instruction
stringlengths 49
63
⌀ | input
stringlengths 0
69
| output
stringlengths 221
18.7k
|
|---|---|---|
Provide detailed information about CVE-2011-1535.
|
CVE ID: CVE-2011-1535
Date Updated: 2024-08-06T22:28:42.067Z
Date Published: 2011-04-29T22:00:00
Description:
Unspecified vulnerability in HP Insight Control for Linux (aka IC-Linux) before 6.3 allows remote authenticated users to obtain sensitive information, modify data, or cause a denial of service via unknown vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/47716
- https://exchange.xforce.ibmcloud.com/vulnerabilities/66867
- http://securitytracker.com/id?1025413
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c02794777
- http://secunia.com/advisories/44269
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-34435.
|
CVE ID: CVE-2022-34435
Date Updated: 2024-08-03T09:07:16.249Z
Date Published: 2023-01-18T11:07:45.399Z
Description:
Dell iDRAC9 version 6.00.02.00 and prior contain an improper input validation vulnerability in Racadm when the firmware lock-down configuration is set. A remote high privileged attacker could exploit this vulnerability to bypass the firmware lock-down configuration and perform a firmware update.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.dell.com/support/kbdoc/000205346
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-32978.
|
CVE ID: CVE-2022-32978
Date Updated: 2024-08-03T07:54:03.443Z
Date Published: 2022-06-10T14:49:06
Description:
There is an assertion failure in SingleComponentLSScan::ParseMCU in singlecomponentlsscan.cpp in libjpeg before 1.64 via an empty JPEG-LS scan.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/thorfdbg/libjpeg/issues/75
- https://github.com/thorfdbg/libjpeg/commit/4746b577931e926a49e50de9720a4946de3069a7
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-29362.
|
CVE ID: CVE-2022-29362
Date Updated: 2024-08-03T06:17:55.018Z
Date Published: 2022-05-25T00:01:06
Description:
A cross-site scripting (XSS) vulnerability in /navigation/create?ParentID=%23 of ZKEACMS v3.5.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the ParentID parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/SeriaWei/ZKEACMS/issues/457
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-2905.
|
CVE ID: CVE-2017-2905
Date Updated: 2024-09-16T22:25:11.124Z
Date Published: 2018-04-24T19:00:00Z
Description:
An exploitable integer overflow exists in the bmp loading functionality of the Blender open-source 3d creation suite version 2.78c. A specially crafted '.bmp' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset via the sequencer in order to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html
- https://www.debian.org/security/2018/dsa-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0412
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2008-0536.
|
CVE ID: CVE-2008-0536
Date Updated: 2024-08-07T07:46:55.108Z
Date Published: 2008-05-22T10:00:00
Description:
Unspecified vulnerability in the SSH server in (1) Cisco Service Control Engine (SCE) 3.0.x before 3.0.7 and 3.1.x before 3.1.0, and (2) Icon Labs Iconfidant SSH before 2.3.8, allows remote attackers to cause a denial of service (management interface outage) via SSH traffic that occurs during management operations and triggers "illegal I/O operations," aka Bug ID CSCsh49563.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://secunia.com/advisories/30316
- http://www.vupen.com/english/advisories/2008/1774/references
- http://secunia.com/advisories/30590
- http://www.securityfocus.com/bid/29609
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42566
- http://www.kb.cert.org/vuls/id/626979
- http://www.icon-labs.com/news/read.asp?newsID=77
- http://www.cisco.com/en/US/products/products_security_advisory09186a008099bf65.shtml
- http://securitytracker.com/id?1020074
- http://www.securityfocus.com/bid/29316
- http://www.vupen.com/english/advisories/2008/1604/references
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-24928.
|
CVE ID: CVE-2022-24928
Date Updated: 2024-08-03T04:29:01.666Z
Date Published: 2022-03-08T13:46:13
Description:
Security misconfiguration of RKP in kernel prior to SMR Mar-2022 Release 1 allows a system not to be protected by RKP.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb?year=2022&month=3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-4041.
|
CVE ID: CVE-2017-4041
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-30289.
|
CVE ID: CVE-2021-30289
Date Updated: 2024-08-03T22:32:41.007Z
Date Published: 2022-01-03T07:26:00
Description:
Possible buffer overflow due to lack of range check while processing a DIAG command for COEX management in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/december-2021-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-9152.
|
CVE ID: CVE-2019-9152
Date Updated: 2024-09-16T17:28:10.857Z
Date Published: 2019-02-25T19:00:00Z
Description:
An issue was discovered in the HDF HDF5 1.10.4 library. There is an out of bounds read in the function H5MM_xstrdup in H5MM.c when called from H5O_dtype_decode_helper in H5Odtype.c.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/magicSwordsMan/PAAFS/tree/master/vul8
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-2831.
|
CVE ID: CVE-2024-2831
Date Updated: 2024-08-01T19:25:42.162Z
Date Published: 2024-05-02T16:51:43.560Z
Description:
The Calendar plugin for WordPress is vulnerable to SQL Injection via the plugin's shortcodes in all versions up to, and including, 1.3.14 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with contributor access or higher, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0886fa16-4292-4223-af01-9aa1f36490f7?source=cve
- https://wordpress.org/plugins/calendar/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2012-4223.
|
CVE ID: CVE-2012-4223
Date Updated: 2024-09-17T03:03:07.526Z
Date Published: 2013-03-19T18:00:00Z
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-7104.
|
CVE ID: CVE-2020-7104
Date Updated: 2024-08-04T09:18:03.073Z
Date Published: 2020-01-17T22:10:48
Description:
The chained-quiz plugin 1.1.8.1 for WordPress has reflected XSS via the wp-admin/admin-ajax.php total_questions parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpvulndb.com/vulnerabilities/10029
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-1000882.
|
CVE ID: CVE-2018-1000882
Date Updated: 2024-09-17T00:56:34.208Z
Date Published: 2018-12-20T17:00:00Z
Description:
WeBid version up to current version 1.2.2 contains a Directory Traversal vulnerability in getthumb.php that can result in Arbitrary Image File Read. This attack appear to be exploitable via HTTP GET Request. This vulnerability appears to have been fixed in after commit 256a5f9d3eafbc477dcf77c7682446cc4b449c7f.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://telekomsecurity.github.io/assets/advisories/20181108_WeBid_Multiple_Vulnerabilities.txt
- http://bugs.webidsupport.com/view.php?id=646
- https://github.com/renlok/WeBid/commit/256a5f9d3eafbc477dcf77c7682446cc4b449c7f
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-35922.
|
CVE ID: CVE-2020-35922
Date Updated: 2024-08-04T17:16:13.238Z
Date Published: 2020-12-31T08:17:30
Description:
An issue was discovered in the mio crate before 0.7.6 for Rust. It has false expectations about the std::net::SocketAddr memory representation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://rustsec.org/advisories/RUSTSEC-2020-0081.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-20089.
