2009/dsa-1940 - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=540605 - http://svn.php.net/viewvc/php/php-src/branches/PHP_5_3/Zend/zend_ini.c?r1=272370&r2=284156 - http://www.securityfocus.com/bid/36009 - http://securityreason.com/achievement_securityalert/65 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-29469.
CVE ID: CVE-2020-29469 Date Updated: 2024-08-04T16:55:09.819Z Date Published: 2020-12-30T14:47:51 Description: WonderCMS 3.1.3 is affected by cross-site scripting (XSS) in the Menu component. This vulnerability can allow an attacker to inject the XSS payload in the Setting - Menu and each time any user will visits the website directory, the XSS triggers and attacker can steal the cookie according to the crafted payload. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/49164 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-12978.
CVE ID: CVE-2019-12978 Date Updated: 2024-08-04T23:41:09.173Z Date Published: 2019-06-26T17:09:13 Description: ImageMagick 7.0.8-34 has a "use of uninitialized value" vulnerability in the ReadPANGOImage function in coders/pango.c. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/ImageMagick/ImageMagick/issues/1519 - http://www.securityfocus.com/bid/108913 - http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00069.html - https://usn.ubuntu.com/4192-1/ - https://www.debian.org/security/2020/dsa-4712 - https://lists.debian.org/debian-lts-announce/2020/08/msg00030.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-10049.
CVE ID: CVE-2018-10049 Date Updated: 2024-09-16T16:24:11.122Z Date Published: 2018-04-11T20:00:00Z Description: iScripts eSwap v2.4 has XSS via the "registration_settings.php" txtDate parameter in the Admin Panel. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pastebin.com/QbhRJp4q No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4331.
CVE ID: CVE-2010-4331 Date Updated: 2024-08-07T03:43:14.623Z Date Published: 2011-01-20T18:00:00 Description: Multiple cross-site scripting (XSS) vulnerabilities in Seo Panel 2.2.0 allow remote attackers to inject arbitrary web script or HTML via the (1) default_news or (2) sponsors cookies, which are not properly handled by (a) controllers/index.ctrl.php or (b) controllers/settings.ctrl.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/64725 - http://www.securityfocus.com/bid/45828 - http://www.uncompiled.com/2011/01/seo-panel-cookie-rendered-persistent-xss-vulnerability-cve-2010-4331/ - http://www.exploit-db.com/exploits/16000 - http://www.securityfocus.com/archive/1/515768/100/0/threaded No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2263.
CVE ID: CVE-2012-2263 Date Updated: 2024-09-17T02:42:11.384Z Date Published: 2013-10-09T14:44:00Z Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-1176.
CVE ID: CVE-2023-1176 Date Updated: 2024-08-02T05:40:58.081Z Date Published: 2023-03-24T00:00:00 Description: Absolute Path Traversal in GitHub repository mlflow/mlflow prior to 2.2.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/ae92f814-6a08-435c-8445-eec0ef4f1085 - https://github.com/mlflow/mlflow/commit/63ef72aa4334a6473ce7f889573c92fcae0b3c0d No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-11280.
CVE ID: CVE-2019-11280 Date Updated: 2024-09-16T19:20:44.714Z Date Published: 2019-09-20T18:35:17.756215Z Description: Pivotal Apps Manager, included in Pivotal Application Service versions 2.3.x prior to 2.3.18, 2.4.x prior to 2.4.14, 2.5.x prior to 2.5.10, and 2.6.x prior to 2.6.5, contains an invitations microservice which allows users to invite others to their organizations. A remote authenticated user can gain additional privileges by inviting themselves to spaces that they should not have access to. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://pivotal.io/security/cve-2019-11280 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-50356.
CVE ID: CVE-2023-50356 Date Updated: 2024-08-02T22:16:46.210Z Date Published: 2024-01-31T10:15:36.765Z Description: SSL connections to some LDAP servers are vulnerable to a man-in-the-middle attack due to improper certificate validation in AREAL Topkapi Vision (Server). This allows a remote unauthenticated attacker to gather sensitive information and prevent valid users from login. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.areal-topkapi.com/en/services/security-bulletins No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-11315.
CVE ID: CVE-2020-11315 Date Updated: 2021-12-20T22:45:04 Date Published: 2021-12-20T22:45:04 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-5064.
CVE ID: CVE-2024-5064 Date Updated: 2024-08-01T21:03:10.496Z Date Published: 2024-05-17T18:31:06.286Z Description: A vulnerability was found in PHPGurukul Online Course Registration System 3.1. It has been rated as critical. This issue affects some unknown processing of the file news-details.php. The manipulation of the argument nid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-264923. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.264923 - https://vuldb.com/?ctiid.264923 - https://vuldb.com/?submit.336238 - https://github.com/BurakSevben/CVEs/blob/main/Online%20Course%20Registration%20System/Online%20Course%20Registration%20System%20-%20SQL%20Injection%20-%202%20(Unauthenticated).md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-0876.
CVE ID: CVE-2017-0876 Date Updated: 2024-09-16T17:37:36.636Z Date Published: 2017-12-06T14:00:00Z Description: A remote code execution vulnerability in the Android media framework (libavc). Product: Android. Versions: 6.0. Android ID A-64964675. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/2017-12-01 - http://www.securityfocus.com/bid/102126 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-3760.
CVE ID: CVE-2013-3760 Date Updated: 2024-08-06T16:22:00.487Z Date Published: 2013-07-17T10:00:00 Description: Unspecified vulnerability in the Oracle executable component in Oracle Database Server 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, and 11.2.0.3 allows local users to affect confidentiality, integrity, and availability via unknown vectors, a different vulnerability than CVE-2013-3771. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1028789 - http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00000.html - http://osvdb.org/95265 - http://www.oracle.com/technetwork/topics/security/cpujuly2013-1899826.html - https://exchange.xforce.ibmcloud.com/vulnerabilities/85652 - http://www.securityfocus.com/bid/61209 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-1334.
CVE ID: CVE-2016-1334 Date Updated: 2024-08-05T22:55:14.282Z Date Published: 2016-02-17T16:00:00 Description: Cisco Small Business 500 Wireless Access Point devices with firmware 1.0.4.4 allow remote attackers to set the system time via a crafted POST request, aka Bug ID CSCuy01457. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035036 - http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160216-wap No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-6859.