|
CVE ID: CVE-2024-20089
Date Updated: 2024-09-03T14:14:40.888Z
Date Published: 2024-09-02T02:07:37.971Z
Description:
In wlan, there is a possible denial of service due to incorrect error handling. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08861558; Issue ID: MSV-1526.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://corp.mediatek.com/product-security-bulletin/September-2024
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-42617.
|
CVE ID: CVE-2024-42617
Date Updated: 2024-08-20T16:10:42.766Z
Date Published: 2024-08-20T00:00:00
Description:
Pligg CMS v2.0.2 was discovered to contain a Cross-Site Request Forgery (CSRF) vulnerability via /admin/admin_config.php?action=save&var_id=32
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/jinwu1234567890/cms2/tree/main/11/readme.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-5304.
|
CVE ID: CVE-2011-5304
Date Updated: 2024-09-16T20:42:43.281Z
Date Published: 2015-01-01T11:00:00Z
Description:
Multiple cross-site scripting (XSS) vulnerabilities in the Sodahead Polls plugin before 2.0.4 for WordPress allow remote attackers to inject arbitrary web script or HTML via (1) the poll_id parameter to customizer.php or (2) the customize parameter to poll.php.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/sodahead-polls/changelog/
- https://www.htbridge.com/advisory/HTB22893
- https://www.htbridge.com/advisory/HTB22894
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-44436.
|
CVE ID: CVE-2022-44436
Date Updated: 2024-08-03T13:54:03.937Z
Date Published: 2023-01-04T00:00:00
Description:
In messaging service, there is a missing permission check. This could lead to local denial of service in contacts service with no additional execution privileges needed.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.unisoc.com/en_us/secy/announcementDetail/1610118225591336001
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-2906.
|
CVE ID: CVE-2017-2906
Date Updated: 2024-09-17T03:23:35.210Z
Date Published: 2018-04-24T19:00:00Z
Description:
An exploitable integer overflow exists in the animation playing functionality of the Blender open-source 3d creation suite version 2.78c. A specially created '.avi' file can cause an integer overflow resulting in a buffer overflow which can allow for code execution under the context of the application. An attacker can convince a user to use the file as an asset in order to trigger this vulnerability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://lists.debian.org/debian-lts-announce/2018/08/msg00011.html
- https://www.debian.org/security/2018/dsa-4248
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0413
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-5982.
|
CVE ID: CVE-2020-5982
Date Updated: 2024-08-04T08:47:40.938Z
Date Published: 2020-10-02T18:15:19
Description:
NVIDIA Windows GPU Display Driver, all versions, contains a vulnerability in the kernel mode layer (nvlddmkm.sys) scheduler, in which the software does not properly limit the number or frequency of interactions that it has with an actor, such as the number of incoming requests, which may lead to denial of service.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://nvidia.custhelp.com/app/answers/detail/a_id/5075
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-10056.
|
CVE ID: CVE-2017-10056
Date Updated: 2024-08-05T17:25:00.867Z
Date Published: 2017-08-08T15:00:00
Description:
Vulnerability in the Oracle Hospitality 9700 component of Oracle Hospitality Applications (subcomponent: Property Management Systems). The supported version that is affected is 4.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Hospitality 9700 executes to compromise Oracle Hospitality 9700. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Hospitality 9700 accessible data. CVSS 3.0 Base Score 5.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1038941
- http://www.securityfocus.com/bid/99826
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2011-4408.
|
CVE ID: CVE-2011-4408
Date Updated: 2024-08-07T00:09:18.319Z
Date Published: 2012-06-16T00:00:00
Description:
The Single Sign On Client (ubuntu-sso-client) for Ubuntu 11.04 and 11.10 does not properly validate SSL certificates when using HTTPS, which allows remote attackers to spoof a server and modify or read sensitive data via a man-in-the-middle (MITM) attack.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/76112
- http://www.ubuntu.com/usn/USN-1464-1
- http://osvdb.org/82747
- http://www.securityfocus.com/bid/53829
- http://secunia.com/advisories/49448
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-15868.
|
CVE ID: CVE-2018-15868
Date Updated: 2024-08-05T10:10:04.563Z
Date Published: 2019-06-21T13:01:13
Description:
SQL injection vulnerability in ChronoScan version 1.5.4.3 and earlier allows an unauthenticated attacker to execute arbitrary SQL commands via the wcr_machineid cookie.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.chronoscan.org
- https://redsec.io/chronoscan-enterprise-unauthenticated-sql-injection
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-10939.
|
CVE ID: CVE-2018-10939
Date Updated: 2024-08-05T07:54:35.796Z
Date Published: 2018-05-30T21:00:00
Description:
Zimbra Web Client (ZWC) in Zimbra Collaboration Suite 8.8 before 8.8.8.Patch4 and 8.7 before 8.7.11.Patch4 has Persistent XSS via a contact group.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wiki.zimbra.com/wiki/Security_Center
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.8/P4
- https://blog.zimbra.com/2018/05/new-zimbra-patches-8-8-8-patch-4-and-8-7-11-patch-4/
- https://wiki.zimbra.com/wiki/Zimbra_Releases/8.7.11/P4
- https://wiki.zimbra.com/wiki/Zimbra_Security_Advisories
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-4351.
|
CVE ID: CVE-2018-4351
Date Updated: 2024-08-05T05:11:22.714Z
Date Published: 2019-04-03T17:43:16
Description:
A memory initialization issue was addressed with improved memory handling. This issue affected versions prior to macOS Mojave 10.14.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/kb/HT209139
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-24482.
|
CVE ID: CVE-2021-24482
Date Updated: 2024-08-03T19:35:19.579Z
Date Published: 2021-07-19T10:53:19
Description:
The Related Posts for WordPress plugin through 2.0.4 does not sanitise its heading_text and CSS settings, allowing high privilege users (admin) to set XSS payloads in them, leading to Stored Cross-Site Scripting issues.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/2f86e418-22fd-4cb8-8de1-062b17cf20a7
- https://m0ze.ru/vulnerability/%5B2021-04-18%5D-%5BWordPress%5D-%5BCWE-79%5D-Related-Posts-for-WordPress-WordPress-Plugin-v2.0.4.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-35886.
|
CVE ID: CVE-2024-35886
Date Updated: 2024-08-02T03:21:48.390Z
Date Published: 2024-05-19T08:34:42.694Z
Description:
In the Linux kernel, the following vulnerability has been resolved:
ipv6: Fix infinite recursion in fib6_dump_done().
syzkaller reported infinite recursive calls of fib6_dump_done() during
netlink socket destruction. [1]
From the log, syzkaller sent an AF_UNSPEC RTM_GETROUTE message, and then
the response was generated. The following recvmmsg() resumed the dump
for IPv6, but the first call of inet6_dump_fib() failed at kzalloc() due
to the fault injection. [0]
12:01:34 executing program 3:
r0 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r0, ... snip ...)
recvmmsg(r0, ... snip ...) (fail_nth: 8)
Here, fib6_dump_done() was set to nlk_sk(sk)->cb.done, and the next call
of inet6_dump_fib() set it to nlk_sk(sk)->cb.args[3]. syzkaller stopped
receiving the response halfway through, and finally netlink_sock_destruct()
called nlk_sk(sk)->cb.done().
fib6_dump_done() calls fib6_dump_end() and nlk_sk(sk)->cb.done() if it
is still not NULL. fib6_dump_end() rewrites nlk_sk(sk)->cb.done() by
nlk_sk(sk)->cb.args[3], but it has the same function, not NULL, calling
itself recursively and hitting the stack guard page.
To avoid the issue, let's set the destructor after kzalloc().
[0]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 PID: 432110 Comm: syz-executor.3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Call Trace:
<TASK>
dump_stack_lvl (lib/dump_stack.c:117)
should_fail_ex (lib/fault-inject.c:52 lib/fault-inject.c:153)
should_failslab (mm/slub.c:3733)
kmalloc_trace (mm/slub.c:3748 mm/slub.c:3827 mm/slub.c:3992)
inet6_dump_fib (./include/linux/slab.h:628 ./include/linux/slab.h:749 net/ipv6/ip6_fib.c:662)
rtnl_dump_all (net/core/rtnetlink.c:4029)
netlink_dump (net/netlink/af_netlink.c:2269)
netlink_recvmsg (net/netlink/af_netlink.c:1988)
____sys_recvmsg (net/socket.c:1046 net/socket.c:2801)
___sys_recvmsg (net/socket.c:2846)
do_recvmmsg (net/socket.c:2943)
__x64_sys_recvmmsg (net/socket.c:3041 net/socket.c:3034 net/socket.c:3034)
[1]:
BUG: TASK stack guard page was hit at 00000000f2fa9af1 (stack is 00000000b7912430..000000009a436beb)
stack guard page: 0000 [#1] PREEMPT SMP KASAN
CPU: 1 PID: 223719 Comm: kworker/1:3 Not tainted 6.8.0-12821-g537c2e91d354-dirty #11
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Workqueue: events netlink_sock_destruct_work
RIP: 0010:fib6_dump_done (net/ipv6/ip6_fib.c:570)
Code: 3c 24 e8 f3 e9 51 fd e9 28 fd ff ff 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 41 57 41 56 41 55 41 54 55 48 89 fd <53> 48 8d 5d 60 e8 b6 4d 07 fd 48 89 da 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc9000d980000 EFLAGS: 00010293
RAX: 0000000000000000 RBX: ffffffff84405990 RCX: ffffffff844059d3
RDX: ffff8881028e0000 RSI: ffffffff84405ac2 RDI: ffff88810c02f358
RBP: ffff88810c02f358 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000224 R12: 0000000000000000
R13: ffff888007c82c78 R14: ffff888007c82c68 R15: ffff888007c82c68
FS: 0000000000000000(0000) GS:ffff88811b100000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d97fff8 CR3: 0000000102309002 CR4: 0000000000770ef0
PKRU: 55555554
Call Trace:
<#DF>
</#DF>
<TASK>
fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
...
fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
fib6_dump_done (net/ipv6/ip6_fib.c:572 (discriminator 1))
netlink_sock_destruct (net/netlink/af_netlink.c:401)
__sk_destruct (net/core/sock.c:2177 (discriminator 2))
sk_destruct (net/core/sock.c:2224)
__sk_free (net/core/sock.c:2235)
sk_free (net/core/sock.c:2246)
process_one_work (kernel/workqueue.c:3259)
worker_thread (kernel/workqueue.c:3329 kernel/workqueue.
---truncated---
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/stable/c/9472d07cd095cbd3294ac54c42f304a38fbe9bfe
- https://git.kernel.org/stable/c/9c5258196182c25b55c33167cd72fdd9bbf08985
- https://git.kernel.org/stable/c/fd307f2d91d40fa7bc55df3e2cd1253fabf8a2d6
- https://git.kernel.org/stable/c/40a344b2ddc06c1a2caa7208a43911f39c662778
- https://git.kernel.org/stable/c/167d4b47a9bdcb01541dfa29e9f3cbb8edd3dfd2
- https://git.kernel.org/stable/c/f2dd75e57285f49e34af1a5b6cd8945c08243776
- https://git.kernel.org/stable/c/4a7c465a5dcd657d59d25bf4815e19ac05c13061
- https://git.kernel.org/stable/c/d21d40605bca7bd5fc23ef03d4c1ca1f48bc2cae
- https://lists.debian.org/debian-lts-announce/2024/06/msg00017.html
- https://lists.debian.org/debian-lts-announce/2024/06/msg00020.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-7672.
|
CVE ID: CVE-2015-7672
Date Updated: 2024-08-06T07:58:59.937Z
Date Published: 2017-09-07T20:00:00
Description:
Cross-site scripting (XSS) vulnerability in Centreon 2.6.1 (fixed in Centreon 18.10.0 and Centreon web 2.8.27).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.youtube.com/watch?v=sIONzwQAngU
- https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-18.10/centreon-18.10.0.html
- https://documentation.centreon.com/docs/centreon/en/latest/release_notes/centreon-2.8/centreon-2.8.27.html
- https://github.com/centreon/centreon/pull/6953
- https://github.com/centreon/centreon/pull/6637
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-5116.
|
CVE ID: CVE-2024-5116
Date Updated: 2024-08-01T21:03:10.921Z
Date Published: 2024-05-20T04:00:04.041Z
Description:
A vulnerability, which was classified as critical, has been found in SourceCodester Online Examination System 1.0. Affected by this issue is some unknown functionality of the file save.php. The manipulation of the argument vote leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-265196.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.265196
- https://vuldb.com/?ctiid.265196
- https://vuldb.com/?submit.338578
- https://github.com/polaris0x1/CVE/issues/3
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-31121.
|
CVE ID: CVE-2022-31121
Date Updated: 2024-08-03T07:11:39.115Z
Date Published: 2022-07-07T18:00:14
Description:
Hyperledger Fabric is a permissioned distributed ledger framework. In affected versions if a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. A fix has been added in commit 0f1835949 which checks for missing consensus messages and returns an error to the consensus client should the message be missing. Users are advised to upgrade to versions 2.2.7 or v2.4.5. There are no known workarounds for this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p
- https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06
- https://github.com/hyperledger/fabric/releases/tag/v2.2.7
- https://github.com/hyperledger/fabric/releases/tag/v2.4.5
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-2902.
|
CVE ID: CVE-2018-2902
Date Updated: 2024-10-02T19:47:17.802Z
Date Published: 2018-10-17T01:00:00
Description:
Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Console). Supported versions that are affected are 10.3.6.0 and 12.1.3.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle WebLogic Server accessible data. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/105654
- http://www.securitytracker.com/id/1041896
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-9723.