CVE ID: CVE-2015-6859 Date Updated: 2024-08-06T07:36:33.340Z Date Published: 2016-01-05T11:00:00 Description: HPE Network Switches with software 15.16.x and 15.17.x allow local users to bypass intended access restrictions via unspecified vectors, a different vulnerability than CVE-2015-6860. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1034410 - https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04920918 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-35375.
CVE ID: CVE-2024-35375 Date Updated: 2024-08-02T03:07:47.024Z Date Published: N/A Description: There is an arbitrary file upload vulnerability on the media add .php page in the backend of the website in version 5.7.114 of DedeCMS No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://shtaoism.com/ - https://gist.github.com/Tsq741/a16015209fa8728d505c4f82b4f518cd No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1496.
CVE ID: CVE-2019-1496 Date Updated: 2020-01-24T21:14:20 Date Published: 2020-01-24T21:14:20 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-4734.
CVE ID: CVE-2018-4734 Date Updated: 2023-09-14T18:43:11.247Z Date Published: N/A Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-1255.
CVE ID: CVE-2019-1255 Date Updated: 2024-08-04T18:13:29.704Z Date Published: 2019-09-23T19:14:38 Description: A denial of service vulnerability exists when Microsoft Defender improperly handles files, aka 'Microsoft Defender Denial of Service Vulnerability'. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1255 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2014-6601.
CVE ID: CVE-2014-6601 Date Updated: 2024-08-06T12:24:34.231Z Date Published: 2015-01-21T18:00:00 Description: Unspecified vulnerability in Oracle Java SE 6u85, 7u72, and 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00018.html - http://www.debian.org/security/2015/dsa-3144 - http://rhn.redhat.com/errata/RHSA-2015-0079.html - http://www.vmware.com/security/advisories/VMSA-2015-0003.html - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - http://www.ubuntu.com/usn/USN-2487-1 - http://www.securityfocus.com/bid/72132 - http://rhn.redhat.com/errata/RHSA-2015-0085.html - http://rhn.redhat.com/errata/RHSA-2015-0086.html - https://security.gentoo.org/glsa/201603-14 - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00024.html - http://rhn.redhat.com/errata/RHSA-2015-0080.html - http://rhn.redhat.com/errata/RHSA-2015-0068.html - http://www.ubuntu.com/usn/USN-2486-1 - https://security.gentoo.org/glsa/201507-14 - http://marc.info/?l=bugtraq&m=142496355704097&w=2 - http://h20564.www2.hp.com/hpsc/doc/public/display?docId=emr_na-c04583581 - http://marc.info/?l=bugtraq&m=142607790919348&w=2 - http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00001.html - http://marc.info/?l=bugtraq&m=142496355704097&w=2 - http://www.securitytracker.com/id/1031580 - http://www.debian.org/security/2015/dsa-3147 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6261.
CVE ID: CVE-2008-6261 Date Updated: 2024-08-07T11:27:34.814Z Date Published: 2009-02-24T18:00:00 Description: SQL injection vulnerability in view.php in E-topbiz AdManager 4 allows remote attackers to execute arbitrary SQL commands via the group parameter. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7138 - http://www.securityfocus.com/bid/32328 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46643 - http://secunia.com/advisories/32747 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-3714.
CVE ID: CVE-2008-3714 Date Updated: 2024-08-07T09:52:59.250Z Date Published: 2008-08-19T19:10:00 Description: Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32939 - http://secunia.com/advisories/31519 - http://secunia.com/advisories/33002 - http://secunia.com/advisories/31759 - http://www.debian.org/security/2008/dsa-1679 - http://www.vupen.com/english/advisories/2008/2399 - http://www.securitytracker.com/id?1020704 - http://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764 - https://exchange.xforce.ibmcloud.com/vulnerabilities/44504 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:203 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html - http://www.securityfocus.com/bid/30730 - https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432 - http://awstats.sourceforge.net/docs/awstats_changelog.txt - http://www.ubuntu.com/usn/usn-686-1 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10463.
CVE ID: CVE-2019-10463 Date Updated: 2024-08-04T22:24:18.511Z Date Published: 2019-10-23T12:45:39 Description: A missing permission check in Jenkins Dynatrace Application Monitoring Plugin allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jenkins.io/security/advisory/2019-10-23/#SECURITY-1483%20%282%29 - http://www.openwall.com/lists/oss-security/2019/10/23/2 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-4271.
CVE ID: CVE-2013-4271 Date Updated: 2024-08-06T16:38:01.864Z Date Published: 2013-10-10T00:00:00 Description: The default configuration of the ObjectRepresentation class in Restlet before 2.1.4 deserializes objects from untrusted sources, which allows remote attackers to execute arbitrary Java code via a serialized object, a different vulnerability than CVE-2013-4221. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://rhn.redhat.com/errata/RHSA-2013-1862.html - https://github.com/restlet/restlet-framework-java/issues/778 - http://restlet.org/learn/2.1/changes - https://bugzilla.redhat.com/show_bug.cgi?id=999735 - http://rhn.redhat.com/errata/RHSA-2013-1410.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-41635.
CVE ID: CVE-2023-41635 Date Updated: 2024-10-01T18:09:00.642Z Date Published: 2023-08-31T00:00:00 Description: A XML External Entity (XXE) vulnerability in the VerifichePeriodiche.aspx component of GruppoSCAI RealGimm v1.1.37p38 allows attackers to read any file in the filesystem via supplying a crafted XML file. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/main/CVE%20PoC/CVE-ID%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md - https://github.com/CapgeminiCisRedTeam/Disclosure/blob/f7aafa9fcd4efa30071c7f77d3e9e6b14e92302b/CVE%20PoC/CVE-2023-41635%20%7C%20RealGimm%20-%20XML%20External%20Entity%20Injection.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-14190.
CVE ID: CVE-2017-14190 Date Updated: 2024-09-16T20:06:16.168Z Date Published: 2018-01-29T16:00:00Z Description: A Cross-site Scripting vulnerability in Fortinet FortiOS 5.6.0 to 5.6.2, 5.4.0 to 5.4.7, 5.2 and earlier, allows attacker to inject arbitrary web script or HTML via maliciously crafted "Host" header in user HTTP requests. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040284 - http://www.securityfocus.com/bid/102779 - https://fortiguard.com/advisory/FG-IR-17-262 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3114.
CVE ID: CVE-2020-3114 Date Updated: 2024-09-16T17:14:02.358Z Date Published: 2020-02-19T19:16:09.835099Z Description: A vulnerability in the web-based management interface of Cisco Data Center Network Manager (DCNM) could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user of the interface to follow a malicious link while having an active session on an affected device. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the targeted user. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200219-dcnm-csrf No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2034.