|
CVE ID: CVE-2020-9723
Date Updated: 2024-08-04T10:43:04.326Z
Date Published: 2020-08-19T14:15:51
Description:
Adobe Acrobat and Reader versions 2020.009.20074 and earlier, 2020.001.30002, 2017.011.30171 and earlier, and 2015.006.30523 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/acrobat/apsb20-48.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-1000024.
|
CVE ID: CVE-2018-1000024
Date Updated: 2024-08-05T12:33:48.901Z
Date Published: 2018-02-09T23:00:00
Description:
The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://usn.ubuntu.com/3557-1/
- https://www.debian.org/security/2018/dsa-4122
- http://www.squid-cache.org/Versions/
- https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
- http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
- https://usn.ubuntu.com/4059-2/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-3617.
|
CVE ID: CVE-2013-3617
Date Updated: 2024-09-17T02:36:55.070Z
Date Published: 2013-11-02T19:00:00Z
Description:
The XML API in Openbravo ERP 2.5, 3.0, and earlier allows remote authenticated users to read arbitrary files via an XML document with an external entity declaration in conjunction with an entity reference to /ws/dal/ADUser or other /ws/dal/XXX interfaces, related to an XML External Entity (XXE) issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats
- http://www.kb.cert.org/vuls/id/533894
- http://www.securityfocus.com/bid/63431
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-12996.
|
CVE ID: CVE-2020-12996
Date Updated: 2021-06-11T21:51:13
Date Published: 2021-06-11T21:51:13
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-1321.
|
CVE ID: CVE-2014-1321
Date Updated: 2024-08-06T09:34:41.147Z
Date Published: 2014-04-23T10:00:00
Description:
Power Management in Apple OS X 10.9.x through 10.9.2 allows physically proximate attackers to bypass an intended transition into the locked-screen state by touching (1) a key or (2) the trackpad during a lid-close action.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://archives.neohapsis.com/archives/bugtraq/2014-04/0134.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-8571.
|
CVE ID: CVE-2024-8571
Date Updated: 2024-09-09T14:55:49.858Z
Date Published: 2024-09-08T07:31:04.205Z
Description:
A vulnerability was found in erjemin roll_cms up to 1484fe2c4e0805946a7bcf46218509fcb34883a9. It has been classified as problematic. This affects an unknown part of the file roll_cms/roll_cms/views.py. The manipulation leads to information exposure through error message. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://vuldb.com/?id.276801
- https://vuldb.com/?ctiid.276801
- https://vuldb.com/?submit.400796
- https://github.com/erjemin/roll_cms/issues/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-30294.
|
CVE ID: CVE-2021-30294
Date Updated: 2024-08-03T22:32:40.288Z
Date Published: 2021-09-09T07:36:10
Description:
Potential null pointer dereference in KGSL GPU auxiliary command due to improper validation of user input in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.qualcomm.com/company/product-security/bulletins/september-2021-bulletin
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-20262.
|
CVE ID: CVE-2021-20262
Date Updated: 2024-08-03T17:37:23.083Z
Date Published: 2021-03-09T17:19:20
Description:
A flaw was found in Keycloak 12.0.0 where re-authentication does not occur while updating the password. This flaw allows an attacker to take over an account if they can obtain temporary, physical access to a user’s browser. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://bugzilla.redhat.com/show_bug.cgi?id=1933639
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-1747.
|
CVE ID: CVE-2024-1747
Date Updated: 2024-08-01T14:24:07.026Z
Date Published: 2024-08-01T06:00:02.536Z
Description:
The WooCommerce Customers Manager WordPress plugin before 30.2 does not have authorisation and CSRF in various AJAX actions, allowing any authenticated users, such as subscriber, to call them and update/delete/create customer metadata, also leading to Stored Cross-Site Scripting due to the lack of escaping of said metadata values.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/17e45d4d-0ee1-4863-a8a4-df8587f448ec/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-30460.
|
CVE ID: CVE-2024-30460
Date Updated: 2024-08-02T01:32:07.519Z
Date Published: 2024-03-29T16:32:53.226Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in Tumult Inc Tumult Hype Animations.This issue affects Tumult Hype Animations: from n/a through 1.9.11.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/tumult-hype-animations/wordpress-tumult-hype-animations-plugin-1-9-11-cross-site-request-forgery-csrf-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-21627.
|
CVE ID: CVE-2022-21627
Date Updated: 2024-09-24T15:03:05.975Z
Date Published: 2022-10-18T00:00:00
Description:
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). Supported versions that are affected are Prior to 6.1.40. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuoct2022.html
- https://security.gentoo.org/glsa/202212-03
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-0301.
|
CVE ID: CVE-2020-0301
Date Updated: 2024-08-04T05:55:12.802Z
Date Published: 2020-09-17T20:57:08
Description:
In libstagefright, there is a possible resource exhaustion due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-124940460
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://source.android.com/security/bulletin/android-11
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-2152.
|
CVE ID: CVE-2016-2152
Date Updated: 2024-08-05T23:17:50.769Z
Date Published: 2016-05-22T20:00:00
Description:
Multiple cross-site scripting (XSS) vulnerabilities in auth/db/auth.php in Moodle through 2.6.11, 2.7.x before 2.7.13, 2.8.x before 2.8.11, 2.9.x before 2.9.5, and 3.0.x before 3.0.3 allow remote attackers to inject arbitrary web script or HTML via an external DB profile field.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-50705
- http://www.openwall.com/lists/oss-security/2016/03/21/1
- https://moodle.org/mod/forum/discuss.php?d=330174
- http://www.securitytracker.com/id/1035333
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-15711.
|
CVE ID: CVE-2017-15711
Date Updated: 2017-12-28T13:57:01
Date Published: 2017-12-28T14:00:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-41800.
|
CVE ID: CVE-2024-41800
Date Updated: 2024-08-02T04:46:52.695Z
Date Published: 2024-07-25T16:12:58.907Z
Description:
Craft is a content management system (CMS). Craft CMS 5 allows reuse of TOTP tokens multiple times within the validity period. An attacker is able to re-submit a valid TOTP token to establish an authenticated session. This requires that the attacker has knowledge of the victim's credentials. This has been patched in Craft 5.2.3.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/craftcms/cms/security/advisories/GHSA-wmx7-pw49-88jx
- https://github.com/craftcms/cms/commit/7c790fa5ad5a8cb8016cb6793ec3554c4c079e38
- https://github.com/craftcms/cms/releases/tag/5.2.3
- https://github.com/sbaresearch/advisories/tree/public/2024/SBA-ADV-20240617-01_CraftCMS_TOTP_Valid_After_Use
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-5646.
|
CVE ID: CVE-2017-5646
Date Updated: 2024-08-05T15:11:47.380Z
Date Published: 2017-05-26T21:00:00
Description:
For versions of Apache Knox from 0.2.0 to 0.11.0 - an authenticated user may use a specially crafted URL to impersonate another user while accessing WebHDFS through Apache Knox. This may result in escalated privileges and unauthorized data access. While this activity is audit logged and can be easily associated with the authenticated user, this is still a serious security issue. All users are recommended to upgrade to the Apache Knox 0.12.0 release.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://mail-archives.apache.org/mod_mbox/knox-user/201705.mbox/%3CCACRbFyjtT7QQGHUzTRdbJoySbJb7tt4BDk5-r-VRn0GB0Kgvag%40mail.gmail.com%3E
- http://www.securityfocus.com/bid/98739
- https://lists.apache.org/thread.html/rcd6bcbcc08840d4e4bea661efe9a5ef8f6126ebbbc5bc266701d8f48%40%3Cdev.logging.apache.org%3E
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-2860.
|
CVE ID: CVE-2019-2860
Date Updated: 2024-10-01T16:35:33.619Z
Date Published: 2019-07-23T22:31:51
Description:
Vulnerability in the Oracle Clusterware component of Oracle Support Tools (subcomponent: Trace File Analyzer (TFA) Collector). The supported version that is affected is 12.1.0.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Clusterware. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Clusterware accessible data as well as unauthorized read access to a subset of Oracle Clusterware accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Clusterware. CVSS 3.0 Base Score 5.6 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-5322.
|
CVE ID: CVE-2016-5322
Date Updated: 2024-08-06T01:01:00.232Z
Date Published: 2017-04-11T18:00:00
Description:
The setByteArray function in tif_dir.c in libtiff 4.0.6 and earlier allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted tiff image.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/91204
- http://www.securityfocus.com/bid/91205
- http://www.openwall.com/lists/oss-security/2016/06/15/2
- https://security.gentoo.org/glsa/201701-16
- https://bugzilla.redhat.com/show_bug.cgi?id=1346694
- http://www.debian.org/security/2017/dsa-3762
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-26878.
|
CVE ID: CVE-2022-26878
Date Updated: 2024-08-03T05:18:38.070Z
Date Published: 2022-03-11T06:22:01
Description:
drivers/bluetooth/virtio_bt.c in the Linux kernel before 5.16.3 has a memory leak (socket buffers have memory allocated but not freed).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1d0688421449718c6c5f46e458a378c9b530ba18
- https://lore.kernel.org/linux-bluetooth/1A203F5E-FB5E-430C-BEA3-86B191D69D58%40holtmann.org/
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.16.3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.17
- http://www.openwall.com/lists/oss-security/2022/03/11/1
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-4882.
|
CVE ID: CVE-2018-4882
Date Updated: 2024-08-05T05:18:26.661Z
Date Published: 2018-02-27T05:00:00
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the string literal parser. A successful attack can lead to sensitive data exposure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/102996
- https://helpx.adobe.com/security/products/acrobat/apsb18-02.html
- http://www.securitytracker.com/id/1040364
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the MITRE ATT&CK technique T1190
|
The MITRE ATT&CK technique T1190: Exploit Public-Facing Application is related to the vulnerability CVE-CVE-2020-3133. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as primary_impact.
|
Provide detailed information about CVE-2021-22492.
|
CVE ID: CVE-2021-22492
Date Updated: 2024-08-03T18:44:13.679Z
Date Published: 2021-01-05T17:54:52
Description:
An issue was discovered on Samsung mobile devices with O(8.x), P(9.0), and Q(10.0) (Broadcom Bluetooth chipsets) software. The Bluetooth UART driver has a buffer overflow. The Samsung ID is SVE-2020-18731 (January 2021).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.samsungmobile.com/securityUpdate.smsb
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-18694.
|
CVE ID: CVE-2018-18694
Date Updated: 2024-09-16T16:43:54.976Z
Date Published: 2018-10-26T20:00:00Z
Description:
admin/index.php?id=filesmanager in Monstra CMS 3.0.4 allows remote authenticated administrators to trigger stored XSS via JavaScript content in a file whose name lacks an extension. Such a file is interpreted as text/html in certain cases.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/monstra-cms/monstra/issues/459
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-36493.
|
CVE ID: CVE-2020-36493
Date Updated: 2024-08-04T17:30:08.045Z
Date Published: 2021-10-22T19:19:59
Description:
DedeCMS v7.5 SP2 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities in the component media_main.php via the `activepath`, `keyword`, `tag`, `fmdo=x&filename`, `CKEditor` and `CKEditorFuncNum` parameters.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.vulnerability-lab.com/get_content.php?id=2195
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-2359.
|
CVE ID: CVE-2017-2359
Date Updated: 2024-08-05T13:48:05.255Z
Date Published: 2017-02-20T08:35:00
Description:
An issue was discovered in certain Apple products. Safari before 10.0.3 is affected. The issue involves the "Safari" component, which allows remote attackers to spoof the address bar via a crafted web site.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1037669
- https://support.apple.com/HT207484
- http://www.securityfocus.com/bid/95724
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-0797.
|
CVE ID: CVE-2023-0797
Date Updated: 2024-08-02T05:24:34.516Z
Date Published: 2023-02-13T00:00:00
Description:
LibTIFF 4.4.0 has an out-of-bounds read in tiffcrop in libtiff/tif_unix.c:368, invoked by tools/tiffcrop.c:2903 and tools/tiffcrop.c:6921, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit afaabc3e.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://gitlab.com/libtiff/libtiff/-/commit/afaabc3e50d4e5d80a94143f7e3c997e7e410f68
- https://gitlab.com/libtiff/libtiff/-/issues/495
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0797.json
- https://lists.debian.org/debian-lts-announce/2023/02/msg00026.html
- https://www.debian.org/security/2023/dsa-5361
- https://security.gentoo.org/glsa/202305-31
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-31188.
|
CVE ID: CVE-2022-31188
Date Updated: 2024-08-03T07:11:39.732Z
Date Published: 2022-08-01T00:00:00
Description:
CVAT is an opensource interactive video and image annotation tool for computer vision. Versions prior to 2.0.0 were found to be subject to a Server-side request forgery (SSRF) vulnerability. Validation has been added to urls used in the affected code path in version 2.0.0. Users are advised to upgrade. There are no known workarounds for this issue.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/cvat-ai/cvat/security/advisories/GHSA-7vpj-j5xv-29pr
- https://github.com/cvat-ai/cvat/commit/6fad1764efd922d99dbcda28c4ee72d071aa5a07
- http://packetstormsecurity.com/files/169814/CVAT-2.0-Server-Side-Request-Forgery.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-3639.
|
CVE ID: CVE-2024-3639
Date Updated: 2024-08-01T20:19:59.635Z
Date Published: 2024-07-04T03:32:24.553Z
Description:
The Elementor Addons by Livemesh plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Posts Grid widget in all versions up to, and including, 8.3.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9729ccc9-e3f1-4096-8430-22998b386cec?source=cve
- https://wordpress.org/plugins/addons-for-elementor/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-36389.