CVE ID: CVE-2023-2034 Date Updated: 2024-08-02T06:12:19.833Z Date Published: 2023-04-14T00:00:00 Description: Unrestricted Upload of File with Dangerous Type in GitHub repository froxlor/froxlor prior to 2.0.14. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://huntr.dev/bounties/aba6beaa-570e-4523-8128-da4d8e374ef6 - https://github.com/froxlor/froxlor/commit/f36bc61fc74c85a21c8d31448198b11f96eb3bc6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4364.
CVE ID: CVE-2017-4364 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2818.
CVE ID: CVE-2018-2818 Date Updated: 2024-10-03T20:16:08.553Z Date Published: 2018-04-19T02:00:00 Description: Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1040698 - https://access.redhat.com/errata/RHSA-2018:1254 - http://www.securityfocus.com/bid/103824 - https://security.netapp.com/advisory/ntap-20180419-0002/ - https://www.debian.org/security/2018/dsa-4176 - https://lists.debian.org/debian-lts-announce/2018/04/msg00020.html - https://access.redhat.com/errata/RHSA-2018:3655 - http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html - https://usn.ubuntu.com/3629-1/ - https://usn.ubuntu.com/3629-2/ - https://usn.ubuntu.com/3629-3/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-32086.
CVE ID: CVE-2022-32086 Date Updated: 2024-08-03T07:32:55.986Z Date Published: 2022-07-01T19:10:33 Description: MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jira.mariadb.org/browse/MDEV-26412 - https://security.netapp.com/advisory/ntap-20220826-0007/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-27725.
CVE ID: CVE-2020-27725 Date Updated: 2024-08-04T16:18:45.663Z Date Published: 2020-12-24T15:01:46 Description: In version 15.1.0-15.1.0.5, 14.1.0-14.1.3, 13.1.0-13.1.3.4, 12.1.0-12.1.5.2, and 11.6.1-11.6.5.2 of BIG-IP DNS, GTM, and Link Controller, zxfrd leaks memory when listing DNS zones. Zones can be listed via TMSH, iControl or SNMP; only users with access to those services can trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://support.f5.com/csp/article/K25595031 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-0820.
CVE ID: CVE-2024-0820 Date Updated: 2024-08-01T18:18:19.145Z Date Published: 2024-03-18T19:05:46.059Z Description: The Jobs for WordPress plugin before 2.7.4 does not sanitise and escape some parameters, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://wpscan.com/vulnerability/fc091bbd-7338-4bd4-add5-e46502a9a949/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-4747.
CVE ID: CVE-2017-4747 Date Updated: 2018-03-16T13:57:01 Date Published: 2018-03-16T14:04:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000531.
CVE ID: CVE-2018-1000531 Date Updated: 2024-08-05T12:40:47.261Z Date Published: 2018-06-26T16:00:00 Description: inversoft prime-jwt version prior to commit abb0d479389a2509f939452a6767dc424bb5e6ba contains a CWE-20 vulnerability in JWTDecoder.decode that can result in an incorrect signature validation of a JWT token. This attack can be exploitable when an attacker crafts a JWT token with a valid header using 'none' as algorithm and a body to requests it be validated. This vulnerability was fixed after commit abb0d479389a2509f939452a6767dc424bb5e6ba. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/inversoft/prime-jwt/issues/3 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-0175.
CVE ID: CVE-2020-0175 Date Updated: 2024-08-04T05:55:11.125Z Date Published: 2020-06-11T14:43:48 Description: In XMF_ReadNode of eas_xmf.c, there is possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-126380818 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://source.android.com/security/bulletin/pixel/2020-06-01 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43588.
CVE ID: CVE-2022-43588 Date Updated: 2024-09-16T21:04:40.105Z Date Published: 2022-11-28T10:20:13.200775Z Description: A null pointer dereference vulnerability exists in the handle_ioctl_83150 functionality of Callback technologies CBFS Filter 20.0.8317. A specially crafted I/O request packet (IRP) can lead to denial of service. An attacker can issue an ioctl to trigger this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://talosintelligence.com/vulnerability_reports/TALOS-2022-1647 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2016-0129.
CVE ID: CVE-2016-0129 Date Updated: 2024-08-05T22:08:13.305Z Date Published: 2016-03-09T11:00:00 Description: Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0116, CVE-2016-0123, CVE-2016-0124, and CVE-2016-0130. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securitytracker.com/id/1035204 - https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-024 - http://www.securityfocus.com/bid/84116 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6507.
CVE ID: CVE-2008-6507 Date Updated: 2024-09-17T02:58:21.268Z Date Published: 2009-03-23T16:00:00Z Description: Unspecified vulnerability in phpBB before 3.0.4 allows attackers to obtain sensitive information via unknown vectors related to the lack of password prompts for a private message that quotes a post in a password-protected forum. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.phpbb.com/community/viewtopic.php?f=14&t=1352565 - http://secunia.com/advisories/33166 - http://www.phpbb.com/support/documents.php?mode=changelog&version=3#v303 - http://www.openwall.com/lists/oss-security/2009/02/06/2 - http://www.osvdb.org/50806 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-7373.
CVE ID: CVE-2020-7373 Date Updated: 2024-08-04T09:25:49.044Z Date Published: 2020-10-30T16:50:16 Description: vBulletin 5.5.4 through 5.6.2 allows remote command execution via crafted subWidgets data in an ajax/render/widget_tabbedcontainer_tab_panel request. NOTE: this issue exists because of an incomplete fix for CVE-2019-16759. ALSO NOTE: CVE-2020-7373 is a duplicate of CVE-2020-17496. CVE-2020-17496 is the preferred CVE ID to track this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/ - https://forum.vbulletin.com/forum/vbulletin-announcements/vbulletin-announcements_aa/4445227-vbulletin-5-6-0-5-6-1-5-6-2-security-patch - https://seclists.org/fulldisclosure/2020/Aug/5 - https://github.com/rapid7/metasploit-framework/pull/13970 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
null
Describe the MITRE ATT&CK technique T1203
The MITRE ATT&CK technique T1203: Exploitation for Client Execution is related to the vulnerability CVE-CVE-2018-7513. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as uncategorized.
Provide detailed information about CVE-2009-4844.