|
CVE ID: CVE-2022-36389
Date Updated: 2024-09-16T16:13:52.351Z
Date Published: 2022-08-23T15:48:47.656737Z
Description:
Cross-Site Request Forgery (CSRF) vulnerability in WordPlus Better Messages plugin <= 1.9.9.148 at WordPress.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wordpress.org/plugins/bp-better-messages/#developers
- https://patchstack.com/database/vulnerability/bp-better-messages/wordpress-better-messages-plugin-1-9-9-148-cross-site-request-forgery-csrf-vulnerability-2
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-27281.
|
CVE ID: CVE-2024-27281
Date Updated: 2024-08-20T14:02:13.614Z
Date Published: N/A
Description:
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://hackerone.com/reports/1187477
- https://www.ruby-lang.org/en/news/2024/03/21/rce-rdoc-cve-2024-27281/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-40730.
|
CVE ID: CVE-2021-40730
Date Updated: 2024-09-16T23:21:57.335Z
Date Published: 2021-10-15T14:21:55.008741Z
Description:
Adobe Acrobat Reader DC version 21.007.20095 (and earlier), 21.007.20096 (and earlier), 20.004.30015 (and earlier), and 17.011.30202 (and earlier) is affected by a use-after-free that allow a remote attacker to disclose sensitive information on affected installations of of Adobe Acrobat Reader DC. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JPG2000 images.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/acrobat/apsb21-104.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-5207.
|
CVE ID: CVE-2018-5207
Date Updated: 2024-08-05T05:26:47.045Z
Date Published: 2018-01-06T16:00:00
Description:
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.debian.org/security/2018/dsa-4162
- https://irssi.org/security/irssi_sa_2018_01.txt
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-13603.
|
CVE ID: CVE-2018-13603
Date Updated: 2024-08-05T09:07:52.188Z
Date Published: 2018-07-09T06:00:00
Description:
The mintToken function of a smart contract implementation for Briant2Token, an Ethereum token, has an integer overflow that allows the owner of the contract to set the balance of an arbitrary user to any value.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/BlockChainsSecurity/EtherTokens/tree/master/Briant2Token
- https://github.com/BlockChainsSecurity/EtherTokens/blob/master/GEMCHAIN/mint%20integer%20overflow.md
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the MITRE ATT&CK technique T1078
|
The MITRE ATT&CK technique T1078: Valid Accounts is related to the vulnerability CVE-CVE-2019-1612. This technique is part of ATT&CK version 9 and applies to the enterprise domain. The relationship between this technique and the CVE is classified as exploitation_technique.
|
Provide detailed information about CVE-2018-2839.
|
CVE ID: CVE-2018-2839
Date Updated: 2024-10-03T20:13:44.464Z
Date Published: 2018-04-19T02:00:00
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1040698
- https://security.netapp.com/advisory/ntap-20180419-0002/
- http://www.securityfocus.com/bid/103845
- https://access.redhat.com/errata/RHSA-2018:3655
- http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html
- https://usn.ubuntu.com/3629-1/
- https://usn.ubuntu.com/3629-3/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2014-9153.
|
CVE ID: CVE-2014-9153
Date Updated: 2024-09-16T23:42:20.662Z
Date Published: 2014-12-01T16:00:00Z
Description:
Cross-site scripting (XSS) vulnerability in the Services module 7.x-3.x before 7.x-3.10 for Drupal allows remote authenticated users to inject arbitrary web script or HTML via the callback parameter in a JSONP response.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.drupal.org/node/2344423
- https://www.drupal.org/node/2344389
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-25187.
|
CVE ID: CVE-2024-25187
Date Updated: 2024-08-28T19:18:25.691Z
Date Published: 2024-04-02T00:00:00
Description:
Server Side Request Forgery (SSRF) vulnerability in 71cms v1.0.0, allows remote unauthenticated attackers to obtain sensitive information via getweather.html.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/xiaocheng-keji/71cms/issues/2
- https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2009-0645.
|
CVE ID: CVE-2009-0645
Date Updated: 2024-08-07T04:40:05.342Z
Date Published: 2009-02-18T23:00:00
Description:
Directory traversal vulnerability in index.php in Jaws 0.8.8 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the (1) language, (2) Introduction_complete, and (3) use_log parameters, different vectors than CVE-2004-2445.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/33607
- https://www.exploit-db.com/exploits/7976
- http://www.jaws-project.com/blog/show/jaws-089-released
- https://exchange.xforce.ibmcloud.com/vulnerabilities/48476
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-1366.
|
CVE ID: CVE-2013-1366
Date Updated: 2024-08-06T14:57:05.049Z
Date Published: 2013-02-12T20:00:00
Description:
Buffer overflow in Adobe Flash Player before 10.3.183.63 and 11.x before 11.6.602.168 on Windows, before 10.3.183.61 and 11.x before 11.6.602.167 on Mac OS X, before 10.3.183.61 and 11.x before 11.2.202.270 on Linux, before 11.1.111.43 on Android 2.x and 3.x, and before 11.1.115.47 on Android 4.x; Adobe AIR before 3.6.0.597; and Adobe AIR SDK before 3.6.0.599 allows attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2013-0642, CVE-2013-0645, CVE-2013-1365, CVE-2013-1367, CVE-2013-1368, CVE-2013-1369, CVE-2013-1370, CVE-2013-1372, and CVE-2013-1373.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2013-0254.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00009.html
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00011.html
- http://www.us-cert.gov/cas/techalerts/TA13-043A.html
- http://www.adobe.com/support/security/bulletins/apsb13-05.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2023-25875.
|
CVE ID: CVE-2023-25875
Date Updated: 2024-08-02T11:32:12.623Z
Date Published: 2023-03-27T00:00:00
Description:
Adobe Substance 3D Stager versions 2.0.0 (and earlier) are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://helpx.adobe.com/security/products/substance3d_stager/apsb23-22.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-7878.
|
CVE ID: CVE-2024-7878
Date Updated: 2024-09-25T13:36:15.056Z
Date Published: 2024-09-25T06:00:05.377Z
Description:
The WP ULike WordPress plugin before 4.7.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://wpscan.com/vulnerability/9166cf91-69e5-4786-a6a9-816db7d47b07/
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-12277.
|
CVE ID: CVE-2017-12277
Date Updated: 2024-08-05T18:36:54.479Z
Date Published: 2017-11-02T16:00:00
Description:
A vulnerability in the Smart Licensing Manager service of the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance could allow an authenticated, remote attacker to inject arbitrary commands that could be executed with root privileges. The vulnerability is due to insufficient input validation of certain Smart Licensing configuration parameters. An authenticated attacker could exploit the vulnerability by configuring a malicious URL within the affected feature. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. This vulnerability affects the following Cisco Firepower Security products running FX-OS code trains 1.1.3, 1.1.4, and 2.0.1 (versions 2.1.1, 2.2.1, and 2.2.2 are not affected): Firepower 4100 Series Next-Generation Firewall and Firepower 9300 Security Appliance. Cisco Bug IDs: CSCvb86863.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securityfocus.com/bid/101661
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-fpwr
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-3070.
|
CVE ID: CVE-2017-3070
Date Updated: 2024-08-05T14:16:27.457Z
Date Published: 2017-05-09T16:00:00
Description:
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://security.gentoo.org/glsa/201705-12
- https://helpx.adobe.com/security/products/flash-player/apsb17-15.html
- http://www.securityfocus.com/bid/98349
- https://access.redhat.com/errata/RHSA-2017:1219
- http://www.securitytracker.com/id/1038427
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-24013.
|
CVE ID: CVE-2022-24013
Date Updated: 2024-09-16T18:29:48.148Z
Date Published: 2022-08-05T21:14:37.558915Z
Description:
A buffer overflow vulnerability exists in the GetValue functionality of TCL LinkHub Mesh Wi-Fi MS1G_00_01.00_14. A specially-crafted configuration value can lead to a buffer overflow. An attacker can modify a configuration value to trigger this vulnerability.This vulnerability represents all occurances of the buffer overflow vulnerability within the gpio_ctrl binary.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://talosintelligence.com/vulnerability_reports/TALOS-2022-1463
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-20217.
|
CVE ID: CVE-2019-20217
Date Updated: 2024-08-05T02:39:08.909Z
Date Published: 2020-01-29T02:32:38
Description:
D-Link DIR-859 1.05 and 1.06B01 Beta01 devices allow remote attackers to execute arbitrary OS commands via the urn: to the M-SEARCH method in ssdpcgi() in /htdocs/cgibin, because SERVER_ID is mishandled. The value of the urn: service/device is checked with the strstr function, which allows an attacker to concatenate arbitrary commands separated by shell metacharacters.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://supportannouncement.us.dlink.com/announcement/publication.aspx?name=SAP10147
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-en-6bca043500ae
- https://medium.com/%40s1kr10s/d-link-dir-859-rce-unauthenticated-cve-2019-20216-cve-2019-20217-es-e11ca6168d35
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2017-4351.
|
CVE ID: CVE-2017-4351
Date Updated: 2018-03-16T13:57:01
Date Published: 2018-03-16T14:04:00
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2010-1743.
|
CVE ID: CVE-2010-1743
Date Updated: 2024-08-07T01:35:53.563Z
Date Published: 2010-05-06T18:00:00
Description:
SQL injection vulnerability in projects.php in Scratcher allows remote attackers to execute arbitrary SQL commands via the id parameter.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://exchange.xforce.ibmcloud.com/vulnerabilities/58234
- http://www.exploit-db.com/exploits/12458
- http://packetstormsecurity.org/1004-exploits/scratcher-sqlxss.txt
- http://secunia.com/advisories/39631
- http://osvdb.org/64220
- http://www.securityfocus.com/bid/39827
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-35333.
|
CVE ID: CVE-2022-35333
Date Updated: 2022-07-11T19:33:39
Date Published: 2022-07-11T19:33:39
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-36396.
|
CVE ID: CVE-2024-36396
Date Updated: 2024-08-02T03:37:05.180Z
Date Published: 2024-06-13T12:33:41.805Z
Description:
Verint - CWE-434: Unrestricted Upload of File with Dangerous Type
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.gov.il/en/Departments/faq/cve_advisories
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-29480.
|
CVE ID: CVE-2022-29480
Date Updated: 2024-09-17T04:29:06.587Z
Date Published: 2022-05-05T16:47:53.227558Z
Description:
On F5 BIG-IP 13.1.x versions prior to 13.1.5, and all versions of 12.1.x and 11.6.x, when multiple route domains are configured, undisclosed requests to big3d can cause an increase in CPU resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.f5.com/csp/article/K71103363
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
null |
Describe the vulnerability CVE-CVE-2018-8248
|
CVE-CVE-2018-8248 is a vulnerability in Microsoft Office. It is related to the MITRE ATT&CK technique T1565: Data Manipulation. The vulnerability is classified as a secondary_impact type. It affects the enterprise domain and was identified in ATT&CK version 9. This vulnerability was mapped using the cve framework, version 10/21/2021. It belongs to the capability group: 2018 CVEs. The vulnerability was initially created on 10/21/2021 and last updated on 10/21/2021.
|
Provide detailed information about CVE-2020-26124.
|
CVE ID: CVE-2020-26124
Date Updated: 2024-08-04T15:49:07.113Z
Date Published: 2020-10-02T08:28:03
Description:
openmediavault before 4.1.36 and 5.x before 5.5.12 allows authenticated PHP code injection attacks, via the sortfield POST parameter of rpc.php, because json_encode_safe is not used in config/databasebackend.inc. Successful exploitation allows arbitrary command execution on the underlying operating system as root.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/openmediavault/openmediavault/commit/ebb51bbf5a39f4955eab0073bf87f2a31926d85d
- https://www.openmediavault.org/?p=2797
- http://packetstormsecurity.com/files/160223/OpenMediaVault-rpc.php-Authenticated-PHP-Code-Injection.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2020-19144.
|
CVE ID: CVE-2020-19144
Date Updated: 2024-08-04T14:08:30.538Z
Date Published: 2021-09-09T14:25:45
Description:
Buffer Overflow in LibTiff v4.0.10 allows attackers to cause a denial of service via the 'in _TIFFmemcpy' funtion in the component 'tif_unix.c'.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://bugzilla.maptools.org/show_bug.cgi?id=2852
- https://gitlab.com/libtiff/libtiff/-/issues/159
- https://security.netapp.com/advisory/ntap-20211004-0005/
- https://lists.debian.org/debian-lts-announce/2021/10/msg00004.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2013-5177.
|
CVE ID: CVE-2013-5177
Date Updated: 2024-09-16T23:11:40.442Z
Date Published: 2013-10-24T01:00:00Z
Description:
The kernel in Apple Mac OS X before 10.9 allows local users to cause a denial of service (panic) via an invalid iovec structure.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://lists.apple.com/archives/security-announce/2013/Oct/msg00004.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-8815.
|
CVE ID: CVE-2019-8815
Date Updated: 2024-08-04T21:31:37.471Z
Date Published: 2019-12-18T17:33:24
Description:
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 13.2 and iPadOS 13.2, tvOS 13.2, Safari 13.0.3, iTunes for Windows 12.10.2, iCloud for Windows 11.0, iCloud for Windows 7.15. Processing maliciously crafted web content may lead to arbitrary code execution.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://support.apple.com/HT210727
- https://support.apple.com/HT210721
- https://support.apple.com/HT210726
- https://support.apple.com/HT210723
- https://support.apple.com/HT210728
- https://support.apple.com/HT210725
- https://security.gentoo.org/glsa/202003-22
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2021-2245.
|
CVE ID: CVE-2021-2245
Date Updated: 2024-09-26T14:47:55.999Z
Date Published: 2021-04-22T21:53:55
Description:
Vulnerability in the Oracle Database - Enterprise Edition Unified Audit component of Oracle Database Server. Supported versions that are affected are 18c and 19c. Easily exploitable vulnerability allows high privileged attacker having Create Audit Policy privilege with network access via Oracle Net to compromise Oracle Database - Enterprise Edition Unified Audit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Database - Enterprise Edition Unified Audit accessible data. CVSS 3.1 Base Score 2.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N).