CVE ID: CVE-2009-4844 Date Updated: 2024-08-07T07:17:25.559Z Date Published: 2010-05-07T17:43:00 Description: ToutVirtual VirtualIQ Pro 3.2 build 7882 does not restrict access to the /status URI on port 9080, which allows remote attackers to obtain sensitive Tomcat information via a direct request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/58576 - http://www.securityfocus.com/archive/1/507729/100/0/threaded - http://www.securenetwork.it/ricerca/advisory/download/SN-2009-02.txt No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-3007.
CVE ID: CVE-2018-3007 Date Updated: 2024-10-02T20:07:01.432Z Date Published: 2018-07-18T13:00:00 Description: Vulnerability in the Oracle Tuxedo component of Oracle Fusion Middleware (subcomponent: Core). Supported versions that are affected are 12.1.1, 12.1.3 and 12.2.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via Jolt to compromise Oracle Tuxedo. While the vulnerability is in Oracle Tuxedo, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Tuxedo accessible data. CVSS 3.0 Base Score 8.6 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html - http://www.securityfocus.com/bid/104814 - http://www.securitytracker.com/id/1041310 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-34396.
CVE ID: CVE-2021-34396 Date Updated: 2024-08-04T00:12:50.016Z Date Published: 2021-06-22T21:25:32 Description: Bootloader contains a vulnerability in access permission settings where unauthorized software may be able to overwrite NVIDIA MB2 code, which would result in limited denial of service. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://nvidia.custhelp.com/app/answers/detail/a_id/5205 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2829.
CVE ID: CVE-2023-2829 Date Updated: 2024-08-02T06:33:05.969Z Date Published: 2023-06-21T16:26:24.932Z Description: A `named` instance configured to run as a DNSSEC-validating recursive resolver with the Aggressive Use of DNSSEC-Validated Cache (RFC 8198) option (`synth-from-dnssec`) enabled can be remotely terminated using a zone with a malformed NSEC record. This issue affects BIND 9 versions 9.16.8-S1 through 9.16.41-S1 and 9.18.11-S1 through 9.18.15-S1. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://kb.isc.org/docs/cve-2023-2829 - https://security.netapp.com/advisory/ntap-20230703-0010/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-31803.
CVE ID: CVE-2021-31803 Date Updated: 2024-08-03T23:10:30.168Z Date Published: 2021-04-26T07:30:54 Description: cPanel before 94.0.3 allows self-XSS via EasyApache 4 Save Profile (SEC-581). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://docs.cpanel.net/changelogs/94-change-log/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-0278.
CVE ID: CVE-2019-0278 Date Updated: 2024-08-04T17:44:16.299Z Date Published: 2019-04-10T20:13:45 Description: Under certain conditions the Monitoring Servlet of the SAP NetWeaver Process Integration (Messaging System), fixed in versions 7.10 to 7.11, 7.20, 7.30, 7.31, 7.40, 7.50, allows an attacker to see the names of database tables used by the application, leading to information disclosure. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://launchpad.support.sap.com/#/notes/2741201 - https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=517899114 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2019.
CVE ID: CVE-2008-2019 Date Updated: 2024-08-07T08:41:00.258Z Date Published: 2008-04-30T01:00:00 Description: Simple Machines Forum (SMF), probably 1.1.4, relies on "randomly generated static" to hinder brute-force attacks on the WAV file (aka audio) CAPTCHA, which allows remote attackers to pass the CAPTCHA test via an automated attack that considers Hamming distances. NOTE: this issue reportedly exists because of an insufficient fix for CVE-2007-3308. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://exchange.xforce.ibmcloud.com/vulnerabilities/42150 - http://securityreason.com/securityalert/3836 - http://www.securityfocus.com/bid/28866 - http://www.securityfocus.com/archive/1/491128/100/0/threaded - http://www.rooksecurity.com/blog/?p=6 - http://www.simplemachines.org/community/index.php?P=c3696c2022b54fa50c5f341bf5710aa3&topic=236816.0 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-2785.
CVE ID: CVE-2008-2785 Date Updated: 2024-08-07T09:14:14.674Z Date Published: 2008-06-19T21:00:00 Description: Mozilla Firefox before 2.0.0.16 and 3.x before 3.0.1, Thunderbird before 2.0.0.16, and SeaMonkey before 1.1.11 use an incorrect integer data type as a CSS object reference counter in the CSSValue array (aka nsCSSValue:Array) data structure, which allows remote attackers to execute arbitrary code via a large number of references to a common CSS object, leading to a counter overflow and a free of in-use memory, aka ZDI-CAN-349. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/31154 - http://www.novell.com/support/search.do?cmd=displayKC&docType=kc&externalId=InfoDocument-patchbuilder-readme5031400 - https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9900 - http://www.debian.org/security/2009/dsa-1697 - http://www.redhat.com/support/errata/RHSA-2008-0597.html - http://secunia.com/advisories/31403 - http://secunia.com/advisories/31270 - http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380767 - http://blog.mozilla.com/security/2008/06/18/new-security-issue-under-investigation/ - http://www.zerodayinitiative.com/advisories/ZDI-08-044/ - http://secunia.com/advisories/31121 - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00667.html - https://bugzilla.mozilla.org/show_bug.cgi?id=440230 - http://www.vupen.com/english/advisories/2009/0977 - http://secunia.com/advisories/31145 - http://secunia.com/advisories/31122 - http://secunia.com/advisories/31377 - http://rhn.redhat.com/errata/RHSA-2008-0616.html - http://www.securityfocus.com/bid/29802 - http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0238 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:155 - http://security.gentoo.org/glsa/glsa-200808-03.xml - http://www.securityfocus.com/archive/1/494860/100/0/threaded - http://www.ubuntu.com/usn/usn-626-2 - http://www.redhat.com/support/errata/RHSA-2008-0598.html - http://secunia.com/advisories/31157 - http://secunia.com/advisories/33433 - http://www.debian.org/security/2008/dsa-1614 - http://secunia.com/advisories/31253 - https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00125.html - http://secunia.com/advisories/31183 - http://www.ubuntu.com/usn/usn-629-1 - http://www.redhat.com/support/errata/RHSA-2008-0599.html - http://sunsolve.sun.com/search/document.do?assetkey=1-26-256408-1 - http://dvlabs.tippingpoint.com/blog/2008/06/18/vulnerability-in-mozilla-firefox-30 - https://issues.rpath.com/browse/RPL-2683 - http://secunia.com/advisories/31261 - http://secunia.com/advisories/31144 - http://secunia.com/advisories/30761 - http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.410484 - http://www.ubuntu.com/usn/usn-623-1 - http://www.slackware.org/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.380974 - http://www.debian.org/security/2008/dsa-1615 - http://secunia.com/advisories/31176 - http://www.securityfocus.com/archive/1/494504/100/0/threaded - https://www.redhat.com/archives/fedora-package-announce/2008-August/msg00144.html - https://www.redhat.com/archives/fedora-package-announce/2008-July/msg00672.html - http://secunia.com/advisories/31220 - http://secunia.com/advisories/31195 - http://secunia.com/advisories/31129 - http://www.securitytracker.com/id?1020336 - https://exchange.xforce.ibmcloud.com/vulnerabilities/43167 - http://www.ubuntu.com/usn/usn-626-1 - http://www.mandriva.com/security/advisories?name=MDVSA-2008:148 - http://www.debian.org/security/2008/dsa-1621 - http://www.mozilla.org/security/announce/2008/mfsa2008-34.html - http://secunia.com/advisories/31306 - http://secunia.com/advisories/31286 - http://secunia.com/advisories/34501 - http://www.vupen.com/english/advisories/2008/1873 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-1000847.