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.oracle.com/security-alerts/cpuapr2021.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-14987.
|
CVE ID: CVE-2019-14987
Date Updated: 2024-08-05T00:34:52.954Z
Date Published: 2019-08-13T03:38:15
Description:
Adive Framework through 2.0.7 is affected by XSS in the Create New Table and Create New Navigation Link functions.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.sevenlayers.com/index.php/231-adive-framework-2-0-7-xss
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2016-9804.
|
CVE ID: CVE-2016-9804
Date Updated: 2024-08-06T02:59:03.568Z
Date Published: 2016-12-03T06:28:00
Description:
In BlueZ 5.42, a buffer overflow was observed in "commands_dump" function in "tools/parser/csr.c" source file. The issue exists because "commands" array is overflowed by supplied parameter due to lack of boundary checks on size of the buffer from frame "frm->ptr" parameter. This issue can be triggered by processing a corrupted dump file and will result in hcidump crash.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.spinics.net/lists/linux-bluetooth/msg68892.html
- http://www.securityfocus.com/bid/94652
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2019-14498.
|
CVE ID: CVE-2019-14498
Date Updated: 2024-08-05T00:19:41.193Z
Date Published: 2019-08-29T17:35:50
Description:
A divide-by-zero error exists in the Control function of demux/caf.c in VideoLAN VLC media player 3.0.7.1. As a result, an FPE can be triggered via a crafted CAF file.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://git.videolan.org/?p=vlc.git&a=search&h=refs/heads/master&st=commit&s=cve-2019
- https://www.debian.org/security/2019/dsa-4504
- https://seclists.org/bugtraq/2019/Aug/36
- https://www.videolan.org/security/sb-vlc308.html
- https://security.gentoo.org/glsa/201909-02
- https://usn.ubuntu.com/4131-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00046.html
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-11665.
|
CVE ID: CVE-2018-11665
Date Updated: 2021-07-22T18:16:24
Date Published: 2021-07-22T18:16:24
Description:
N/A
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
No references are available for this vulnerability.
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-31320.
|
CVE ID: CVE-2024-31320
Date Updated: 2024-08-02T01:52:56.211Z
Date Published: 2024-07-09T20:11:27.398Z
Description:
In setSkipPrompt of AssociationRequest.java , there is a possible way to establish a companion device association without any confirmation due to CDM. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://android.googlesource.com/platform/frameworks/base/+/9722ce9d733edab76163fbcd21b231424e3d7061
- https://android.googlesource.com/platform/frameworks/base/+/df49e0e3083b0707e2cca5a5956b49f14ded078e
- https://source.android.com/security/bulletin/2024-07-01
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-6102.
|
CVE ID: CVE-2018-6102
Date Updated: 2024-08-05T05:54:52.746Z
Date Published: 2018-12-04T17:00:00
Description:
Missing confusable characters in Internationalization in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://chromereleases.googleblog.com/2018/04/stable-channel-update-for-desktop.html
- https://security.gentoo.org/glsa/201804-22
- https://crbug.com/813814
- https://www.debian.org/security/2018/dsa-4182
- http://www.securityfocus.com/bid/103917
- https://access.redhat.com/errata/RHSA-2018:1195
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-34201.
|
CVE ID: CVE-2024-34201
Date Updated: 2024-08-02T02:51:09.859Z
Date Published: N/A
Description:
TOTOLINK CP450 v4.1.0cu.747_B20191224 was discovered to contain a stack buffer overflow vulnerability in the getSaveConfig function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/n0wstr/IOTVuln/tree/main/CP450/getSaveConfig
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-44023.
|
CVE ID: CVE-2022-44023
Date Updated: 2024-08-03T13:47:05.204Z
Date Published: 2022-10-29T00:00:00
Description:
PwnDoc through 0.5.3 might allow remote attackers to identify disabled user account names by leveraging response messages for authentication attempts.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/pwndoc/pwndoc/issues/382
- https://cve.nstsec.com/cve-2022-44023
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2022-45816.
|
CVE ID: CVE-2022-45816
Date Updated: 2024-08-03T14:24:01.008Z
Date Published: 2022-12-06T21:32:27.423Z
Description:
Auth. Stored Cross-Site Scripting (XSS) vulnerability in GD bbPress Attachments plugin <= 4.3.1 on WordPress.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://patchstack.com/database/vulnerability/gd-bbpress-attachments/wordpress-gd-bbpress-attachments-plugin-4-3-1-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2018-10186.
|
CVE ID: CVE-2018-10186
Date Updated: 2024-08-05T07:32:01.600Z
Date Published: 2018-04-17T20:00:00
Description:
In radare2 2.5.0, there is a heap-based buffer over-read in the r_hex_bin2str function (libr/util/hex.c). Remote attackers could leverage this vulnerability to cause a denial of service via a crafted DEX file. This issue is different from CVE-2017-15368.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://github.com/radare/radare2/issues/9915
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2015-3317.
|
CVE ID: CVE-2015-3317
Date Updated: 2024-08-06T05:47:56.288Z
Date Published: 2015-06-17T10:00:00
Description:
CA Common Services, as used in CA Client Automation r12.5 SP01, r12.8, and r12.9; CA Network and Systems Management r11.0, r11.1, and r11.2; CA NSM Job Management Option r11.0, r11.1, and r11.2; CA Universal Job Management Agent; CA Virtual Assurance for Infrastructure Managers (aka SystemEDGE) 12.6, 12.7, 12.8, and 12.9; and CA Workload Automation AE r11, r11.3, r11.3.5, and r11.3.6 on UNIX, does not properly perform bounds checking, which allows local users to gain privileges via unspecified vectors.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- http://www.securitytracker.com/id/1032513
- http://www.securityfocus.com/bid/75033
- http://www.securitytracker.com/id/1032512
- http://www.ca.com/us/support/ca-support-online/product-content/recommended-reading/security-notices/ca20150604-01-security-notice-for-ca-common-services.aspx
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
|
Provide detailed information about CVE-2024-6768.
|
CVE ID: CVE-2024-6768
Date Updated: 2024-08-13T14:24:58.377Z
Date Published: 2024-08-12T18:29:30.770Z
Description:
A Denial of Service in CLFS.sys in Microsoft Windows 10, Windows 11, Windows Server 2016, Windows Server 2019, and Windows Server 2022 allows a malicious authenticated low-privilege user to cause a Blue Screen of Death via a forced call to the KeBugCheckEx function.
No CVSS information is available for this vulnerability.
No Common Weakness Enumerations (CWEs) are associated with this vulnerability.
References:
- https://www.fortra.com/security/advisories/research/fr-2024-001
No related CVEs are listed for this vulnerability.
No CVSS score is available for this vulnerability. The vulnerability may affect the confidentiality, integrity, and availability of the system as described in the impact section. For more information, please refer to the provided references.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.