CVE ID: CVE-2018-1000847 Date Updated: 2024-09-16T19:51:53.215Z Date Published: 2018-12-20T15:00:00Z Description: FreshDNS version 1.0.3 and prior contains a Cross Site Scripting (XSS) vulnerability in Account data form; Zone editor that can result in Execution of attacker's JavaScript code in victim's session. This attack appear to be exploitable via The attacker stores a specially crafted string as their Full Name in their account details. The victim (e.g. the administrator of the FreshDNS instance) opens the User List in the admin interface.. This vulnerability appears to have been fixed in 1.0.5 and later. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/funzoneq/freshdns/issues/16 - https://github.com/funzoneq/freshdns/pull/6/commits/48b5ca812a89689fd2f32248875cedcba8c9014f No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-45770.
CVE ID: CVE-2023-45770 Date Updated: 2024-08-02T20:29:32.241Z Date Published: 2023-10-24T12:16:08.741Z Description: Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Fastwpspeed Fast WP Speed plugin <= 1.0.0 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/fast-wp-speed/wordpress-fast-wp-speed-plugin-1-0-0-reflected-cross-site-scripting-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-0056.
CVE ID: CVE-2021-0056 Date Updated: 2024-08-03T15:25:01.750Z Date Published: 2021-06-09T19:05:09 Description: Insecure inherited permissions for the Intel(R) NUC M15 Laptop Kit Driver Pack software before updated version 1.1 may allow an authenticated user to potentially enable escalation of privilege via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00507.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-16105.
CVE ID: CVE-2017-16105 Date Updated: 2024-09-16T19:24:33.590Z Date Published: 2018-06-07T02:00:00Z Description: serverwzl is a simple http server. serverwzl is vulnerable to a directory traversal issue, giving an attacker access to the filesystem by placing "../" in the URL. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/JacksonGL/NPM-Vuln-PoC/tree/master/directory-traversal/serverwzl - https://nodesecurity.io/advisories/363 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2013-6102.
CVE ID: CVE-2013-6102 Date Updated: 2017-05-11T13:57:01 Date Published: 2017-05-11T14:01:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-0337.
CVE ID: CVE-2022-0337 Date Updated: 2024-08-02T23:25:40.233Z Date Published: 2023-01-02T00:00:00 Description: Inappropriate implementation in File System API in Google Chrome on Windows prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page. (Chrome security severity: High) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html - https://crbug.com/1247389 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2021-2136.
CVE ID: CVE-2021-2136 Date Updated: 2024-09-26T18:15:52.812Z Date Published: 2021-04-22T21:53:44 Description: Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.1.3.0.0, 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.oracle.com/security-alerts/cpuapr2021.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-0281.
CVE ID: CVE-2009-0281 Date Updated: 2024-08-07T04:31:25.354Z Date Published: 2009-01-27T18:00:00 Description: SQL injection vulnerability in login.aspx in WarHound Walking Club allows remote attackers to execute arbitrary SQL commands via the (1) username and (2) password parameters. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.exploit-db.com/exploits/7802 - https://exchange.xforce.ibmcloud.com/vulnerabilities/48061 - http://www.securityfocus.com/bid/33317 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-5275.
CVE ID: CVE-2012-5275 Date Updated: 2024-08-06T20:58:03.585Z Date Published: 2012-11-07T02:00:00 Description: Buffer overflow in Adobe Flash Player before 10.3.183.43 and 11.x before 11.5.502.110 on Windows and Mac OS X, before 10.3.183.43 and 11.x before 11.2.202.251 on Linux, before 11.1.111.24 on Android 2.x and 3.x, and before 11.1.115.27 on Android 4.x; Adobe AIR before 3.5.0.600; and Adobe AIR SDK before 3.5.0.600 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2012-5274, CVE-2012-5276, CVE-2012-5277, and CVE-2012-5280. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00012.html - http://rhn.redhat.com/errata/RHSA-2012-1431.html - http://secunia.com/advisories/51245 - http://www.securitytracker.com/id?1027730 - https://exchange.xforce.ibmcloud.com/vulnerabilities/79846 - http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00030.html - http://secunia.com/advisories/51186 - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00005.html - http://www.adobe.com/support/security/bulletins/apsb12-24.html - http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00007.html - http://secunia.com/advisories/51213 - http://secunia.com/advisories/51207 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-30775.
CVE ID: CVE-2022-30775 Date Updated: 2024-08-03T06:56:14.006Z Date Published: 2022-05-16T02:54:45 Description: xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://forum.xpdfreader.com/viewtopic.php?f=3&t=42264 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-10830.
CVE ID: CVE-2017-10830 Date Updated: 2024-08-05T17:50:12.120Z Date Published: 2017-08-28T20:00:00 Description: Untrusted search path vulnerability in Security Setup Tool all versions allows an attacker to gain privileges via a Trojan horse DLL in an unspecified directory. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://jvn.jp/en/jp/JVN36303528/index.html - http://f-security.jp/v6/support/information/100161.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2012-2316.
CVE ID: CVE-2012-2316 Date Updated: 2024-09-16T20:52:45.154Z Date Published: 2012-09-09T21:00:00Z Description: Cross-site request forgery (CSRF) vulnerability in servlet/admin/AuthServlet.java in OpenKM 5.1.7 and other versions before 5.1.8-2 allows remote attackers to hijack the authentication of administrators for requests that execute arbitrary code via the script parameter to admin/scripting.jsp. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.openwall.com/lists/oss-security/2012/03/23/6 - http://www.openwall.com/lists/oss-security/2012/05/04/2 - http://openkm.svn.sourceforge.net/viewvc/openkm?view=revision&revision=7406 - http://www.openwall.com/lists/oss-security/2012/03/23/8 - http://secunia.com/advisories/47420 - http://wiki.openkm.com/index.php/Changelog - http://archives.neohapsis.com/archives/bugtraq/2012-01/0008.html - http://www.osvdb.org/78106 - http://www.openwall.com/lists/oss-security/2012/05/04/13 - http://www.openwall.com/lists/oss-security/2012/04/27/6 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27307.
CVE ID: CVE-2024-27307 Date Updated: 2024-08-13T17:23:40.132Z Date Published: 2024-03-06T19:24:16.876Z Description: JSONata is a JSON query and transformation language. Starting in version 1.4.0 and prior to version 1.8.7 and 2.0.4, a malicious expression can use the transform operator to override properties on the `Object` constructor and prototype. This may lead to denial of service, remote code execution or other unexpected behavior in applications that evaluate user-provided JSONata expressions. This issue has been fixed in JSONata versions 1.8.7 and 2.0.4. Applications that evaluate user-provided expressions should update ASAP to prevent exploitation. As a workaround, one may apply the patch manually. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/jsonata-js/jsonata/security/advisories/GHSA-fqg8-vfv7-8fj8 - https://github.com/jsonata-js/jsonata/commit/1d579dbe99c19fbe509f5ba2c6db7959b0d456d1 - https://github.com/jsonata-js/jsonata/commit/335d38f6278e96c908b24183f1c9c90afc8ae00c - https://github.com/jsonata-js/jsonata/commit/c907b5e517bb718015fcbd993d742ba6202f2be2 - https://github.com/jsonata-js/jsonata/releases/tag/v2.0.4 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-2772.
CVE ID: CVE-2023-2772 Date Updated: 2024-08-02T06:33:05.464Z Date Published: 2023-05-17T18:31:04.581Z Description: A vulnerability, which was classified as critical, was found in SourceCodester Budget and Expense Tracker System 1.0. Affected is an unknown function of the file /admin/budget/manage_budget.php of the component GET Parameter Handler. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-229278 is the identifier assigned to this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://vuldb.com/?id.229278 - https://vuldb.com/?ctiid.229278 - https://github.com/wucwu1/CVEApplication/blob/main/SQL.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2010-4660.
CVE ID: CVE-2010-4660 Date Updated: 2024-08-07T03:51:18.037Z Date Published: 2019-11-20T15:41:50 Description: Unspecified vulnerability in statusnet through 2010 due to the way addslashes are used in SQL string escapes.. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security-tracker.debian.org/tracker/CVE-2010-4660 - https://www.openwall.com/lists/oss-security/2011/01/25/13 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-36188.
CVE ID: CVE-2020-36188 Date Updated: 2024-08-04T17:23:09.309Z Date Published: 2021-01-06T22:29:36 Description: FasterXML jackson-databind 2.x before 2.9.10.8 mishandles the interaction between serialization gadgets and typing, related to com.newrelic.agent.deps.ch.qos.logback.core.db.JNDIConnectionSource. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://cowtowncoder.medium.com/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062 - https://github.com/FasterXML/jackson-databind/issues/2996 - https://lists.debian.org/debian-lts-announce/2021/04/msg00025.html - https://www.oracle.com/security-alerts/cpuApr2021.html - https://security.netapp.com/advisory/ntap-20210205-0005/ - https://www.oracle.com//security-alerts/cpujul2021.html - https://www.oracle.com/security-alerts/cpuoct2021.html - https://www.oracle.com/security-alerts/cpujan2022.html - https://www.oracle.com/security-alerts/cpuapr2022.html - https://www.oracle.com/security-alerts/cpujul2022.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-43354.
CVE ID: CVE-2022-43354 Date Updated: 2024-08-03T13:26:02.865Z Date Published: 2022-11-01T00:00:00 Description: Sanitization Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /admin/?page=orders/manage_request. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/daytime888/bug_report/blob/main/vendors/oretnom23/sanitization-management-system/SQLi-2.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2015-0331.
CVE ID: CVE-2015-0331 Date Updated: 2024-08-06T04:03:10.978Z Date Published: 2015-02-21T11:00:00 Description: Use-after-free vulnerability in Adobe Flash Player before 13.0.0.269 and 14.x through 16.x before 16.0.0.305 on Windows and OS X and before 11.2.202.442 on Linux allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2015-0313, CVE-2015-0315, CVE-2015-0320, and CVE-2015-0322. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/bid/72698 - https://helpx.adobe.com/security/products/flash-player/apsb15-04.html - http://lists.opensuse.org/opensuse-security-announce/2015-04/msg00013.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-29011.
CVE ID: CVE-2024-29011 Date Updated: 2024-08-02T01:03:51.499Z Date Published: 2024-05-01T18:19:46.896Z Description: Use of hard-coded password in the GMS ECM endpoint leading to authentication bypass vulnerability. This issue affects GMS: 9.3.4 and earlier versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2024-0007 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-27280.
CVE ID: CVE-2024-27280 Date Updated: 2024-08-02T00:27:59.862Z Date Published: N/A Description: A buffer-overread issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4. The ungetbyte and ungetc methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets may return the memory value. 3.0.3 is the main fixed version; however, for Ruby 3.0 users, a fixed version is stringio 3.0.1.1, and for Ruby 3.1 users, a fixed version is stringio 3.0.1.2. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://hackerone.com/reports/1399856 - https://www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-6505.
CVE ID: CVE-2008-6505 Date Updated: 2024-08-07T11:34:46.741Z Date Published: 2009-03-23T14:00:00 Description: Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://issues.apache.org/struts/browse/WW-2779 - http://struts.apache.org/2.x/docs/s2-004.html - http://www.vupen.com/english/advisories/2008/3003 - http://secunia.com/advisories/32497 - http://www.securityfocus.com/bid/32104 - http://osvdb.org/49733 - http://osvdb.org/49734 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2018-2208.
CVE ID: CVE-2018-2208 Date Updated: 2019-01-22T17:57:02 Date Published: 2019-01-22T20:00:00 Description: N/A No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. No references are available for this vulnerability. No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2017-18692.
CVE ID: CVE-2017-18692 Date Updated: 2024-08-05T21:28:55.953Z Date Published: 2020-04-07T14:01:19 Description: An issue was discovered on Samsung mobile devices with M(6.0) and N(7.0) (MSM8939, MSM8996, MSM8998, Exynos7580, Exynos8890, or Exynos8895 chipsets) software. There is a race condition, with a resultant buffer overflow, in the sec_ts touchscreen sysfs interface. The Samsung ID is SVE-2016-7501 (January 2017). No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://security.samsungmobile.com/securityUpdate.smsb No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24389.
CVE ID: CVE-2023-24389 Date Updated: 2024-09-25T15:15:39.341Z Date Published: 2023-08-10T09:01:02.006Z Description: Auth. (admin+) Stored Cross-Site Scripting (XSS) vulnerability in brandiD Social Proof (Testimonial) Slider plugin <= 2.2.3 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/social-proof-testimonials-slider/wordpress-social-proof-testimonial-slider-plugin-2-2-3-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5495.
CVE ID: CVE-2008-5495 Date Updated: 2024-08-07T10:56:47.129Z Date Published: 2008-12-12T16:00:00 Description: Unspecified vulnerability in the GungHo LoadPrgAx ActiveX control 1.0.0.6 and earlier allows remote attackers to execute arbitrary Java applications via unknown vectors. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://gungho.jp/ - http://secunia.com/advisories/32743 - https://exchange.xforce.ibmcloud.com/vulnerabilities/46623 - http://jvn.jp/en/jp/JVN47875752/index.html - http://www.securityfocus.com/bid/32318 - http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000077.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-27397.
CVE ID: CVE-2023-27397 Date Updated: 2024-08-02T12:09:43.367Z Date Published: 2023-05-23T00:00:00 Description: Unrestricted upload of file with dangerous type exists in MicroEngine Mailform version 1.1.0 to 1.1.8. If the product's file upload function and server save option are enabled, a remote attacker may save an arbitrary file on the server and execute it. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://microengine.jp/information/security_2023_05.html - https://jvn.jp/en/jp/JVN31701509/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-24402.
CVE ID: CVE-2023-24402 Date Updated: 2024-08-02T10:56:03.810Z Date Published: 2023-04-07T08:48:19.936Z Description: Auth. (admin+) Cross-Site Scripting (XSS) vulnerability in Veribo, Roland Murg WP Booking System – Booking Calendar plugin <= 2.0.18 versions. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/wp-booking-system/wordpress-wp-booking-system-booking-calendar-plugin-2-0-18-cross-site-scripting-xss-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-7546.
CVE ID: CVE-2024-7546 Date Updated: 2024-08-06T13:45:57.935Z Date Published: 2024-08-05T23:54:11.442Z Description: oFono SimToolKit Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected installations of oFono. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability. The specific flaw exists within the parsing of STK command PDUs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-23459. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.zerodayinitiative.com/advisories/ZDI-24-1086/ No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-44875.
CVE ID: CVE-2022-44875 Date Updated: 2024-08-03T14:01:31.462Z Date Published: 2023-03-06T00:00:00 Description: KioWare through 8.33 on Windows sets KioScriptingUrlACL.AclActions.AllowHigh for the about:blank origin, which allows attackers to obtain SYSTEM access via KioUtils.Execute in JavaScript code. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.kioware.com/versionhistory.aspx?pid=15 - https://github.com/olnor18/writeup/tree/master/CVE/CVE-2022-44875 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-10500.
CVE ID: CVE-2019-10500 Date Updated: 2024-08-04T22:24:18.523Z Date Published: 2019-12-18T05:25:41 Description: While processing MT Secondary PDP request, Buffer overflow will happen due to incorrect calculation of buffer size in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables in APQ8009, APQ8017, APQ8053, APQ8096, APQ8096AU, APQ8098, MDM9150, MDM9205, MDM9206, MDM9607, MDM9625, MDM9635M, MDM9640, MDM9645, MDM9650, MDM9655, MSM8905, MSM8909, MSM8909W, MSM8917, MSM8920, MSM8937, MSM8939, MSM8940, MSM8953, MSM8996AU, MSM8998, Nicobar, QCM2150, QCS605, QM215, SC8180X, SDA660, SDA845, SDM429, SDM439, SDM450, SDM630, SDM632, SDM636, SDM660, SDM670, SDM710, SDM845, SDM850, SDX20, SDX24, SDX55, SM6150, SM7150, SM8150, SXR1130 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.qualcomm.com/company/product-security/bulletins/december-2019-bulletin No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-22727.
CVE ID: CVE-2022-22727 Date Updated: 2024-08-03T03:21:48.895Z Date Published: 2022-02-04T22:29:38 Description: A CWE-20: Improper Input Validation vulnerability exists that could allow an unauthenticated attacker to view data, change settings, impact availability of the software, or potentially impact a user�s local machine when the user clicks a specially crafted link. Affected Product: EcoStruxure Power Monitoring Expert (Versions 2020 and prior) No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2022-011-07 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2022-48878.
CVE ID: CVE-2022-48878 Date Updated: 2024-09-12T17:32:53.074Z Date Published: 2024-08-21T06:10:09.418Z Description: In the Linux kernel, the following vulnerability has been resolved: Bluetooth: hci_qca: Fix driver shutdown on closed serdev The driver shutdown callback (which sends EDL_SOC_RESET to the device over serdev) should not be invoked when HCI device is not open (e.g. if hci_dev_open_sync() failed), because the serdev and its TTY are not open either. Also skip this step if device is powered off (qca_power_shutdown()). The shutdown callback causes use-after-free during system reboot with Qualcomm Atheros Bluetooth: Unable to handle kernel paging request at virtual address 0072662f67726fd7 ... CPU: 6 PID: 1 Comm: systemd-shutdow Tainted: G W 6.1.0-rt5-00325-g8a5f56bcfcca #8 Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT) Call trace: tty_driver_flush_buffer+0x4/0x30 serdev_device_write_flush+0x24/0x34 qca_serdev_shutdown+0x80/0x130 [hci_uart] device_shutdown+0x15c/0x260 kernel_restart+0x48/0xac KASAN report: BUG: KASAN: use-after-free in tty_driver_flush_buffer+0x1c/0x50 Read of size 8 at addr ffff16270c2e0018 by task systemd-shutdow/1 CPU: 7 PID: 1 Comm: systemd-shutdow Not tainted 6.1.0-next-20221220-00014-gb85aaf97fb01-dirty #28 Hardware name: Qualcomm Technologies, Inc. Robotics RB5 (DT) Call trace: dump_backtrace.part.0+0xdc/0xf0 show_stack+0x18/0x30 dump_stack_lvl+0x68/0x84 print_report+0x188/0x488 kasan_report+0xa4/0xf0 __asan_load8+0x80/0xac tty_driver_flush_buffer+0x1c/0x50 ttyport_write_flush+0x34/0x44 serdev_device_write_flush+0x48/0x60 qca_serdev_shutdown+0x124/0x274 device_shutdown+0x1e8/0x350 kernel_restart+0x48/0xb0 __do_sys_reboot+0x244/0x2d0 __arm64_sys_reboot+0x54/0x70 invoke_syscall+0x60/0x190 el0_svc_common.constprop.0+0x7c/0x160 do_el0_svc+0x44/0xf0 el0_svc+0x2c/0x6c el0t_64_sync_handler+0xbc/0x140 el0t_64_sync+0x190/0x194 No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://git.kernel.org/stable/c/e84ec6e25df9bb0968599e92eacedaf3a0a5b587 - https://git.kernel.org/stable/c/908d1742b6e694e84ead5c62e4b7c1bfbb8b46a3 - https://git.kernel.org/stable/c/ea3ebda47dd56f6e1c62f2e0e1b6e1b0a973e447 - https://git.kernel.org/stable/c/272970be3dabd24cbe50e393ffee8f04aec3b9a8 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2020-3556.
CVE ID: CVE-2020-3556 Date Updated: 2024-09-16T19:30:40.676Z Date Published: 2020-11-06T18:16:22.303918Z Description: A vulnerability in the interprocess communication (IPC) channel of Cisco AnyConnect Secure Mobility Client Software could allow an authenticated, local attacker to cause a targeted AnyConnect user to execute a malicious script. The vulnerability is due to a lack of authentication to the IPC listener. An attacker could exploit this vulnerability by sending crafted IPC messages to the AnyConnect client IPC listener. A successful exploit could allow an attacker to cause the targeted AnyConnect user to execute a script. This script would execute with the privileges of the targeted AnyConnect user. In order to successfully exploit this vulnerability, there must be an ongoing AnyConnect session by the targeted user at the time of the attack. To exploit this vulnerability, the attacker would also need valid user credentials on the system upon which the AnyConnect client is being run. Cisco has not released software updates that address this vulnerability. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-anyconnect-ipc-KfQO9QhK No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-28723.
CVE ID: CVE-2023-28723 Date Updated: 2024-08-30T15:17:07.509Z Date Published: 2023-11-14T19:04:52.898Z Description: Exposure of sensitive information to an unauthorized actor in some Intel(R) Aptio* V UEFI Firmware Integrator Tools may allow an authenticated user to potentially enable information disclosure via local access. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00908.html No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2023-43345.
CVE ID: CVE-2023-43345 Date Updated: 2024-09-12T19:54:18.731Z Date Published: 2023-10-19T00:00:00 Description: Cross-site scripting (XSS) vulnerability in opensolution Quick CMS v.6.7 allows a local attacker to execute arbitrary code via a crafted script to the Content - Name parameter in the Pages Menu component. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/sromanhu/CVE-2023-43345-Quick-CMS-Stored-XSS---Pages-Content No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-5877.
CVE ID: CVE-2008-5877 Date Updated: 2024-08-07T11:13:13.120Z Date Published: 2009-01-08T19:00:00 Description: Multiple SQL injection vulnerabilities in Phpclanwebsite (aka PCW) 1.23.3 Fix Pack 5 and earlier, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the (1) page parameter to index.php, (2) form_id parameter to pcw/processforms.php, (3) pcwlogin and (4) pcw_pass parameters to pcw/setlogin.php, (5) searchvalue parameter to pcw/downloads.php, and the (6) searchvalue and (7) whichfield parameter to pcw/downloads.php, a different vector than CVE-2006-0444. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://securityreason.com/securityalert/4881 - https://www.exploit-db.com/exploits/7515 - http://secunia.com/advisories/33211 - http://www.securityfocus.com/bid/32915 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2008-4532.
CVE ID: CVE-2008-4532 Date Updated: 2024-08-07T10:17:09.806Z Date Published: 2008-10-09T18:00:00 Description: Cross-site scripting (XSS) vulnerability in index.php in MaxiScript Website Directory allows remote attackers to inject arbitrary web script or HTML via the keyword parameter in a search action. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://secunia.com/advisories/32176 - http://securityreason.com/securityalert/4393 - http://www.securityfocus.com/archive/1/496967/100/0/threaded - https://exchange.xforce.ibmcloud.com/vulnerabilities/45657 - http://www.securityfocus.com/bid/31562 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2019-17505.
CVE ID: CVE-2019-17505 Date Updated: 2024-08-05T01:40:15.914Z Date Published: 2019-10-11T19:28:39 Description: D-Link DAP-1320 A2-V1.21 routers have some web interfaces without authentication requirements, as demonstrated by uplink_info.xml. An attacker can remotely obtain a user's Wi-Fi SSID and password, which could be used to connect to Wi-Fi or perform a dictionary attack. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://github.com/dahua966/Routers-vuls/blob/master/DAP-1320/vuls_poc.md No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2024-32112.
CVE ID: CVE-2024-32112 Date Updated: 2024-08-08T16:12:18.358Z Date Published: 2024-04-11T12:01:39.193Z Description: Cross-Site Request Forgery (CSRF) vulnerability in Leadinfo leadinfo. The patch was released under the same version which was reported as vulnerable. We consider the current version as vulnerable.This issue affects Leadinfo: from n/a through 1.0. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - https://patchstack.com/database/vulnerability/leadinfo/wordpress-leadinfo-plugin-1-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
Provide detailed information about CVE-2009-4925.
CVE ID: CVE-2009-4925 Date Updated: 2024-08-07T07:24:52.788Z Date Published: 2010-07-09T17:00:00 Description: Multiple SQL injection vulnerabilities in Portale e-commerce Creasito (aka creasito e-commerce content manager) 1.3.16, when magic_quotes_gpc is disabled, allow remote attackers to execute arbitrary SQL commands via the username parameter to (1) admin/checkuser.php and (2) checkuser.php. No CVSS information is available for this vulnerability. No Common Weakness Enumerations (CWEs) are associated with this vulnerability. References: - http://www.securityfocus.com/archive/1/502818/100/0/threaded - http://www.exploit-db.com/exploits/8497 - http://secunia.com/advisories/34809 - http://www.securityfocus.com/bid/34605 No related CVEs are listed for this vulnerability. No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.